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", 0x1000, 0xfffffffffffffffe) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="bd52fb192882e010b4a48f64e58410cbeadb00c961564ff40e03ebc374e883a5f3fad879b5394fba5a8ed521cee4b67ebf1f0e61cb78603c5785", 0x3a, 0xfffffffffffffff8) r2 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r2}, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000500)={0x0, r1, r2}, &(0x7f0000000380)=""/216, 0xd8, &(0x7f00000004c0)={&(0x7f00000002c0)={'sha512-generic\x00'}, &(0x7f0000001800)="79ccc53786fbf52febe26750e8eff40484333544450016283d7a2c085b0e350d951a2a2e3a0c4fa01d4aedafbf0f28cb184812fb8f4d33854dc39383ece1959aeadc83540c46b8aa47484e754a56d7576f61c2b8b33fd6abfb3a4611b883093f5aff32d8fa5c176ff41317c287beb1c226fe1c8fae0632bd849a571f105d744eb33963827de7d89b9daac55b84711e704520c98d3042714697de6f78bac2fafa9aafc0fb390c28979cfc99ba393c555330505ee35f888c8cc62fd6e30d4b13ae4a7ea8672eb93a05aed197f8e0e07cab4000000000176adf50fa3da83e6f8cd71325c7b7581c3a7fc8296a9f8b0e9340", 0xf0}) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000540)="7b1fa12c73d8e2b95cfe777dcc30cd2b0115653a3252ab30eb987394c51c63c4064ae2194af1b3cbd943dcf52fadecac17fefac4cdfaff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d9cb65380862860ed738bb30a82efb04e58c576284b78ff47fbc2f7f69058c6fcdc17b0fd3acb17078e4bd891fe840a750ef5846d78bb99a3050a0500000000000000dcc1ab9a19c7c3535cc26736b706a9f8966d3d999b6277e3995fdb2c134aea1f5e74c53a9bfef48192491bc29b4ed8e16b5cccf06f12b140a81e7bbc9fd3e16052101f214d7bb4e059a6518bcf3caef432edc24043ce0c3b86e82a0d83632dabcfac3547ae8977177fce4332257771971df62dc5899d09244d2ead24432159a685b31b9eee1a6d760c4af72e0000", 0x19f, 0xfffffffffffffffb) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000001700)={'syz', 0x0}, &(0x7f0000001740)="46c244f0a3c6b1909cf93862fc2944caf43d9c2859e5d8c1d09d99e4613bd431d73c", 0x22, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r3, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) ioctl$CHAR_RAW_IOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000001780)) 18:36:04 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f00000002c0), r2}}, 0x18) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video2\x00', 0x2, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r3, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 18:36:04 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001840)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000001580)={'syz', 0x3}, &(0x7f00000015c0)="504c232068017354efed85622bbe55d025b431444c0a4377cfd060bc9b5669ae92f3c8f365c1acbc8663a19166fe87d2c0e202f7cabd445ec0997a7cc13f579f588b88c1ff5b82b1f94297b90bfb4b551ce02b6f264d31dcb74b34f594803bcf5c9581070e433f81db4e3af0263971d98caa7c4fb7b1ecf3c1e80f323fb78165e3639d1bf3662427dd430d4c1f5d40dd50e022e6a0d3ee816553204065886934805a3704d6b492c141101aaae0285178205912c377ad5a41855cc0f1c297ad9c9c83d6dae1d5adbb2d8eb5e10bb94689a42cc2a6560d20abc530f07d", 0xdc, 0xfffffffffffffffa) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000001880)=0xffff, &(0x7f00000018c0)=0x4) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000001f80)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) r4 = syz_open_dev$dri(&(0x7f00000016c0)='/dev/dri/card#\x00', 0x4, 0xa000) r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r5, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000001740)={0x8, &(0x7f0000001700)=[{}, {}, {}, {}, {}, {}, {}, {}]}) prctl$PR_MCE_KILL_GET(0x22) keyctl$dh_compute(0x17, &(0x7f0000000300)={r2, r1, r0}, 0x0, 0x0, &(0x7f0000001540)={&(0x7f00000000c0)={'sm3\x00'}}) [ 2088.151716] FAULT_INJECTION: forcing a failure. [ 2088.151716] name failslab, interval 1, probability 0, space 0, times 0 [ 2088.171941] audit: type=1400 audit(1608921365.030:477): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=25166 comm="syz-executor.5" [ 2088.189893] CPU: 0 PID: 25164 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 18:36:05 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001840)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000001580)={'syz', 0x3}, &(0x7f00000015c0)="504c232068017354efed85622bbe55d025b431444c0a4377cfd060bc9b5669ae92f3c8f365c1acbc8663a19166fe87d2c0e202f7cabd445ec0997a7cc13f579f588b88c1ff5b82b1f94297b90bfb4b551ce02b6f264d31dcb74b34f594803bcf5c9581070e433f81db4e3af0263971d98caa7c4fb7b1ecf3c1e80f323fb78165e3639d1bf3662427dd430d4c1f5d40dd50e022e6a0d3ee816553204065886934805a3704d6b492c141101aaae0285178205912c377ad5a41855cc0f1c297ad9c9c83d6dae1d5adbb2d8eb5e10bb94689a42cc2a6560d20abc530f07d", 0xdc, 0xfffffffffffffffa) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000001880)=0xffff, &(0x7f00000018c0)=0x4) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000001f80)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) r1 = syz_open_dev$dri(&(0x7f00000016c0)='/dev/dri/card#\x00', 0x4, 0xa000) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000001740)={0x8, &(0x7f0000001700)=[{}, {}, {}, {}, {}, {}, {}, {}]}) prctl$PR_MCE_KILL_GET(0x22) [ 2088.200036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2088.209393] Call Trace: [ 2088.209405] could not allocate digest TFM handle sm3 [ 2088.211971] dump_stack+0x1b2/0x283 [ 2088.211988] should_fail.cold+0x10a/0x154 [ 2088.212002] should_failslab+0xd6/0x130 [ 2088.212015] __kmalloc+0x2c1/0x400 [ 2088.232330] ? crypto_create_tfm+0x79/0x2d0 [ 2088.236648] ? up_read+0x17/0x30 [ 2088.240014] crypto_create_tfm+0x79/0x2d0 [ 2088.244165] crypto_alloc_tfm+0x11a/0x250 18:36:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) [ 2088.248317] __keyctl_dh_compute+0x1bb/0x1350 [ 2088.252817] ? lock_downgrade+0x740/0x740 [ 2088.256964] ? dh_data_from_key+0x250/0x250 [ 2088.261281] ? get_pid_task+0xb8/0x130 [ 2088.265162] ? proc_fail_nth_write+0x7b/0x180 [ 2088.269680] ? __might_fault+0x104/0x1b0 [ 2088.273741] ? lock_acquire+0x170/0x3f0 [ 2088.277711] ? lock_downgrade+0x740/0x740 [ 2088.281858] ? __might_fault+0x177/0x1b0 [ 2088.285940] keyctl_dh_compute+0x98/0xdd [ 2088.289999] ? __keyctl_dh_compute+0x1350/0x1350 [ 2088.294757] ? vfs_write+0x319/0x4d0 [ 2088.298479] ? SyS_write+0x14d/0x210 18:36:05 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000140)="5ada7e88a90000000000000000006f5cd2e212ddbcad976ca0fd7dd5360618cb2c7432797c36dba32920e6", 0x2b, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) [ 2088.302188] ? SyS_read+0x210/0x210 [ 2088.305815] SyS_keyctl+0xe0/0x390 [ 2088.309349] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 2088.314292] do_syscall_64+0x1d5/0x640 [ 2088.318195] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2088.323381] RIP: 0033:0x45e149 [ 2088.326569] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 2088.334277] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 [ 2088.341546] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 18:36:05 executing program 3: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000140), 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r0, r1, 0x0, 0xc, &(0x7f00000002c0)='\xb1:!}$.*)!]#\x00'}, 0x30) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) getsockname$netrom(0xffffffffffffffff, &(0x7f00000003c0)={{0x3, @rose}, [@rose, @bcast, @bcast, @remote, @default, @bcast, @rose, @default]}, &(0x7f0000000440)=0x48) keyctl$dh_compute(0x17, &(0x7f0000000300)={r2, r3, r2}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:05 executing program 2 (fault-call:2 fault-nth:2): r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x11, 0x7ff, 0x101, 0x3, 0x2a0, 0xffffffffffffffff, 0xa01, [], 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x5}, 0x40) [ 2088.341739] audit: type=1400 audit(1608921365.050:478): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=25180 comm="syz-executor.5" [ 2088.348803] RBP: 00007ff23c854ca0 R08: 0000000020000100 R09: 0000000000000000 [ 2088.348808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2088.348814] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c [ 2088.381747] could not allocate digest TFM handle crc32c-generic 18:36:05 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001840)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000001580)={'syz', 0x3}, &(0x7f00000015c0)="504c232068017354efed85622bbe55d025b431444c0a4377cfd060bc9b5669ae92f3c8f365c1acbc8663a19166fe87d2c0e202f7cabd445ec0997a7cc13f579f588b88c1ff5b82b1f94297b90bfb4b551ce02b6f264d31dcb74b34f594803bcf5c9581070e433f81db4e3af0263971d98caa7c4fb7b1ecf3c1e80f323fb78165e3639d1bf3662427dd430d4c1f5d40dd50e022e6a0d3ee816553204065886934805a3704d6b492c141101aaae0285178205912c377ad5a41855cc0f1c297ad9c9c83d6dae1d5adbb2d8eb5e10bb94689a42cc2a6560d20abc530f07d", 0xdc, 0xfffffffffffffffa) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000001880)=0xffff, &(0x7f00000018c0)=0x4) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000001f80)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) r1 = syz_open_dev$dri(&(0x7f00000016c0)='/dev/dri/card#\x00', 0x4, 0xa000) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000001740)={0x8, &(0x7f0000001700)=[{}, {}, {}, {}, {}, {}, {}, {}]}) 18:36:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xffff0001, @dev={0xfe, 0x80, [], 0x19}, 0x22}, r1}}, 0x30) 18:36:05 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x0) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x2) [ 2088.487448] FAULT_INJECTION: forcing a failure. [ 2088.487448] name failslab, interval 1, probability 0, space 0, times 0 [ 2088.519852] CPU: 0 PID: 25215 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2088.527763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2088.537131] Call Trace: [ 2088.539723] dump_stack+0x1b2/0x283 [ 2088.543361] should_fail.cold+0x10a/0x154 [ 2088.547516] should_failslab+0xd6/0x130 [ 2088.551502] __kmalloc+0x2c1/0x400 [ 2088.555040] ? __keyctl_dh_compute+0x25e/0x1350 [ 2088.559710] __keyctl_dh_compute+0x25e/0x1350 [ 2088.564209] ? lock_downgrade+0x740/0x740 [ 2088.568365] ? dh_data_from_key+0x250/0x250 [ 2088.572685] ? get_pid_task+0xb8/0x130 [ 2088.576570] ? proc_fail_nth_write+0x7b/0x180 [ 2088.581071] ? __might_fault+0x104/0x1b0 18:36:05 executing program 3: r0 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) socketpair(0x2, 0x800, 0x8, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r3, 0x8008af00, &(0x7f0000000580)) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f00000002c0)={0x2, 0x80000000}) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r2, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r4, &(0x7f0000000440)={'stack ', 'syz'}, 0x9) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f00000003c0)=0x5, 0x4) 18:36:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x22}, r1}}, 0x30) [ 2088.585138] ? lock_acquire+0x170/0x3f0 [ 2088.589124] ? lock_downgrade+0x740/0x740 [ 2088.593273] ? __might_fault+0x177/0x1b0 [ 2088.597336] keyctl_dh_compute+0x98/0xdd [ 2088.601396] ? __keyctl_dh_compute+0x1350/0x1350 [ 2088.606146] ? vfs_write+0x319/0x4d0 [ 2088.609859] ? SyS_write+0x14d/0x210 [ 2088.613570] ? SyS_read+0x210/0x210 [ 2088.617192] SyS_keyctl+0xe0/0x390 [ 2088.620743] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 2088.625677] do_syscall_64+0x1d5/0x640 [ 2088.629566] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2088.634750] RIP: 0033:0x45e149 18:36:05 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001840)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000001580)={'syz', 0x3}, &(0x7f00000015c0)="504c232068017354efed85622bbe55d025b431444c0a4377cfd060bc9b5669ae92f3c8f365c1acbc8663a19166fe87d2c0e202f7cabd445ec0997a7cc13f579f588b88c1ff5b82b1f94297b90bfb4b551ce02b6f264d31dcb74b34f594803bcf5c9581070e433f81db4e3af0263971d98caa7c4fb7b1ecf3c1e80f323fb78165e3639d1bf3662427dd430d4c1f5d40dd50e022e6a0d3ee816553204065886934805a3704d6b492c141101aaae0285178205912c377ad5a41855cc0f1c297ad9c9c83d6dae1d5adbb2d8eb5e10bb94689a42cc2a6560d20abc530f07d", 0xdc, 0xfffffffffffffffa) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000001880)=0xffff, &(0x7f00000018c0)=0x4) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000001f80)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) syz_open_dev$dri(&(0x7f00000016c0)='/dev/dri/card#\x00', 0x4, 0xa000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:05 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x490000, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) [ 2088.637946] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 2088.645649] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 [ 2088.652911] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 [ 2088.660173] RBP: 00007ff23c854ca0 R08: 0000000020000100 R09: 0000000000000000 [ 2088.667436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2088.674702] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c 18:36:05 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001840)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000001580)={'syz', 0x3}, &(0x7f00000015c0)="504c232068017354efed85622bbe55d025b431444c0a4377cfd060bc9b5669ae92f3c8f365c1acbc8663a19166fe87d2c0e202f7cabd445ec0997a7cc13f579f588b88c1ff5b82b1f94297b90bfb4b551ce02b6f264d31dcb74b34f594803bcf5c9581070e433f81db4e3af0263971d98caa7c4fb7b1ecf3c1e80f323fb78165e3639d1bf3662427dd430d4c1f5d40dd50e022e6a0d3ee816553204065886934805a3704d6b492c141101aaae0285178205912c377ad5a41855cc0f1c297ad9c9c83d6dae1d5adbb2d8eb5e10bb94689a42cc2a6560d20abc530f07d", 0xdc, 0xfffffffffffffffa) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000001880)=0xffff, &(0x7f00000018c0)=0x4) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000001f80)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) syz_open_dev$dri(&(0x7f00000016c0)='/dev/dri/card#\x00', 0x4, 0xa000) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:05 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000380)={{0x9, 0x8, 0x101, 0xad3}, 'syz0\x00', 0x32}) 18:36:05 executing program 2 (fault-call:2 fault-nth:3): r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:05 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000140)={0x0, 0x12}) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev}, r1}}, 0x30) 18:36:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl1\x00', &(0x7f0000000200)={'gre0\x00', 0x0, 0x700, 0x7800, 0x2, 0x200, {{0x43, 0x4, 0x1, 0x4, 0x10c, 0x65, 0x0, 0x1f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x1c}, @local, {[@generic={0x83, 0x11, "dfedd21e9ee00a3b2089d23a8c55d8"}, @rr={0x7, 0x13, 0xd, [@multicast1, @broadcast, @multicast2, @local]}, @cipso={0x86, 0x25, 0x3, [{0x2, 0x7, "8c38e5a495"}, {0x6, 0x9, "5ea811c0a8f848"}, {0x2, 0x7, "b1e30a3446"}, {0x7, 0x6, "37c77014"}, {0x0, 0x2}]}, @timestamp_prespec={0x44, 0x1c, 0x64, 0x3, 0x5, [{@remote, 0xfffffff9}, {@dev={0xac, 0x14, 0x14, 0xe}, 0x63d}, {@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @rr={0x7, 0x1b, 0x2c, [@loopback, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x17}, @private=0xa010102, @multicast1, @remote]}, @timestamp_prespec={0x44, 0x2c, 0x79, 0x3, 0x8, [{@broadcast, 0x4}, {@remote}, {@rand_addr=0x64010101, 0x80000000}, {@multicast2, 0x4}, {@remote, 0x67}]}, @cipso={0x86, 0x1f, 0x0, [{0x1, 0x4, "7d1e"}, {0xc6ef252511e237a1, 0x3, 'g'}, {0x5, 0x12, "0ee183a810aba66ed6fde34e05d652bb"}]}, @timestamp_addr={0x44, 0xc, 0x24, 0x1, 0x6, [{@multicast1, 0x89}]}, @noop, @timestamp={0x44, 0x20, 0x65, 0x0, 0xb, [0x0, 0x9, 0x14fd, 0x101, 0x1, 0x0, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000100)={'gretap0\x00', r1, 0x8000, 0x40, 0x3, 0x2, {{0xe, 0x4, 0x3, 0x35, 0x38, 0x67, 0x0, 0x3c, 0x4, 0x0, @remote, @rand_addr=0x64010101, {[@ssrr={0x89, 0x13, 0x12, [@remote, @remote, @loopback, @empty]}, @timestamp_prespec={0x44, 0xc, 0xb8, 0x3, 0x7, [{@dev={0xac, 0x14, 0x14, 0x3a}, 0x10001}]}, @ra={0x94, 0x4}]}}}}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) r3 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000340)={0x5, &(0x7f0000000180)=[{}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_LOCK(r3, 0x4008642a, &(0x7f0000000380)={r4, 0x3}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x33}, 0x25}, r2}}, 0x30) 18:36:05 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001840)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000001580)={'syz', 0x3}, &(0x7f00000015c0)="504c232068017354efed85622bbe55d025b431444c0a4377cfd060bc9b5669ae92f3c8f365c1acbc8663a19166fe87d2c0e202f7cabd445ec0997a7cc13f579f588b88c1ff5b82b1f94297b90bfb4b551ce02b6f264d31dcb74b34f594803bcf5c9581070e433f81db4e3af0263971d98caa7c4fb7b1ecf3c1e80f323fb78165e3639d1bf3662427dd430d4c1f5d40dd50e022e6a0d3ee816553204065886934805a3704d6b492c141101aaae0285178205912c377ad5a41855cc0f1c297ad9c9c83d6dae1d5adbb2d8eb5e10bb94689a42cc2a6560d20abc530f07d", 0xdc, 0xfffffffffffffffa) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000001880)=0xffff, &(0x7f00000018c0)=0x4) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000001f80)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) syz_open_dev$dri(&(0x7f00000016c0)='/dev/dri/card#\x00', 0x4, 0xa000) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:05 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000080)=ANY=[], 0x8) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000140)=0x3, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000540)={'gre0\x00', &(0x7f00000004c0)={'gretap0\x00', 0x0, 0x8044, 0x7800, 0x5, 0x20, {{0x14, 0x4, 0x2, 0xa, 0x50, 0x68, 0x0, 0x1, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@generic={0x7, 0x12, "93529ac7fae3fb0eda5c8480e0cbf048"}, @end, @ra={0x94, 0x4}, @generic={0xde, 0x9, "222b60cd59ca7d"}, @cipso={0x86, 0x1c, 0x3, [{0x0, 0x9, "c22b512d27d86c"}, {0x5, 0xd, "58282a022ba7cb9ee7fc9a"}]}]}}}}}) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x90, 0x0, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x27}, @ETHTOOL_A_CHANNELS_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x1}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7fffffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x40}]}, 0x90}}, 0x4080) read$proc_mixer(r0, &(0x7f0000000240)=""/168, 0xa8) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000580)={0x7, 0x47, 0x2}, 0x7) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r1, r2, r1}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) [ 2088.868480] FAULT_INJECTION: forcing a failure. [ 2088.868480] name failslab, interval 1, probability 0, space 0, times 0 18:36:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev}, r1}}, 0x30) [ 2088.934115] CPU: 1 PID: 25279 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2088.942026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2088.951378] Call Trace: [ 2088.953971] dump_stack+0x1b2/0x283 [ 2088.957599] should_fail.cold+0x10a/0x154 [ 2088.961746] should_failslab+0xd6/0x130 [ 2088.965724] __kmalloc_track_caller+0x2bc/0x400 [ 2088.970393] ? dh_data_from_key+0x146/0x250 [ 2088.974710] kmemdup+0x23/0x50 [ 2088.977890] dh_data_from_key+0x146/0x250 [ 2088.982035] __keyctl_dh_compute+0x2ef/0x1350 [ 2088.986548] ? lock_downgrade+0x740/0x740 [ 2088.990697] ? dh_data_from_key+0x250/0x250 [ 2088.995018] ? get_pid_task+0xb8/0x130 [ 2088.998901] ? proc_fail_nth_write+0x7b/0x180 [ 2089.003402] ? __might_fault+0x104/0x1b0 [ 2089.007461] ? lock_acquire+0x170/0x3f0 [ 2089.011432] ? lock_downgrade+0x740/0x740 [ 2089.015585] ? __might_fault+0x177/0x1b0 [ 2089.019658] keyctl_dh_compute+0x98/0xdd [ 2089.023715] ? __keyctl_dh_compute+0x1350/0x1350 [ 2089.028465] ? vfs_write+0x319/0x4d0 [ 2089.032178] ? SyS_write+0x14d/0x210 [ 2089.035889] ? SyS_read+0x210/0x210 [ 2089.039517] SyS_keyctl+0xe0/0x390 [ 2089.043059] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 2089.047997] do_syscall_64+0x1d5/0x640 [ 2089.051893] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2089.057078] RIP: 0033:0x45e149 [ 2089.060262] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 2089.067968] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 [ 2089.075329] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 18:36:05 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001840)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000001580)={'syz', 0x3}, &(0x7f00000015c0)="504c232068017354efed85622bbe55d025b431444c0a4377cfd060bc9b5669ae92f3c8f365c1acbc8663a19166fe87d2c0e202f7cabd445ec0997a7cc13f579f588b88c1ff5b82b1f94297b90bfb4b551ce02b6f264d31dcb74b34f594803bcf5c9581070e433f81db4e3af0263971d98caa7c4fb7b1ecf3c1e80f323fb78165e3639d1bf3662427dd430d4c1f5d40dd50e022e6a0d3ee816553204065886934805a3704d6b492c141101aaae0285178205912c377ad5a41855cc0f1c297ad9c9c83d6dae1d5adbb2d8eb5e10bb94689a42cc2a6560d20abc530f07d", 0xdc, 0xfffffffffffffffa) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000001880)=0xffff, &(0x7f00000018c0)=0x4) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000001f80)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) syz_open_dev$dri(&(0x7f00000016c0)='/dev/dri/card#\x00', 0x4, 0xa000) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev}, r1}}, 0x30) 18:36:05 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x24, r4, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000828bd7000fedbdf25000000000600030000000000050004000500000005002200010000000800090000000000817b1bfa856778df3e3b6300f74eff138aa4b34710792af573f26d70fc78fab326b61efc2d9be32ac3494f5113000cf9dbe010f9054ba7f707069947462e3da25006da1c00d5fabc2df4db0f4e59771d1bdc6006"], 0x34}, 0x1, 0x0, 0x0, 0x24000800}, 0x40040004) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) [ 2089.082593] RBP: 00007ff23c854ca0 R08: 0000000020000100 R09: 0000000000000000 [ 2089.089861] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2089.097126] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c 18:36:06 executing program 2 (fault-call:2 fault-nth:4): r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}}}, 0x30) 18:36:06 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000140)=0x1000, &(0x7f00000002c0)=0x4) keyctl$dh_compute(0x17, &(0x7f0000000380)={r1, 0x0, r0}, &(0x7f00000003c0)=""/35, 0x23, &(0x7f0000001440)={&(0x7f0000000400)={'wp512\x00'}, &(0x7f0000000440)="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", 0x1000}) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:06 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001840)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000001580)={'syz', 0x3}, &(0x7f00000015c0)="504c232068017354efed85622bbe55d025b431444c0a4377cfd060bc9b5669ae92f3c8f365c1acbc8663a19166fe87d2c0e202f7cabd445ec0997a7cc13f579f588b88c1ff5b82b1f94297b90bfb4b551ce02b6f264d31dcb74b34f594803bcf5c9581070e433f81db4e3af0263971d98caa7c4fb7b1ecf3c1e80f323fb78165e3639d1bf3662427dd430d4c1f5d40dd50e022e6a0d3ee816553204065886934805a3704d6b492c141101aaae0285178205912c377ad5a41855cc0f1c297ad9c9c83d6dae1d5adbb2d8eb5e10bb94689a42cc2a6560d20abc530f07d", 0xdc, 0xfffffffffffffffa) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000001880)=0xffff, &(0x7f00000018c0)=0x4) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000001f80)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}}}, 0x30) [ 2089.215707] FAULT_INJECTION: forcing a failure. [ 2089.215707] name failslab, interval 1, probability 0, space 0, times 0 [ 2089.259075] CPU: 1 PID: 25330 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2089.267098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2089.276455] Call Trace: [ 2089.279058] dump_stack+0x1b2/0x283 [ 2089.282698] should_fail.cold+0x10a/0x154 [ 2089.286854] should_failslab+0xd6/0x130 [ 2089.290834] __kmalloc_track_caller+0x2bc/0x400 [ 2089.295505] ? dh_data_from_key+0x146/0x250 [ 2089.299831] kmemdup+0x23/0x50 [ 2089.303034] dh_data_from_key+0x146/0x250 18:36:06 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001840)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000001580)={'syz', 0x3}, &(0x7f00000015c0)="504c232068017354efed85622bbe55d025b431444c0a4377cfd060bc9b5669ae92f3c8f365c1acbc8663a19166fe87d2c0e202f7cabd445ec0997a7cc13f579f588b88c1ff5b82b1f94297b90bfb4b551ce02b6f264d31dcb74b34f594803bcf5c9581070e433f81db4e3af0263971d98caa7c4fb7b1ecf3c1e80f323fb78165e3639d1bf3662427dd430d4c1f5d40dd50e022e6a0d3ee816553204065886934805a3704d6b492c141101aaae0285178205912c377ad5a41855cc0f1c297ad9c9c83d6dae1d5adbb2d8eb5e10bb94689a42cc2a6560d20abc530f07d", 0xdc, 0xfffffffffffffffa) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000001880)=0xffff, &(0x7f00000018c0)=0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2089.307188] __keyctl_dh_compute+0x42d/0x1350 [ 2089.311698] ? lock_downgrade+0x740/0x740 [ 2089.315851] ? dh_data_from_key+0x250/0x250 [ 2089.320169] ? get_pid_task+0xb8/0x130 [ 2089.324053] ? proc_fail_nth_write+0x7b/0x180 [ 2089.328557] ? __might_fault+0x104/0x1b0 [ 2089.332622] ? lock_acquire+0x170/0x3f0 [ 2089.336596] ? lock_downgrade+0x740/0x740 [ 2089.340751] ? __might_fault+0x177/0x1b0 [ 2089.344817] keyctl_dh_compute+0x98/0xdd [ 2089.348877] ? __keyctl_dh_compute+0x1350/0x1350 [ 2089.353632] ? vfs_write+0x319/0x4d0 [ 2089.357345] ? SyS_write+0x14d/0x210 [ 2089.361059] ? SyS_read+0x210/0x210 [ 2089.364696] SyS_keyctl+0xe0/0x390 [ 2089.368239] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 2089.373167] do_syscall_64+0x1d5/0x640 [ 2089.377058] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2089.382242] RIP: 0033:0x45e149 [ 2089.385423] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 2089.393133] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 [ 2089.400397] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 [ 2089.407661] RBP: 00007ff23c854ca0 R08: 0000000020000100 R09: 0000000000000000 [ 2089.414977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2089.422235] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c 18:36:06 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000140)={0x0, 0x30}) 18:36:06 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001840)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000001580)={'syz', 0x3}, &(0x7f00000015c0)="504c232068017354efed85622bbe55d025b431444c0a4377cfd060bc9b5669ae92f3c8f365c1acbc8663a19166fe87d2c0e202f7cabd445ec0997a7cc13f579f588b88c1ff5b82b1f94297b90bfb4b551ce02b6f264d31dcb74b34f594803bcf5c9581070e433f81db4e3af0263971d98caa7c4fb7b1ecf3c1e80f323fb78165e3639d1bf3662427dd430d4c1f5d40dd50e022e6a0d3ee816553204065886934805a3704d6b492c141101aaae0285178205912c377ad5a41855cc0f1c297ad9c9c83d6dae1d5adbb2d8eb5e10bb94689a42cc2a6560d20abc530f07d", 0xdc, 0xfffffffffffffffa) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000001880)=0xffff, &(0x7f00000018c0)=0x4) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}}}, 0x30) 18:36:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r2}}, 0x30) 18:36:06 executing program 2 (fault-call:2 fault-nth:5): r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:06 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000440)="62e2de54aa77a4d3806ad72c50248a0075dfc5794444d2b6632945b0c2215759e27e8fd273953ebec4ea7f35b4516edce683859a02d9989b3376e3f917d14c125683316d110b3c9d6dd70ad9e202a1d961e41062471f6ed175db4839742bbd0af1a3fbbea4ee9ecd9be12b8acf3ff840a5b9dbc62decc5e996dddeeb7a2992f0b70be225db4cdb35974475", 0xffffff20, 0xffffffffffffffff) r2 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r3, 0x0, 0x0) connect$netrom(r3, &(0x7f00000003c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r2}, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000300)={r2, r1, r0}, 0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={'sha224\x00'}}) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x47, 0x1}, 0x7) 18:36:06 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001840)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000001580)={'syz', 0x3}, &(0x7f00000015c0)="504c232068017354efed85622bbe55d025b431444c0a4377cfd060bc9b5669ae92f3c8f365c1acbc8663a19166fe87d2c0e202f7cabd445ec0997a7cc13f579f588b88c1ff5b82b1f94297b90bfb4b551ce02b6f264d31dcb74b34f594803bcf5c9581070e433f81db4e3af0263971d98caa7c4fb7b1ecf3c1e80f323fb78165e3639d1bf3662427dd430d4c1f5d40dd50e022e6a0d3ee816553204065886934805a3704d6b492c141101aaae0285178205912c377ad5a41855cc0f1c297ad9c9c83d6dae1d5adbb2d8eb5e10bb94689a42cc2a6560d20abc530f07d", 0xdc, 0xfffffffffffffffa) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:06 executing program 4: r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) [ 2089.809509] FAULT_INJECTION: forcing a failure. [ 2089.809509] name failslab, interval 1, probability 0, space 0, times 0 [ 2089.838636] CPU: 1 PID: 25377 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2089.846550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2089.855901] Call Trace: 18:36:06 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001840)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2089.858496] dump_stack+0x1b2/0x283 [ 2089.862136] should_fail.cold+0x10a/0x154 [ 2089.866289] should_failslab+0xd6/0x130 [ 2089.870271] __kmalloc_track_caller+0x2bc/0x400 [ 2089.874941] ? dh_data_from_key+0x146/0x250 [ 2089.879265] kmemdup+0x23/0x50 [ 2089.882463] dh_data_from_key+0x146/0x250 [ 2089.886614] __keyctl_dh_compute+0x454/0x1350 [ 2089.891112] ? lock_downgrade+0x740/0x740 [ 2089.895299] ? dh_data_from_key+0x250/0x250 [ 2089.899619] ? get_pid_task+0xb8/0x130 [ 2089.903507] ? proc_fail_nth_write+0x7b/0x180 18:36:06 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001840)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:06 executing program 1: r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r2, 0x4038564f, &(0x7f0000000380)={{0x1, @addr=0x3ff}, 0x8, 0xfffffffffffffffd, 0x6}) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000003c0)=ANY=[@ANYBLOB="040000003f070000b0030000000000000070b6000000000002000000000000000400000000000000ffffffff00000000040000000000000000010000000000000001000000000000"]) [ 2089.908008] ? __might_fault+0x104/0x1b0 [ 2089.912069] ? lock_acquire+0x170/0x3f0 [ 2089.916042] ? lock_downgrade+0x740/0x740 [ 2089.920195] ? __might_fault+0x177/0x1b0 [ 2089.924274] keyctl_dh_compute+0x98/0xdd [ 2089.928350] ? __keyctl_dh_compute+0x1350/0x1350 [ 2089.933101] ? vfs_write+0x319/0x4d0 [ 2089.936817] ? SyS_write+0x14d/0x210 [ 2089.940530] ? SyS_read+0x210/0x210 [ 2089.944157] SyS_keyctl+0xe0/0x390 [ 2089.947696] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 2089.952623] do_syscall_64+0x1d5/0x640 18:36:06 executing program 1: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha3-224\x00'}}) [ 2089.956517] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2089.961703] RIP: 0033:0x45e149 [ 2089.964887] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 2089.972596] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 [ 2089.979882] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 [ 2089.987149] RBP: 00007ff23c854ca0 R08: 0000000020000100 R09: 0000000000000000 [ 2089.994416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2090.001685] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c 18:36:06 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x7800, 0x80, 0x401, 0x5, {{0x27, 0x4, 0x0, 0x6, 0x9c, 0x66, 0x0, 0x0, 0x4, 0x0, @local, @multicast2, {[@ssrr={0x89, 0x1f, 0x5a, [@remote, @loopback, @broadcast, @multicast2, @private=0xa010102, @remote, @multicast2]}, @timestamp={0x44, 0x10, 0x5c, 0x0, 0x9, [0x4, 0x40, 0x8001]}, @end, @timestamp_prespec={0x44, 0x14, 0x77, 0x3, 0x1, [{@remote, 0x814}, {@local, 0x10000}]}, @ssrr={0x89, 0x13, 0x2c, [@local, @dev={0xac, 0x14, 0x14, 0x3a}, @loopback, @dev={0xac, 0x14, 0x14, 0x20}]}, @ssrr={0x89, 0xf, 0x61, [@multicast1, @empty, @rand_addr=0x64010101]}, @noop, @noop, @generic={0x86, 0xa, "fe480f105d9619ce"}, @timestamp_addr={0x44, 0x14, 0x85, 0x1, 0x3, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@empty, 0x80}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000540)={'ip_vti0\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="67726530000000000000000000000000aaefeb7f8deb179200a0905e8d08de6864b90f93d3f987ecf09d4ff686b35211f6659a862861cceaa65ce985a1864d348612e0053e1e2277c9", @ANYRES32=0x0, @ANYBLOB="0080000f0000001fffffffe14ce4007000680000052f90787f00000164010102009404000044109920000000020000000064030b5b8611000000030108f6f7468bfafc0703200044087a90000000074b0daa10d8ee1b02368a590b34890f230a010102ffffffffffffffff860ffffffffd060207075e459f5e3c0000"]}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000580)={0x450, 0x0, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8}, {0x130, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x44, 0x4, [{0x8, 0x63, 0xc8, 0x1}, {0xe910, 0x7, 0x0, 0x80000001}, {0x101, 0x1, 0x6, 0x9}, {0x3, 0x1, 0x40, 0x80000001}, {0x1e, 0x7, 0x20, 0x9af}, {0x5, 0x40, 0xac, 0x8}, {0x8, 0x81, 0x2, 0x8}, {0x828, 0x1, 0x5, 0x6}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x13c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0xfc}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x16c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x80000001}}}]}}]}, 0x450}, 0x1, 0x0, 0x0, 0x10}, 0x40014) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r3, 0x1f}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r4}}, 0x30) 18:36:06 executing program 4: add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) 18:36:06 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:06 executing program 2 (fault-call:2 fault-nth:6): r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:07 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001840)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2090.144088] FAULT_INJECTION: forcing a failure. [ 2090.144088] name failslab, interval 1, probability 0, space 0, times 0 [ 2090.173895] CPU: 1 PID: 25426 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2090.181811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2090.191167] Call Trace: [ 2090.193757] dump_stack+0x1b2/0x283 [ 2090.197401] should_fail.cold+0x10a/0x154 [ 2090.201569] should_failslab+0xd6/0x130 [ 2090.205547] __kmalloc+0x2c1/0x400 [ 2090.209085] ? __keyctl_dh_compute+0x48a/0x1350 [ 2090.213755] __keyctl_dh_compute+0x48a/0x1350 [ 2090.218251] ? lock_downgrade+0x740/0x740 [ 2090.222414] ? dh_data_from_key+0x250/0x250 [ 2090.226733] ? get_pid_task+0xb8/0x130 [ 2090.230616] ? proc_fail_nth_write+0x7b/0x180 [ 2090.235117] ? __might_fault+0x104/0x1b0 [ 2090.239179] ? lock_acquire+0x170/0x3f0 [ 2090.243160] ? lock_downgrade+0x740/0x740 [ 2090.247311] ? __might_fault+0x177/0x1b0 [ 2090.251379] keyctl_dh_compute+0x98/0xdd [ 2090.255433] ? __keyctl_dh_compute+0x1350/0x1350 [ 2090.260178] ? vfs_write+0x319/0x4d0 [ 2090.263877] ? SyS_write+0x14d/0x210 [ 2090.267579] ? SyS_read+0x210/0x210 [ 2090.271192] SyS_keyctl+0xe0/0x390 [ 2090.274707] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 2090.279615] do_syscall_64+0x1d5/0x640 [ 2090.283483] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2090.288658] RIP: 0033:0x45e149 18:36:07 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001840)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:07 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:07 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x408000, 0x0) 18:36:07 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000380)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x101, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x8, 0x7, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @default]}) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r1, r2, r1}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha512-arm64\x00'}}) [ 2090.291832] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 2090.299531] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 [ 2090.306784] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 [ 2090.314041] RBP: 00007ff23c854ca0 R08: 0000000020000100 R09: 0000000000000000 [ 2090.321290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 2090.328542] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c 18:36:07 executing program 2 (fault-call:2 fault-nth:7): r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000040)={0x0, 0x1}) 18:36:07 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:07 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001840)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:07 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000380)="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", 0x11c, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) [ 2090.435468] FAULT_INJECTION: forcing a failure. [ 2090.435468] name failslab, interval 1, probability 0, space 0, times 0 [ 2090.482930] could not allocate digest TFM handle sha512-arm64 [ 2090.483211] CPU: 1 PID: 25455 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2090.496719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2090.506082] Call Trace: [ 2090.508818] dump_stack+0x1b2/0x283 [ 2090.512446] should_fail.cold+0x10a/0x154 [ 2090.516598] should_failslab+0xd6/0x130 [ 2090.520570] __kmalloc+0x2c1/0x400 [ 2090.524107] ? crypto_create_tfm+0x79/0x2d0 [ 2090.528423] ? up_read+0x17/0x30 [ 2090.531796] crypto_create_tfm+0x79/0x2d0 [ 2090.535943] crypto_alloc_tfm+0x11a/0x250 [ 2090.540110] __keyctl_dh_compute+0x4d5/0x1350 [ 2090.544607] ? lock_downgrade+0x740/0x740 [ 2090.548759] ? dh_data_from_key+0x250/0x250 [ 2090.553075] ? get_pid_task+0xb8/0x130 [ 2090.556959] ? proc_fail_nth_write+0x7b/0x180 [ 2090.561463] ? __might_fault+0x104/0x1b0 [ 2090.565523] ? lock_acquire+0x170/0x3f0 [ 2090.569491] ? lock_downgrade+0x740/0x740 [ 2090.573642] ? __might_fault+0x177/0x1b0 [ 2090.577707] keyctl_dh_compute+0x98/0xdd [ 2090.581767] ? __keyctl_dh_compute+0x1350/0x1350 [ 2090.586517] ? vfs_write+0x319/0x4d0 [ 2090.590235] ? SyS_write+0x14d/0x210 [ 2090.593945] ? SyS_read+0x210/0x210 [ 2090.597566] SyS_keyctl+0xe0/0x390 [ 2090.601103] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 2090.606031] do_syscall_64+0x1d5/0x640 [ 2090.609932] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2090.615121] RIP: 0033:0x45e149 [ 2090.618304] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 2090.626009] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 18:36:07 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)={'team0\x00'}) 18:36:07 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:07 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x800, 0x0) r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) getuid() r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000140)=0x1, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) 18:36:07 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001840)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2090.633276] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 [ 2090.640541] RBP: 00007ff23c854ca0 R08: 0000000020000100 R09: 0000000000000000 [ 2090.647809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 2090.655074] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c 18:36:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001290002000009a639000c001600607cf311fc5402e3"], 0x20}, 0x1, 0x0, 0x0, 0x44005}, 0x8010) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:07 executing program 2 (fault-call:2 fault-nth:8): r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:07 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000480)=ANY=[@ANYBLOB="05005100200000007f00000000000000ac000000000000004b7600000000000006000000000000003f00000000000000080000000000000001000080000000000100008000000000060000000000a6f36e727a4444df000074978dc3a8a421fd30ff7c55"]) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r2, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_GET_DEBUGREGS(r3, 0x8080aea1, &(0x7f0000000380)) 18:36:07 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video2\x00', 0x2, 0x0) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @reserved}}) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000380)={0x9a0000, 0xfdc5, 0x5, r2, 0x0, &(0x7f00000002c0)={0x990a75, 0x2a0, [], @value64=0x9}}) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000480)="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", 0x16f, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r3, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) ioctl$VIDIOC_G_PARM(0xffffffffffffffff, 0xc0cc5615, &(0x7f00000001c0)={0x7, @capture={0x1000, 0x0, {0x4, 0x8000}, 0x256, 0xbeb}}) 18:36:07 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:07 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001840)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2090.778871] FAULT_INJECTION: forcing a failure. [ 2090.778871] name failslab, interval 1, probability 0, space 0, times 0 18:36:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r2}}, 0x30) 18:36:07 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f00000002c0)={0x0, 0x3}) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000380)={{0x3, @default}, [@bcast, @remote, @bcast, @remote, @bcast, @null, @rose, @bcast]}, &(0x7f0000000140)=0x48) [ 2090.828061] CPU: 0 PID: 25501 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2090.835972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2090.845326] Call Trace: [ 2090.847918] dump_stack+0x1b2/0x283 [ 2090.851553] should_fail.cold+0x10a/0x154 [ 2090.855704] should_failslab+0xd6/0x130 [ 2090.859683] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2090.864348] mpi_alloc+0x43/0x240 [ 2090.867802] mpi_read_raw_data+0xac/0x370 [ 2090.871954] ? rcu_lockdep_current_cpu_online+0xed/0x140 18:36:07 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000380)="7b1fa12c73d8e2b95cfe7764cc30cd2b0115653a3252ab30ebb87394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1bb27f39d37adc69b6f37cdb8137aab6694e56d97d64d7", 0xd7, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0xffffffffffffff60, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:07 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001840)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2090.877406] ? mpi_free+0x10/0x130 [ 2090.880955] dh_set_secret+0xe2/0x200 [ 2090.884757] ? dh_compute_value+0x340/0x340 [ 2090.889078] ? crypto_create_tfm+0x10f/0x2d0 [ 2090.893499] ? crypto_alloc_tfm+0x12f/0x250 [ 2090.897822] __keyctl_dh_compute+0x557/0x1350 [ 2090.902324] ? lock_downgrade+0x740/0x740 [ 2090.906476] ? dh_data_from_key+0x250/0x250 [ 2090.910795] ? get_pid_task+0xb8/0x130 [ 2090.914682] ? proc_fail_nth_write+0x7b/0x180 [ 2090.919179] ? __might_fault+0x104/0x1b0 [ 2090.923249] ? lock_acquire+0x170/0x3f0 18:36:07 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2090.927222] ? lock_downgrade+0x740/0x740 [ 2090.931381] ? __might_fault+0x177/0x1b0 [ 2090.935440] keyctl_dh_compute+0x98/0xdd [ 2090.939500] ? __keyctl_dh_compute+0x1350/0x1350 [ 2090.944249] ? vfs_write+0x319/0x4d0 [ 2090.947963] ? SyS_write+0x14d/0x210 [ 2090.951671] ? SyS_read+0x210/0x210 [ 2090.955297] SyS_keyctl+0xe0/0x390 [ 2090.958852] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 2090.963781] do_syscall_64+0x1d5/0x640 [ 2090.967672] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2090.972854] RIP: 0033:0x45e149 18:36:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x9, @empty, 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r1}}, 0x30) [ 2090.976036] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 2090.983740] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 [ 2090.991006] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 [ 2090.998272] RBP: 00007ff23c854ca0 R08: 0000000020000100 R09: 0000000000000000 [ 2091.005536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 2091.012801] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c 18:36:07 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:08 executing program 2 (fault-call:2 fault-nth:9): r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:08 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x434, 0x15, 0x100, 0x70bd29, 0x25dfdbfb, {0x5, 0xbb}, [@INET_DIAG_REQ_BYTECODE={0x5, 0x1, "db"}, @INET_DIAG_REQ_BYTECODE={0x12, 0x1, "6355df0a57cfaaa12cfe89804a13"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "a43f93cc0e85ffc43580318e783e2acfb6be690c650315bac5f403928104faf074bad9c08afdf7de009579a0a4181f49f7a5e0f1115ffe1c4cad978bd9499090251c443dc1afe8ad1a8797e5bb243eb86453366c8b7686d9721d1340f3e08e7c942ff8ed05b50709657bcb4aaf02"}, @INET_DIAG_REQ_BYTECODE={0xdd, 0x1, "76cd0cbfd4b8d10645b2767e8536c79a5d1e5578871884cfa4309a6ce215ec8275dcb4ca5f21da3b465483a4b33e0c3a9014a6fb5134a9736afeab3f7026c6ba3d997992e4e4e9c24bd13433364bc1c526b08938da487fa5f889e99126d4cbaa28a6e14ab7bf2c2ff8d0329b5a5db8ac9bef2645cfca1c1313f59b659fa612dcccbed6a71646db1c8813cd709a01fb99c20bca43de63f08d3336c19a6aa9e5c10c146d0147ad78aba133a1ef61937dc5cc3b8b4a73ee95c64b4b1d4ec35d367fefd33dc83bd794c14dd9471ddee0b3ae64d82a5d01ad29a0ff"}, @INET_DIAG_REQ_BYTECODE={0x40, 0x1, "f591fa0715cbbdd53b9f150ec73c3be2e2884ecbbf449f97f44e8b2a39e562fc6a36ba88f691c54d3ef553159bea44f533c13aac8c0385edfec57fe7"}, @INET_DIAG_REQ_BYTECODE={0xd8, 0x1, "291bd904e46a680cd3a873404d63bba9b0c22c92026a94591bc2437884ec93b69f5b649260a5fa149b8f3473da986809a551ef5199b216bbe1b5bb539b8f30332b0b7ef10b260e2560bfafb5e5935c45a003f70e8670028bf911c2d052736d76ee8c79d7166ed700e84c4bdb0073a6295f77f02696f067e1e706a79bf75d75ebc0fa3764f96161a041827a3a96da0595cf1693105d444ab0e77c7d3a88d4710ea62dde29e9c0820c78fd207fbf17385a8b8f1fdcffe6f7172ce49fed8982dfaced59747099ad04d86fe2f1d307f94a7a90be3d96"}, @INET_DIAG_REQ_BYTECODE={0xe8, 0x1, "c485a54848e69d0890b4483118f9487c9ff4be2287672e98888b0a66f256159d0d41ca360792c056f9399a11c747560f0cad1d303ed0bdd736609cc9268c4a8b0cc776b9ef322f8a3449a5435d74e79857727071f249bda9c0e05eaa54fd5cf67dd066b30e35156525a8229ff8c8325f3bf21a36ed4e89a4939675daca3ec0cca1c4a2680839fa6b6219e9c2b6560e9ec501dd8c03821de9dead818ad9d6ac28bd71a1bab13fa2f15bd510583b38151b3cf25dbc842675f9d47fe39f5aea89d3a94e064003ab761ace533c8c3d1be383d6dbf2356f6035ebfca845fdd377a7dd9dc6919b"}, @INET_DIAG_REQ_BYTECODE={0x6a, 0x1, "b71c6e0ae49c7ea1e92344eb763037d76126e03a990a4c9ab9c8065fe89106eb0ea8ec811bba4657036a148372e77b7e490f7d6316963ffc2b3e125ba5f6d46020ccb3cb9e337beef5789bdfbc1d58a6633a103b94e9833aea12c139d7d2a2f336d7693b9a12"}, @INET_DIAG_REQ_BYTECODE={0x41, 0x1, "fdefced3e09a91e99f207db96fdaa8acd2b33b852d9ca0a813f8e0c2c5997549e1a268ab95216577afc3382d6f3c0a176a62a87801dde69de6330def28"}]}, 0x434}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 18:36:08 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000540)={'syz', 0x3}, &(0x7f0000000580)="3f259e41b25467a9c7f85ebcbd1e5d0666ef57a1f5702ef906d4e3a5238af60fb11a1624a09562247bff30b2a64802b58ace22fadd00893997bff4a7ea59a75f0bdc02660709a299a54b3cf1be59cd19d8a79a84c2d37d86d2b1aa34c928f83e4848f510225cc61d649de2bab98bb0b6b1c0725a00d1ae0cf49488abda59386a7a0e9dee68", 0x85, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xbeb, 0x0, 0x0, 0x0, 0x4}, [@exit, @alu={0x7, 0x0, 0x1, 0x0, 0xa, 0x80, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @alu={0x7, 0x1, 0xb, 0x8, 0x8, 0xffffffffffffffe0, 0xc}, @exit, @alu={0x7, 0x0, 0x4, 0x7, 0x8, 0xfffffffffffffffc, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x78}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000000140)='syzkaller\x00', 0x3f, 0x1f, &(0x7f00000002c0)=""/31, 0x40f00, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x9, 0xbda}, 0x10}, 0x78) 18:36:08 executing program 3: r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000380)="e95d5af51a7469a6d05c134bd8eb687bf61a70f507352e5f649d8c317e516784bc31b5ffdf8f17a705cbe49e0362a47e19a905a0dee9a78879c470807d3a0c8016e49a069ef1eea144bac12964d1b2f49f6f9c3c1281e4bfac041feed613b3b65f3167e95e0a3d93be756b4a9fb3efa10ae9419104e6e273fb84180c4fb7b364b62a9190", 0x84, 0xfffffffffffffffe) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000440)={0x1, @null, @bpq0='bpq0\x00', 0x71, 'syz0\x00', @bcast, 0x80, 0x6, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x24, r4, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x38, r4, 0x300, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xf8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20040800}, 0x8000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x200001, 0x0) r5 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r5, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:08 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2091.199400] FAULT_INJECTION: forcing a failure. [ 2091.199400] name failslab, interval 1, probability 0, space 0, times 0 18:36:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0xfffffffffffffffc, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xfd}, 0x22}, r1}}, 0x30) 18:36:08 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:08 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r0, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'michael_mic-generic\x00'}}) [ 2091.262868] CPU: 0 PID: 25559 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2091.270783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2091.280152] Call Trace: [ 2091.282750] dump_stack+0x1b2/0x283 [ 2091.286385] should_fail.cold+0x10a/0x154 [ 2091.290535] should_failslab+0xd6/0x130 [ 2091.294511] __kmalloc+0x2c1/0x400 [ 2091.298049] ? mpi_alloc_limb_space+0x25/0x50 [ 2091.302545] mpi_alloc_limb_space+0x25/0x50 [ 2091.306862] mpi_alloc+0x19a/0x240 18:36:08 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2091.310396] mpi_read_raw_data+0xac/0x370 [ 2091.314547] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2091.319988] ? mpi_free+0x10/0x130 [ 2091.323526] dh_set_secret+0xe2/0x200 [ 2091.327326] ? dh_compute_value+0x340/0x340 [ 2091.331645] ? crypto_create_tfm+0x10f/0x2d0 [ 2091.336052] ? crypto_alloc_tfm+0x12f/0x250 [ 2091.340373] __keyctl_dh_compute+0x557/0x1350 [ 2091.344872] ? lock_downgrade+0x740/0x740 [ 2091.349024] ? dh_data_from_key+0x250/0x250 [ 2091.353345] ? get_pid_task+0xb8/0x130 [ 2091.357233] ? proc_fail_nth_write+0x7b/0x180 [ 2091.361738] ? __might_fault+0x104/0x1b0 [ 2091.365805] ? lock_acquire+0x170/0x3f0 [ 2091.369774] ? lock_downgrade+0x740/0x740 [ 2091.373947] ? __might_fault+0x177/0x1b0 [ 2091.378010] keyctl_dh_compute+0x98/0xdd [ 2091.382075] ? __keyctl_dh_compute+0x1350/0x1350 [ 2091.386832] ? vfs_write+0x319/0x4d0 [ 2091.390549] ? SyS_write+0x14d/0x210 [ 2091.394260] ? SyS_read+0x210/0x210 [ 2091.397885] SyS_keyctl+0xe0/0x390 [ 2091.401421] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 2091.406347] do_syscall_64+0x1d5/0x640 [ 2091.410237] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2091.415420] RIP: 0033:0x45e149 [ 2091.418688] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 2091.426394] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 [ 2091.433661] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 [ 2091.440929] RBP: 00007ff23c854ca0 R08: 0000000020000100 R09: 0000000000000000 [ 2091.448195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 2091.455463] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c 18:36:08 executing program 2 (fault-call:2 fault-nth:10): r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:08 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:08 executing program 0: openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000000680)) r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000080)={0x3ff, 0x0, 0x4, 0x9, 0x2bc8, 0x1, 0x81}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000140)) r3 = syz_open_dev$char_raw(&(0x7f0000000140)='/dev/raw/raw#\x00', 0x0, 0xb02) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000080)={0xf, 0x8}, 0xfffffe49) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:08 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000380)={0x8, 0x120, 0xfa00, {0x2, {0x90, 0xf0d, "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", 0x4, 0x80, 0x3f, 0x3f, 0x8, 0x8, 0xaf, 0x1}}}, 0x128) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000004c0)={0x12, 0x10, 0xfa00, {&(0x7f00000002c0), 0xffffffffffffffff, r3}}, 0x18) 18:36:08 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) ioctl$CHAR_RAW_ROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000140)) r2 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="b22968ab8a0bb5f277edb726e37f1ca85cd4c949f9e368ab8143f6f9181a1ff60670d9baffc276d75e5320331923c0905db362329a1f0296472d86cdeac15a281a1378d962eabc3a7c4cd36daad3c859b840e8377ee011b2f6c67fe3fdfef2d2ba610e2709a72ab491c1d7ab0d7bafba28173bc9f8872df6708409e91880fe2c3d8f7e0dde99cf15572a78594d5d50a9a568255f430a1ef7242efffeb32c09b22b8da93a8331144a66a51ee0b8e252bd40380f6a54b349809eecb55187fa", 0xbe, 0xfffffffffffffffb) r3 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r3}, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000480)={r0, r2, r3}, &(0x7f00000004c0)=""/204, 0xcc, &(0x7f0000000700)={&(0x7f00000005c0)={'sha384-avx2\x00'}, &(0x7f0000000600)="7d15efec67cc0eee2d6d4f9d45174293ae43d9be881da0422831ec30c3a199b1183245bad360be313ef6ae23d21ebd77cf7c4252d10338e09f7b2fbf61aff39bee863fd86096ec9f39ea3edce503c9f59aeba6def195d59c0666195045f0d92f6951db09a6b0e7131f5165c7a2c5d39d2918cb676cfb81a299a0215230736b25c04543b28c182dd9d8b94fdc05c6c024ad54ba23798fc513463d0be2718eb8b68036efd152373b568d5ce349a3aa018fd46fd15d084a2ee518eddeb0f150f78887e4079c6443", 0xc6}) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) [ 2091.533560] FAULT_INJECTION: forcing a failure. [ 2091.533560] name failslab, interval 1, probability 0, space 0, times 0 [ 2091.562486] CPU: 0 PID: 25596 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2091.570396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2091.579746] Call Trace: 18:36:08 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) [ 2091.582339] dump_stack+0x1b2/0x283 [ 2091.585973] should_fail.cold+0x10a/0x154 [ 2091.590143] should_failslab+0xd6/0x130 [ 2091.594120] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2091.598792] mpi_alloc+0x43/0x240 [ 2091.602248] mpi_read_raw_data+0xac/0x370 [ 2091.606397] dh_set_secret+0x114/0x200 [ 2091.610285] ? dh_compute_value+0x340/0x340 [ 2091.614603] ? crypto_create_tfm+0x10f/0x2d0 [ 2091.619009] ? crypto_alloc_tfm+0x12f/0x250 [ 2091.623333] __keyctl_dh_compute+0x557/0x1350 [ 2091.627829] ? lock_downgrade+0x740/0x740 18:36:08 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000380)={{0x3, @null}, [@rose, @default, @default, @bcast, @rose, @rose, @netrom, @bcast]}, &(0x7f0000000140)=0x48, 0x80800) sendto$netrom(r1, &(0x7f0000000400)="188605f7c1113e39338a1d35c88f929ded3297bc5e3e758cf11adf7605d9153f6b426f71fd594db04a0c6ea3c20ca515d67465e0605a88441a5ec4a376b90814deefddbee16754fdfd3c15d06034f789427f5c774476293bcccc273d55b03c107bcae3ea12347ee15b4dd2805f93b4fecd9e3767cb113d39c0ed3be20d53a58e8d0741b1335817ba76696ccf8d8198610c81fb51e3", 0x95, 0x20000091, &(0x7f00000004c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r2, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) [ 2091.631976] ? dh_data_from_key+0x250/0x250 [ 2091.636291] ? get_pid_task+0xb8/0x130 [ 2091.640179] ? proc_fail_nth_write+0x7b/0x180 [ 2091.644677] ? __might_fault+0x104/0x1b0 [ 2091.648737] ? lock_acquire+0x170/0x3f0 [ 2091.652713] ? lock_downgrade+0x740/0x740 [ 2091.656879] ? __might_fault+0x177/0x1b0 [ 2091.660939] keyctl_dh_compute+0x98/0xdd [ 2091.665001] ? __keyctl_dh_compute+0x1350/0x1350 [ 2091.669751] ? vfs_write+0x319/0x4d0 [ 2091.673468] ? SyS_write+0x14d/0x210 [ 2091.677176] ? SyS_read+0x210/0x210 [ 2091.680975] SyS_keyctl+0xe0/0x390 [ 2091.684512] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 2091.689442] do_syscall_64+0x1d5/0x640 [ 2091.693332] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2091.698513] RIP: 0033:0x45e149 [ 2091.701698] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 2091.709414] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 [ 2091.716677] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 [ 2091.724116] RBP: 00007ff23c854ca0 R08: 0000000020000100 R09: 0000000000000000 18:36:08 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839fa000000000000ffff05814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8dd0f8595d7c0664aa6ce1c756ab6c4c36fdf97389e879d2c447833ccdb0e76585478e40c6e6c800cc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab600"/209, 0xd1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000380)="728aa04c876909e2242f6e90608dfc614d09c30c3ec9006322243933ade467538786addd5938b3d03a2e71ef915270dce88b0e9812e3f5cb8917acc5b4b8ab1c8a27752a08722209f6224adea52e94afff54751597203357b1ba198f78f2042436ae37f110e474bd2965ddbc416fc1b175e98e01455be6b70a6370fc6426", 0x7e, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='memory.high\x00', 0x2, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r1}, 0x0, 0xfffffdd5, &(0x7f0000000100)={&(0x7f0000000400)={'sha224\x00'}}) [ 2091.731379] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a [ 2091.738857] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c 18:36:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 18:36:08 executing program 3: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580)='l2tp\x00') sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x40, r0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0xc0100, 0x0) r3 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r3}, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000380)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7f348bb69c197e977682b787c6fe229600d41bb34e02472d4c6c5839ce5054a2b66acf3e8f04676162cc9a8de2f8595d7c0664aa6ce1c756ab64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860edb5290000460cc68f5b010930000000006a7406bbdbd73dd4c8838c7e6c99477926250d66704a6d15a4e41e36c36efab4ceaa5f2f394a808e240ce83ab6d281e7954d77c1693ebc244a976496eda1", 0x125, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000300)={r1, r4, r1}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000500)={0x4, 0x8, 0xfa00, {r6, 0x7}}, 0x10) [ 2091.792670] kauditd_printk_skb: 18 callbacks suppressed [ 2091.792676] audit: type=1400 audit(1608921368.650:497): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=25603 comm="syz-executor.1" 18:36:08 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:08 executing program 2 (fault-call:2 fault-nth:11): r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x3c, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x3f}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x10001}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}]}, 0x3c}}, 0x4000800) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r2}}, 0x30) 18:36:08 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 18:36:08 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2091.926930] FAULT_INJECTION: forcing a failure. [ 2091.926930] name failslab, interval 1, probability 0, space 0, times 0 18:36:08 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2091.989141] CPU: 0 PID: 25641 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2091.997054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2092.006406] Call Trace: [ 2092.009003] dump_stack+0x1b2/0x283 [ 2092.012634] should_fail.cold+0x10a/0x154 [ 2092.016790] should_failslab+0xd6/0x130 [ 2092.020765] __kmalloc+0x2c1/0x400 [ 2092.024303] ? mpi_alloc_limb_space+0x25/0x50 [ 2092.028803] mpi_alloc_limb_space+0x25/0x50 [ 2092.033126] mpi_alloc+0x19a/0x240 18:36:08 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2092.036664] mpi_read_raw_data+0xac/0x370 [ 2092.040813] dh_set_secret+0x114/0x200 [ 2092.044699] ? dh_compute_value+0x340/0x340 [ 2092.049023] ? crypto_create_tfm+0x10f/0x2d0 [ 2092.053431] ? crypto_alloc_tfm+0x12f/0x250 [ 2092.057760] __keyctl_dh_compute+0x557/0x1350 [ 2092.062253] ? lock_downgrade+0x740/0x740 [ 2092.066398] ? dh_data_from_key+0x250/0x250 [ 2092.070711] ? get_pid_task+0xb8/0x130 [ 2092.074597] ? proc_fail_nth_write+0x7b/0x180 [ 2092.079092] ? __might_fault+0x104/0x1b0 [ 2092.083152] ? lock_acquire+0x170/0x3f0 [ 2092.087122] ? lock_downgrade+0x740/0x740 [ 2092.091271] ? __might_fault+0x177/0x1b0 [ 2092.095335] keyctl_dh_compute+0x98/0xdd [ 2092.099395] ? __keyctl_dh_compute+0x1350/0x1350 [ 2092.104146] ? vfs_write+0x319/0x4d0 [ 2092.107861] ? SyS_write+0x14d/0x210 [ 2092.111573] ? SyS_read+0x210/0x210 [ 2092.115632] SyS_keyctl+0xe0/0x390 [ 2092.119166] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 2092.124092] do_syscall_64+0x1d5/0x640 [ 2092.127984] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2092.133167] RIP: 0033:0x45e149 18:36:09 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000480)={'ip_vti0\x00', &(0x7f0000000400)={'syztnl1\x00', 0x0, 0x1, 0x8, 0xfffffff7, 0x3, {{0x15, 0x4, 0x0, 0x33, 0x54, 0x64, 0x0, 0x0, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x27}, @dev={0xac, 0x14, 0x14, 0x18}, {[@rr={0x7, 0x7, 0x80, [@empty]}, @timestamp_prespec={0x44, 0x24, 0x82, 0x3, 0x2, [{@broadcast}, {@broadcast, 0x2}, {@empty, 0x18}, {@empty, 0xe90}]}, @cipso={0x86, 0xd, 0x1, [{0x6, 0x2}, {0x2, 0x5, "a0637b"}]}, @noop, @ra={0x94, 0x4}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000005c0)={'gretap0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0x80, 0x1, 0x7ff, 0x1, {{0xc, 0x4, 0x3, 0x1, 0x30, 0x64, 0x0, 0x0, 0x4, 0x0, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_addr={0x44, 0x1c, 0xfb, 0x1, 0x0, [{@private=0xa010102, 0x200}, {@multicast1, 0x1}, {@broadcast, 0x2}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000680)={'tunl0\x00', 0x0, 0x20, 0x8, 0x5, 0x1, {{0x2e, 0x4, 0x2, 0x3, 0xb8, 0x67, 0x0, 0x6, 0x2f, 0x0, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@noop, @timestamp={0x44, 0x20, 0x3c, 0x0, 0x2, [0x4, 0x0, 0x8, 0xd38, 0x7fff, 0x5, 0x3]}, @ssrr={0x89, 0xb, 0xde, [@remote, @rand_addr=0x64010101]}, @rr={0x7, 0x23, 0xe5, [@empty, @multicast1, @empty, @multicast2, @loopback, @dev={0xac, 0x14, 0x14, 0x23}, @private=0xa010101, @local]}, @timestamp_addr={0x44, 0x14, 0x73, 0x1, 0x7, [{@loopback, 0x3f}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x7ff}]}, @timestamp_addr={0x44, 0x24, 0xc7, 0x1, 0x1, [{@empty, 0xbbac}, {@remote, 0x400}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x7}, {@rand_addr=0x64010100, 0x3}]}, @noop, @timestamp_prespec={0x44, 0x1c, 0xea, 0x3, 0x2, [{@empty, 0x40}, {@dev={0xac, 0x14, 0x14, 0x31}, 0x3}, {@empty, 0x7fff}]}]}}}}}) socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000840)={'syztnl1\x00', &(0x7f00000007c0)={'gretap0\x00', 0x0, 0x40, 0x700, 0x140, 0x40, {{0xe, 0x4, 0x0, 0x1, 0x38, 0x65, 0x0, 0x2, 0x4, 0x0, @loopback, @private=0xa010101, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4, 0xeb, 0x1, 0x7}, @cipso={0x86, 0x15, 0xfffffffffffffffd, [{0x7, 0xd, "9ff9b17721b1dae0e47b14"}, {0x1, 0x2}]}]}}}}}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001380)={&(0x7f0000000880)={0xaf4, r1, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0xb0, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x40}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x401}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x12c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x200}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x1ad3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x7fff}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x220, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0xfffffffb}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x1f0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r6}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x191}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r8}, {0xcc, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x8001, 0x1f, 0xc4, 0x1429}, {0x3, 0x0, 0x8, 0x1}, {0x0, 0xf9, 0x1, 0x93}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x274, 0x2, 0x0, 0x1, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x4e9, 0xfa, 0x3, 0x9}, {0x6, 0xfa, 0x0, 0x3}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x19}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x20}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3f, 0x5, 0xffffffff}, {0x6, 0x3, 0x80, 0x7}, {0x8, 0xff, 0x9, 0x8}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x100}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x401}}}]}}]}, 0xaf4}, 0x1, 0x0, 0x0, 0x8005}, 0x15) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) r12 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r12, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:09 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000140)="0091d9a917b89480277b5efe7ed0574f844e088a53a76211edf58e32", 0x1c, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:09 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000380)}}, 0x18) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:09 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:09 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580)='l2tp\x00') sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x40, r0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0xc0100, 0x0) r3 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r3}, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000380)="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", 0x125, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000300)={r1, r4, r1}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000500)={0x4, 0x8, 0xfa00, {r6, 0x7}}, 0x10) [ 2092.136348] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 2092.144051] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 [ 2092.151313] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 [ 2092.158580] RBP: 00007ff23c854ca0 R08: 0000000020000100 R09: 0000000000000000 [ 2092.165846] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b [ 2092.173123] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c 18:36:09 executing program 2 (fault-call:2 fault-nth:12): r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:09 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:09 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'poly1305-neon\x00'}}) 18:36:09 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f00000002c0)='cpuset.mem_hardwall\x00', 0x2, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:09 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:09 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r2, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r2, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x0, @mcast1, 0x2}}}, 0x90) read$proc_mixer(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x1000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r3}}, 0x30) 18:36:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x9, @empty, 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:09 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 18:36:09 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x9, @empty, 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r1}}, 0x30) [ 2092.456287] FAULT_INJECTION: forcing a failure. [ 2092.456287] name failslab, interval 1, probability 0, space 0, times 0 18:36:09 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) [ 2092.502046] could not allocate digest TFM handle poly1305-neon [ 2092.519124] CPU: 0 PID: 25715 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2092.527023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2092.536371] Call Trace: [ 2092.538962] dump_stack+0x1b2/0x283 [ 2092.542593] should_fail.cold+0x10a/0x154 [ 2092.546743] should_failslab+0xd6/0x130 18:36:09 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video2\x00', 0x2, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) [ 2092.550717] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2092.555390] mpi_alloc+0x43/0x240 [ 2092.558847] mpi_read_raw_data+0xac/0x370 [ 2092.562998] dh_set_secret+0x14f/0x200 [ 2092.566887] ? dh_compute_value+0x340/0x340 [ 2092.571210] ? crypto_create_tfm+0x10f/0x2d0 [ 2092.575625] ? crypto_alloc_tfm+0x12f/0x250 [ 2092.579940] __keyctl_dh_compute+0x557/0x1350 [ 2092.584430] ? lock_downgrade+0x740/0x740 [ 2092.588577] ? dh_data_from_key+0x250/0x250 [ 2092.592895] ? get_pid_task+0xb8/0x130 [ 2092.596780] ? proc_fail_nth_write+0x7b/0x180 [ 2092.601280] ? __might_fault+0x104/0x1b0 [ 2092.605338] ? lock_acquire+0x170/0x3f0 [ 2092.609333] ? lock_downgrade+0x740/0x740 [ 2092.613484] ? __might_fault+0x177/0x1b0 [ 2092.614196] could not allocate digest TFM handle poly1305-neon [ 2092.617545] keyctl_dh_compute+0x98/0xdd [ 2092.617555] ? __keyctl_dh_compute+0x1350/0x1350 [ 2092.617564] ? vfs_write+0x319/0x4d0 [ 2092.617576] ? SyS_write+0x14d/0x210 [ 2092.639721] ? SyS_read+0x210/0x210 [ 2092.643357] SyS_keyctl+0xe0/0x390 [ 2092.646891] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 2092.651832] do_syscall_64+0x1d5/0x640 [ 2092.655721] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2092.660904] RIP: 0033:0x45e149 [ 2092.664088] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 2092.671791] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 [ 2092.679058] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 [ 2092.686325] RBP: 00007ff23c854ca0 R08: 0000000020000100 R09: 0000000000000000 [ 2092.693607] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c [ 2092.700871] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c 18:36:09 executing program 2 (fault-call:2 fault-nth:13): r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:09 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 18:36:09 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f00000000c0)) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r1, r2, r1}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={'sha256-arm64\x00'}}) 18:36:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x9, @empty, 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:09 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x7c, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x134, 0x12, 0x2, 0x70bd2b, 0x5, {0x1f, 0x4, 0xc1, 0x52, {0x4e21, 0x4e24, [0x2, 0x1000, 0x2, 0x3], [0x9, 0x1c9, 0x5, 0x40], 0x0, [0xdb, 0x6]}, 0x7, 0x6}, [@INET_DIAG_REQ_BYTECODE={0xe6, 0x1, "1bcd6bdc2c23c4695a7727c0f9a26d9d2ff9a588abb1a1280b014a205667fb125fdbc7902244e242e4a3facdaab4faf636cd2ee243d960ab8b0b08b1e896f179b10a281629d5c7329981746365a671e99f9e12505df82e63b3efaef182e6ec1455a5e92152e76c4f4c8fa06c1ba1b53a91d03f9ccc16508ff21e024d85bd64c351b217263e3f4153c9edfcee835ccaa5274a1f41d3f4b0936d6353689b1e05b8e946f6d17fb5e7fab4eaa4e10cb7f969cfde6584a029b32d372aa3aaf9aab8a17f157f08bc1d5db85cebd45dc857c3307772728c1475f38ed4ffa7917b9298e0b74b"}]}, 0x134}}, 0x8000) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:09 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000380)="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", 0x12f, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:09 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 18:36:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x9, @empty, 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}}}, 0x30) [ 2092.807109] FAULT_INJECTION: forcing a failure. [ 2092.807109] name failslab, interval 1, probability 0, space 0, times 0 18:36:09 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:09 executing program 3: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000140)="4470d9bccf155704c73b1675f39fb43b5f2263e4e971ec088c5fca722ac5f2d96d2614926fc0c63281bd97c2986247ee", 0x30, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000180)) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) [ 2092.854174] CPU: 0 PID: 25768 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2092.862202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2092.871555] Call Trace: [ 2092.874146] dump_stack+0x1b2/0x283 [ 2092.877782] should_fail.cold+0x10a/0x154 [ 2092.881946] should_failslab+0xd6/0x130 [ 2092.885941] __kmalloc+0x2c1/0x400 [ 2092.889479] ? mpi_alloc_limb_space+0x25/0x50 [ 2092.893976] mpi_alloc_limb_space+0x25/0x50 [ 2092.898295] mpi_alloc+0x19a/0x240 18:36:09 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) keyctl$dh_compute(0x17, &(0x7f0000000380)={r0, r1, r1}, &(0x7f00000003c0)=""/64, 0x40, &(0x7f00000004c0)={&(0x7f0000000400)={'sha3-512-ce\x00'}, &(0x7f0000000440)="8d7cf8fc55347424bead5cc3cb0aa5dd3cc9db5a558379438cb38d9f1bb39d9ba43c80d7e6608358e54202ce49ff78eb8c16bbf0c75668727df4db03046b4922a1eb3c1b39087b3b12726962420fd50fe58f14321901e45f3faf80c692293bcf069dc4a86ae6ceed9a", 0x69}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000002c0)=ANY=[@ANYBLOB="090000100200000100ffffffff0000000000000000100000205d6241230000000000000010000000"]) [ 2092.901833] mpi_read_raw_data+0xac/0x370 [ 2092.905987] dh_set_secret+0x14f/0x200 [ 2092.909878] ? dh_compute_value+0x340/0x340 [ 2092.914197] ? crypto_create_tfm+0x10f/0x2d0 [ 2092.918602] ? crypto_alloc_tfm+0x12f/0x250 [ 2092.922925] __keyctl_dh_compute+0x557/0x1350 [ 2092.927426] ? lock_downgrade+0x740/0x740 [ 2092.931576] ? dh_data_from_key+0x250/0x250 [ 2092.935892] ? get_pid_task+0xb8/0x130 [ 2092.939778] ? proc_fail_nth_write+0x7b/0x180 [ 2092.944278] ? __might_fault+0x104/0x1b0 [ 2092.948337] ? lock_acquire+0x170/0x3f0 18:36:09 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) [ 2092.952308] ? lock_downgrade+0x740/0x740 [ 2092.956462] ? __might_fault+0x177/0x1b0 [ 2092.960547] keyctl_dh_compute+0x98/0xdd [ 2092.964607] ? __keyctl_dh_compute+0x1350/0x1350 [ 2092.969360] ? vfs_write+0x319/0x4d0 [ 2092.973145] ? SyS_write+0x14d/0x210 [ 2092.976857] ? SyS_read+0x210/0x210 [ 2092.980500] SyS_keyctl+0xe0/0x390 [ 2092.984032] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 2092.988959] do_syscall_64+0x1d5/0x640 [ 2092.992850] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2092.998032] RIP: 0033:0x45e149 18:36:09 executing program 2 (fault-call:2 fault-nth:14): r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:09 executing program 1 (fault-call:1 fault-nth:0): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2093.001213] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 2093.008916] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 [ 2093.016193] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 [ 2093.023553] RBP: 00007ff23c854ca0 R08: 0000000020000100 R09: 0000000000000000 [ 2093.028702] could not allocate digest TFM handle sha256-arm64 [ 2093.030812] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000d [ 2093.030818] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c [ 2093.081664] FAULT_INJECTION: forcing a failure. [ 2093.081664] name failslab, interval 1, probability 0, space 0, times 0 [ 2093.114105] CPU: 0 PID: 25803 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2093.119436] FAULT_INJECTION: forcing a failure. [ 2093.119436] name failslab, interval 1, probability 0, space 0, times 0 [ 2093.122010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2093.122016] Call Trace: [ 2093.122032] dump_stack+0x1b2/0x283 [ 2093.122046] should_fail.cold+0x10a/0x154 [ 2093.122062] should_failslab+0xd6/0x130 [ 2093.156865] __kmalloc+0x2c1/0x400 [ 2093.160387] ? __keyctl_dh_compute+0x610/0x1350 [ 2093.165042] __keyctl_dh_compute+0x610/0x1350 [ 2093.169631] ? lock_downgrade+0x740/0x740 [ 2093.173766] ? dh_data_from_key+0x250/0x250 [ 2093.178066] ? get_pid_task+0xb8/0x130 [ 2093.181934] ? proc_fail_nth_write+0x7b/0x180 [ 2093.186439] ? __might_fault+0x104/0x1b0 [ 2093.190482] ? lock_acquire+0x170/0x3f0 [ 2093.194455] ? lock_downgrade+0x740/0x740 [ 2093.198588] ? __might_fault+0x177/0x1b0 [ 2093.202632] keyctl_dh_compute+0x98/0xdd [ 2093.206677] ? __keyctl_dh_compute+0x1350/0x1350 [ 2093.211412] ? vfs_write+0x319/0x4d0 [ 2093.215111] ? SyS_write+0x14d/0x210 [ 2093.218825] ? SyS_read+0x210/0x210 [ 2093.222441] SyS_keyctl+0xe0/0x390 [ 2093.226004] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 2093.230914] do_syscall_64+0x1d5/0x640 [ 2093.234792] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2093.239980] RIP: 0033:0x45e149 [ 2093.243174] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 2093.250864] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 [ 2093.258128] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 [ 2093.265383] RBP: 00007ff23c854ca0 R08: 0000000020000100 R09: 0000000000000000 [ 2093.272644] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000e [ 2093.279897] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c [ 2093.287169] CPU: 1 PID: 25810 Comm: syz-executor.1 Not tainted 4.14.212-syzkaller #0 [ 2093.295053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2093.304402] Call Trace: [ 2093.307000] dump_stack+0x1b2/0x283 [ 2093.310628] should_fail.cold+0x10a/0x154 [ 2093.314794] should_failslab+0xd6/0x130 [ 2093.318769] __kmalloc_track_caller+0x2bc/0x400 [ 2093.323543] ? proc_pid_attr_write+0xfe/0x280 [ 2093.328039] memdup_user+0x22/0xa0 [ 2093.331574] proc_pid_attr_write+0xfe/0x280 [ 2093.335898] __vfs_write+0xe4/0x630 [ 2093.339520] ? proc_pid_wchan+0xf0/0xf0 [ 2093.343493] ? debug_check_no_obj_freed+0x2c0/0x674 [ 2093.348510] ? kernel_read+0x110/0x110 [ 2093.352407] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2093.357857] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2093.362868] vfs_write+0x17f/0x4d0 [ 2093.366396] SyS_write+0xf2/0x210 [ 2093.369836] ? SyS_read+0x210/0x210 [ 2093.373438] ? SyS_clock_settime+0x1a0/0x1a0 [ 2093.377864] ? do_syscall_64+0x4c/0x640 [ 2093.381815] ? SyS_read+0x210/0x210 [ 2093.385420] do_syscall_64+0x1d5/0x640 [ 2093.389301] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2093.394469] RIP: 0033:0x45e149 [ 2093.397637] RSP: 002b:00007ff95584bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2093.405363] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e149 [ 2093.412618] RDX: 000000000000000a RSI: 0000000020001800 RDI: 0000000000000003 [ 2093.419875] RBP: 00007ff95584bca0 R08: 0000000000000000 R09: 0000000000000000 18:36:10 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000140)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) prctl$PR_SVE_SET_VL(0x32, 0x2a6e8) 18:36:10 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x9, @empty, 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}}}, 0x30) 18:36:10 executing program 2 (fault-call:2 fault-nth:15): r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:10 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x4}, 0x22}, r1}}, 0x30) 18:36:10 executing program 1 (fault-call:1 fault-nth:1): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2093.427128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2093.434384] R13: 00007ffd133da99f R14: 00007ff95584c9c0 R15: 000000000119bf8c 18:36:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x9, @empty, 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}}}, 0x30) [ 2093.488048] FAULT_INJECTION: forcing a failure. [ 2093.488048] name failslab, interval 1, probability 0, space 0, times 0 [ 2093.533998] CPU: 1 PID: 25824 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2093.541908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2093.551260] Call Trace: [ 2093.553863] dump_stack+0x1b2/0x283 [ 2093.557496] should_fail.cold+0x10a/0x154 [ 2093.561644] should_failslab+0xd6/0x130 [ 2093.565620] __kmalloc+0x2c1/0x400 [ 2093.569159] ? __keyctl_dh_compute+0x69e/0x1350 [ 2093.573824] ? sg_init_one+0xc0/0x170 [ 2093.577623] __keyctl_dh_compute+0x69e/0x1350 [ 2093.582120] ? lock_downgrade+0x740/0x740 [ 2093.586271] ? dh_data_from_key+0x250/0x250 [ 2093.590587] ? get_pid_task+0xb8/0x130 [ 2093.594473] ? proc_fail_nth_write+0x7b/0x180 [ 2093.598990] ? lock_acquire+0x170/0x3f0 [ 2093.602959] ? lock_downgrade+0x740/0x740 [ 2093.605142] FAULT_INJECTION: forcing a failure. [ 2093.605142] name failslab, interval 1, probability 0, space 0, times 0 [ 2093.607108] ? __might_fault+0x177/0x1b0 [ 2093.607123] keyctl_dh_compute+0x98/0xdd [ 2093.607133] ? __keyctl_dh_compute+0x1350/0x1350 [ 2093.607140] ? vfs_write+0x319/0x4d0 [ 2093.607153] ? SyS_write+0x14d/0x210 [ 2093.638544] ? SyS_read+0x210/0x210 [ 2093.642171] SyS_keyctl+0xe0/0x390 [ 2093.645701] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 2093.650639] do_syscall_64+0x1d5/0x640 [ 2093.654517] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2093.659687] RIP: 0033:0x45e149 [ 2093.662857] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 2093.670553] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 18:36:10 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='memory.swap.max\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x3}, 0x22}, r1}}, 0x30) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x0, 0x1, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010101}, @L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x2404c891}, 0x4004) ioctl$CHAR_RAW_IOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000040)) 18:36:10 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, 0x0, 0x0, 0x0, &(0x7f0000000740)={0x2, 0x0, @local}, 0x10) recvfrom$l2tp(r0, &(0x7f0000000340)=""/215, 0xd7, 0x40012141, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000300), 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r1}}, 0x30) [ 2093.677817] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 [ 2093.685076] RBP: 00007ff23c854ca0 R08: 0000000020000100 R09: 0000000000000000 [ 2093.692328] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000f [ 2093.699580] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c [ 2093.706850] CPU: 0 PID: 25837 Comm: syz-executor.1 Not tainted 4.14.212-syzkaller #0 [ 2093.714736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2093.724087] Call Trace: [ 2093.726671] dump_stack+0x1b2/0x283 [ 2093.730305] should_fail.cold+0x10a/0x154 18:36:10 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5ada369b08f412d0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000380)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x55, @dev={0xfe, 0x80, [], 0x39}, 0x10000}, r2}}, 0x30) [ 2093.734454] should_failslab+0xd6/0x130 [ 2093.738429] kmem_cache_alloc+0x40/0x3c0 [ 2093.742492] audit_log_start.part.0+0x20e/0x650 [ 2093.747164] ? kauditd_thread+0x630/0x630 [ 2093.751308] ? audit_filter+0x2a6/0x960 [ 2093.755285] ? audit_compare_dname_path+0x90/0x90 [ 2093.760130] ? __aafs_ns_mkdir.cold+0xa2/0xa2 [ 2093.764623] audit_log_start+0x45/0x70 [ 2093.768508] ? audit_file_mask+0x110/0x110 [ 2093.772744] common_lsm_audit+0xb2/0x19e0 [ 2093.776893] ? ipv6_skb_to_auditdata+0xcb0/0xcb0 18:36:10 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r0}}, 0x30) 18:36:10 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r2}, 0x0, 0x0, 0x0) r3 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r3}, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r3}, 0x0, 0x17, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x278) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000140)={@my=0x0}) [ 2093.781647] ? aa_lookupn_ns+0xfe/0x190 [ 2093.785621] aa_audit+0x1cb/0x61b [ 2093.789068] ? audit_file_mask+0x110/0x110 [ 2093.793298] aa_audit_file+0x2c0/0x540 [ 2093.797200] ? file_audit_cb+0x640/0x640 [ 2093.801259] ? aa_label_parse+0x50e/0xa20 [ 2093.805412] ? lock_acquire+0x170/0x3f0 [ 2093.809388] aa_change_profile+0xcc9/0x2420 [ 2093.813715] ? trace_hardirqs_on+0x10/0x10 [ 2093.817947] ? aa_change_hat+0xf40/0xf40 [ 2093.822002] ? depot_save_stack+0x10d/0x3e3 [ 2093.826328] ? __lock_acquire+0x5fc/0x3f20 [ 2093.830568] ? do_syscall_64+0x1d5/0x640 18:36:10 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r0}}, 0x30) [ 2093.834632] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2093.839993] ? __lock_acquire+0x5fc/0x3f20 [ 2093.844236] apparmor_setprocattr+0x972/0xa80 [ 2093.853943] ? apparmor_cred_free+0x70/0x70 [ 2093.858265] ? proc_pid_attr_write+0x152/0x280 [ 2093.862854] ? __might_fault+0x177/0x1b0 [ 2093.866915] security_setprocattr+0x74/0xb0 [ 2093.871240] proc_pid_attr_write+0x1bd/0x280 [ 2093.875648] __vfs_write+0xe4/0x630 [ 2093.879267] ? proc_pid_wchan+0xf0/0xf0 18:36:10 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="00d9a917a694800f7b5efe7ed0574f844e00", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f0000000580)) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000000)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x80000, 0x0) ioctl$CHAR_RAW_REPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000380)={0x1ff, 0x4, 0x0, [{0x5, 0x41, 0x7ff, 0x40, 0x1, 0x3, 0x4b}, {0x0, 0x0, 0x3891, 0x0, 0x8, 0x4, 0x3f}, {0x7, 0x70, 0x3ee, 0xff, 0xe1, 0xd0, 0x1}, {0x1f, 0x8, 0x9, 0x1, 0x8, 0x2, 0x8}]}) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) [ 2093.883238] ? debug_check_no_obj_freed+0x2c0/0x674 [ 2093.888257] ? kernel_read+0x110/0x110 [ 2093.892154] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2093.897611] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2093.902627] vfs_write+0x17f/0x4d0 [ 2093.906170] SyS_write+0xf2/0x210 [ 2093.909618] ? SyS_read+0x210/0x210 [ 2093.913240] ? SyS_clock_settime+0x1a0/0x1a0 [ 2093.918082] ? do_syscall_64+0x4c/0x640 [ 2093.922059] ? SyS_read+0x210/0x210 [ 2093.925688] do_syscall_64+0x1d5/0x640 [ 2093.929586] entry_SYSCALL_64_after_hwframe+0x46/0xbb 18:36:10 executing program 2 (fault-call:2 fault-nth:16): r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:10 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r0}}, 0x30) [ 2093.934768] RIP: 0033:0x45e149 [ 2093.937984] RSP: 002b:00007ff95584bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2093.945685] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e149 [ 2093.952949] RDX: 000000000000000a RSI: 0000000020001800 RDI: 0000000000000003 [ 2093.960214] RBP: 00007ff95584bca0 R08: 0000000000000000 R09: 0000000000000000 [ 2093.967477] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2093.974741] R13: 00007ffd133da99f R14: 00007ff95584c9c0 R15: 000000000119bf8c [ 2094.034398] audit: audit_lost=7 audit_rate_limit=0 audit_backlog_limit=64 [ 2094.042160] FAULT_INJECTION: forcing a failure. [ 2094.042160] name failslab, interval 1, probability 0, space 0, times 0 [ 2094.054578] audit: out of memory in audit_log_start [ 2094.060784] CPU: 0 PID: 25875 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2094.068666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2094.078037] Call Trace: [ 2094.080622] dump_stack+0x1b2/0x283 [ 2094.084254] should_fail.cold+0x10a/0x154 [ 2094.088406] should_failslab+0xd6/0x130 [ 2094.092382] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2094.097050] mpi_alloc+0x43/0x240 [ 2094.100505] dh_compute_value+0x76/0x340 [ 2094.104571] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2094.110018] ? dh_exit_tfm+0x20/0x20 [ 2094.113739] ? __lockdep_init_map+0x100/0x560 [ 2094.118226] __keyctl_dh_compute+0x89b/0x1350 [ 2094.122705] ? dh_data_from_key+0x250/0x250 [ 2094.127005] ? get_pid_task+0xb8/0x130 [ 2094.130870] ? proc_fail_nth_write+0x7b/0x180 [ 2094.135347] ? lock_acquire+0x170/0x3f0 [ 2094.139303] ? __might_fault+0x177/0x1b0 [ 2094.143394] keyctl_dh_compute+0x98/0xdd [ 2094.147440] ? __keyctl_dh_compute+0x1350/0x1350 [ 2094.152172] ? vfs_write+0x319/0x4d0 [ 2094.155912] ? SyS_write+0x14d/0x210 [ 2094.159601] ? SyS_read+0x210/0x210 [ 2094.163253] SyS_keyctl+0xe0/0x390 [ 2094.166771] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 2094.171679] do_syscall_64+0x1d5/0x640 [ 2094.175554] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2094.180723] RIP: 0033:0x45e149 18:36:11 executing program 1 (fault-call:1 fault-nth:2): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}}}, 0x30) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x9e6339cddee7a3f4, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000480)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), r2, 0x2}}, 0x18) socket$l2tp6(0xa, 0x2, 0x73) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r5 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000540)={{0x3, @default}, [@null, @default, @remote, @bcast, @rose, @rose, @default, @rose]}, &(0x7f00000005c0)=0x48, 0x80800) accept$netrom(r5, &(0x7f0000000780)={{0x3, @netrom}, [@null, @remote, @remote, @rose, @bcast, @netrom, @rose, @rose]}, &(0x7f0000000600)=0x48) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r4, @ANYRES16=0x0, @ANYBLOB="00022dbd7000fcdbdf250800000008000b000100000008000a000100000006001d004000000014800800766c616e310020000000000000000000080018007f000001"], 0x48}}, 0x48c0) 18:36:11 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000002c0)="0091d9", 0x3, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:11 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) prctl$PR_MCE_KILL_GET(0x22) 18:36:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:11 executing program 2 (fault-call:2 fault-nth:17): r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) [ 2094.183887] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 2094.191575] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 [ 2094.198881] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 [ 2094.206127] RBP: 00007ff23c854ca0 R08: 0000000020000100 R09: 0000000000000000 [ 2094.213374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 2094.220633] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c 18:36:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r1}}, 0x30) [ 2094.284400] FAULT_INJECTION: forcing a failure. [ 2094.284400] name failslab, interval 1, probability 0, space 0, times 0 [ 2094.293767] FAULT_INJECTION: forcing a failure. [ 2094.293767] name failslab, interval 1, probability 0, space 0, times 0 [ 2094.316393] CPU: 0 PID: 25895 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2094.324293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 18:36:11 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) socketpair(0x3, 0x1, 0x9, &(0x7f0000000140)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000440)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r2, 0x800, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x401}, @L2TP_ATTR_UDP_CSUM={0x5}]}, 0x2c}}, 0x0) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r3, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) [ 2094.333640] Call Trace: [ 2094.336226] dump_stack+0x1b2/0x283 [ 2094.339848] should_fail.cold+0x10a/0x154 [ 2094.343991] should_failslab+0xd6/0x130 [ 2094.347962] __kmalloc+0x2c1/0x400 [ 2094.351495] ? mpi_alloc_limb_space+0x25/0x50 [ 2094.356094] ? do_syscall_64+0x1d5/0x640 [ 2094.360156] mpi_alloc_limb_space+0x25/0x50 [ 2094.364472] mpi_powm+0x3d4/0x17a0 [ 2094.368013] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2094.373460] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2094.378602] ? fs_reclaim_release+0xd0/0x110 18:36:11 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="e1dbe69e1bb98f94aa90f98f80c5aaf5a075e6282998", 0x16, 0xfffffffffffffffc) r3 = syz_open_dev$dri(&(0x7f0000000500)='/dev/dri/card#\x00', 0x3, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000580)={0x3, &(0x7f0000000540)=[{0x0}, {}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f00000005c0)={r4, 0x3}) keyctl$dh_compute(0x17, &(0x7f0000000300)={r2, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)={0x8}, 0x8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x10, &(0x7f00000002c0)=0xb, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000140)={0xd8, 0x400, 0xfff, 0x5af, 0x6b2}, 0x14) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f00000003c0)={0x0, 0x2, 0x10001, [], &(0x7f0000000380)=0x1}) r6 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x42001) ioctl$SCSI_IOCTL_STOP_UNIT(r6, 0x6) ioctl$SCSI_IOCTL_DOORLOCK(r6, 0x5380) [ 2094.383005] ? mpihelp_mul_karatsuba_case+0xac0/0xac0 [ 2094.388185] ? mpi_alloc+0x43/0x240 [ 2094.391810] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2094.397269] dh_compute_value+0x18f/0x340 [ 2094.401417] ? dh_exit_tfm+0x20/0x20 [ 2094.405130] ? __lockdep_init_map+0x100/0x560 [ 2094.409620] __keyctl_dh_compute+0x89b/0x1350 [ 2094.414124] ? dh_data_from_key+0x250/0x250 [ 2094.418440] ? get_pid_task+0xb8/0x130 [ 2094.422323] ? proc_fail_nth_write+0x7b/0x180 [ 2094.426816] ? lock_acquire+0x170/0x3f0 [ 2094.430791] ? __might_fault+0x177/0x1b0 [ 2094.434854] keyctl_dh_compute+0x98/0xdd [ 2094.438907] ? __keyctl_dh_compute+0x1350/0x1350 [ 2094.443653] ? vfs_write+0x319/0x4d0 [ 2094.447362] ? SyS_write+0x14d/0x210 [ 2094.451068] ? SyS_read+0x210/0x210 [ 2094.454686] SyS_keyctl+0xe0/0x390 [ 2094.458217] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 2094.463147] do_syscall_64+0x1d5/0x640 [ 2094.467038] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2094.472218] RIP: 0033:0x45e149 [ 2094.475396] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa 18:36:11 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000380)="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", 0x198, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) [ 2094.483098] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 [ 2094.490357] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 [ 2094.497612] RBP: 00007ff23c854ca0 R08: 0000000020000100 R09: 0000000000000000 [ 2094.504878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000011 [ 2094.512132] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c [ 2094.529804] CPU: 1 PID: 25890 Comm: syz-executor.1 Not tainted 4.14.212-syzkaller #0 [ 2094.537695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2094.547038] Call Trace: [ 2094.549624] dump_stack+0x1b2/0x283 [ 2094.553252] should_fail.cold+0x10a/0x154 [ 2094.557400] should_failslab+0xd6/0x130 [ 2094.561403] kmem_cache_alloc_node+0x54/0x410 [ 2094.565899] __alloc_skb+0x5c/0x510 [ 2094.569527] audit_log_start.part.0+0x233/0x650 [ 2094.574195] ? kauditd_thread+0x630/0x630 [ 2094.578341] ? audit_filter+0x2a6/0x960 [ 2094.582314] ? audit_compare_dname_path+0x90/0x90 [ 2094.587158] ? __aafs_ns_mkdir.cold+0xa2/0xa2 [ 2094.591646] audit_log_start+0x45/0x70 [ 2094.595531] ? audit_file_mask+0x110/0x110 [ 2094.599784] common_lsm_audit+0xb2/0x19e0 [ 2094.603932] ? ipv6_skb_to_auditdata+0xcb0/0xcb0 [ 2094.608686] ? aa_lookupn_ns+0xfe/0x190 [ 2094.612659] aa_audit+0x1cb/0x61b [ 2094.616106] ? audit_file_mask+0x110/0x110 [ 2094.620332] aa_audit_file+0x2c0/0x540 [ 2094.624226] ? file_audit_cb+0x640/0x640 [ 2094.628284] ? aa_label_parse+0x50e/0xa20 [ 2094.632437] ? lock_acquire+0x170/0x3f0 [ 2094.636409] aa_change_profile+0xcc9/0x2420 [ 2094.640720] ? trace_hardirqs_on+0x10/0x10 [ 2094.644946] ? aa_change_hat+0xf40/0xf40 [ 2094.649002] ? depot_save_stack+0x10d/0x3e3 [ 2094.653315] ? __lock_acquire+0x5fc/0x3f20 [ 2094.657537] ? do_syscall_64+0x1d5/0x640 [ 2094.661583] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2094.666923] ? __lock_acquire+0x5fc/0x3f20 [ 2094.671142] apparmor_setprocattr+0x972/0xa80 [ 2094.675627] ? apparmor_cred_free+0x70/0x70 [ 2094.679927] ? proc_pid_attr_write+0x152/0x280 [ 2094.684494] ? __might_fault+0x177/0x1b0 [ 2094.688535] security_setprocattr+0x74/0xb0 [ 2094.692848] proc_pid_attr_write+0x1bd/0x280 [ 2094.697344] __vfs_write+0xe4/0x630 [ 2094.700953] ? proc_pid_wchan+0xf0/0xf0 [ 2094.704906] ? debug_check_no_obj_freed+0x2c0/0x674 [ 2094.709917] ? kernel_read+0x110/0x110 [ 2094.713800] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2094.719228] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2094.724225] vfs_write+0x17f/0x4d0 [ 2094.727767] SyS_write+0xf2/0x210 [ 2094.731204] ? SyS_read+0x210/0x210 [ 2094.734855] ? SyS_clock_settime+0x1a0/0x1a0 [ 2094.739244] ? do_syscall_64+0x4c/0x640 [ 2094.743198] ? SyS_read+0x210/0x210 [ 2094.746812] do_syscall_64+0x1d5/0x640 [ 2094.750761] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2094.755935] RIP: 0033:0x45e149 [ 2094.759545] RSP: 002b:00007ff95584bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2094.767244] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e149 [ 2094.774492] RDX: 000000000000000a RSI: 0000000020001800 RDI: 0000000000000003 18:36:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x10, 0x1c, 0xffff, {{0x12, 0x4, 0x0, 0x3, 0x48, 0x64, 0x0, 0x7, 0x12, 0x0, @loopback, @multicast1, {[@ssrr={0x89, 0x7, 0xb4, [@loopback]}, @rr={0x7, 0x13, 0x6b, [@private=0xa010101, @empty, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @rr={0x7, 0xb, 0xca, [@loopback, @loopback]}, @timestamp={0x44, 0xc, 0x20, 0x0, 0x7, [0x5, 0x5dd9]}]}}}}}) sendmsg$TCPDIAG_GETSOCK(r2, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x284, 0x12, 0x100, 0x70bd2c, 0x25dfdbfe, {0x27, 0x8, 0xff, 0x3, {0x4e21, 0x4e20, [0xed, 0x0, 0xfffffff8, 0xa6], [0x80000000, 0x4, 0x3, 0x3fb], r3, [0x25, 0xfff]}, 0x5, 0xff}, [@INET_DIAG_REQ_BYTECODE={0x90, 0x1, "93ebccec787f42852d73ea67f004a48d8d5d4a0e57ac7648aca8150b859c52b5a2adacec48d4a846b4a9ff1a507f59dc1dcd36867099410b6222b84d2419ce72fb96435085f90da8901d06675179c0056e56713a7dd05a5dea014a99fe44c7ba2e2d7c2842dadf7e467672e165beb10ba2b3b1d4304d05567c735ef0b2af33f7ca872628f3de13a4da6cb3c6"}, @INET_DIAG_REQ_BYTECODE={0x47, 0x1, "65ff6308889ff70959095863808f2a2751d4ab001833072e10a62906b219833ec14a6f64288b4814b20593b312139ec1a7d4f2e6897e03eac6673891760cbd190d0576"}, @INET_DIAG_REQ_BYTECODE={0xff, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x10, 0x1, "71b943202a710a8affe9d176"}, @INET_DIAG_REQ_BYTECODE={0x50, 0x1, "6a98ed31cb5c2d59948b24d00a2c80d06c9a0964c701a0af66e0723cc2f3369249430030d357b7cb776ce8ddba23b3ff5e6375f9605763daa5b8890da6ba05d4f680e573877da89f31265344"}]}, 0x284}, 0x1, 0x0, 0x0, 0x894}, 0x400c0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) [ 2094.781790] RBP: 00007ff95584bca0 R08: 0000000000000000 R09: 0000000000000000 [ 2094.789038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2094.796421] R13: 00007ffd133da99f R14: 00007ff95584c9c0 R15: 000000000119bf8c 18:36:11 executing program 1 (fault-call:1 fault-nth:3): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:11 executing program 2 (fault-call:2 fault-nth:18): r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) [ 2094.833043] audit: audit_lost=8 audit_rate_limit=0 audit_backlog_limit=64 [ 2094.864116] audit: out of memory in audit_log_start 18:36:11 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000380)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52f14ecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d8646ca4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c7ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed00", 0xd9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x80000001, 0x100000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000001c0)=[@timestamp, @sack_perm, @sack_perm, @window={0x3, 0x7, 0x7}, @sack_perm, @timestamp, @sack_perm, @mss={0x2, 0x7fffffff}, @window={0x3, 0x4, 0x3}, @window={0x3, 0x7}], 0xa) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000002c0)) 18:36:11 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x7, 0x10, 0x38, 0x3f, {{0x1e, 0x4, 0x2, 0xb, 0x78, 0x68, 0x0, 0x3f, 0x4, 0x0, @broadcast, @empty, {[@timestamp_addr={0x44, 0x3c, 0xc9, 0x1, 0xc, [{@broadcast, 0x1000}, {@multicast2, 0x80000001}, {@multicast2, 0x4}, {@loopback, 0x9}, {@remote, 0x4}, {@remote, 0x4}, {@private=0xa010102, 0x81}]}, @end, @generic={0x82, 0x3, "0f"}, @noop, @end, @end, @generic={0x44, 0x12, "035db82f7204f3902aba49475026b1c7"}, @timestamp={0x44, 0xc, 0xdb, 0x0, 0x6, [0x0, 0x10001]}]}}}}}) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0xc0, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x84}, 0x8) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = getpid() process_vm_readv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/54, 0x36}], 0x1, &(0x7f0000000180)=[{&(0x7f0000000680)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='xprtrdma_prepsend_failed\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r1, r2, 0x0, 0xe, &(0x7f0000000100)=']-[&{,(+\'?-+\\\x00'}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r3}}, 0x30) [ 2094.949059] FAULT_INJECTION: forcing a failure. [ 2094.949059] name failslab, interval 1, probability 0, space 0, times 0 [ 2094.975052] FAULT_INJECTION: forcing a failure. [ 2094.975052] name failslab, interval 1, probability 0, space 0, times 0 [ 2095.000652] CPU: 1 PID: 25946 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2095.008546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2095.017894] Call Trace: [ 2095.020500] dump_stack+0x1b2/0x283 [ 2095.024136] should_fail.cold+0x10a/0x154 [ 2095.028291] should_failslab+0xd6/0x130 [ 2095.032271] __kmalloc+0x2c1/0x400 [ 2095.035807] ? mpi_resize+0x177/0x214 [ 2095.039608] mpi_resize+0x177/0x214 [ 2095.043235] mpi_powm+0x65a/0x17a0 [ 2095.046800] ? mpihelp_mul_karatsuba_case+0xac0/0xac0 [ 2095.051988] ? mpi_alloc+0x43/0x240 [ 2095.055621] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2095.061078] dh_compute_value+0x18f/0x340 [ 2095.065224] ? dh_exit_tfm+0x20/0x20 [ 2095.068934] ? __lockdep_init_map+0x100/0x560 [ 2095.073438] __keyctl_dh_compute+0x89b/0x1350 [ 2095.077979] ? dh_data_from_key+0x250/0x250 [ 2095.082298] ? get_pid_task+0xb8/0x130 [ 2095.086184] ? proc_fail_nth_write+0x7b/0x180 [ 2095.090687] ? lock_acquire+0x170/0x3f0 [ 2095.094661] ? __might_fault+0x177/0x1b0 [ 2095.098742] keyctl_dh_compute+0x98/0xdd [ 2095.102799] ? __keyctl_dh_compute+0x1350/0x1350 [ 2095.107543] ? vfs_write+0x319/0x4d0 [ 2095.111253] ? SyS_write+0x14d/0x210 [ 2095.114975] ? SyS_read+0x210/0x210 [ 2095.118599] SyS_keyctl+0xe0/0x390 [ 2095.122135] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 2095.127069] do_syscall_64+0x1d5/0x640 [ 2095.130953] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2095.136122] RIP: 0033:0x45e149 [ 2095.139291] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa 18:36:12 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cgroup.max.descendants\x00', 0x2, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) [ 2095.146986] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 [ 2095.154245] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 [ 2095.161497] RBP: 00007ff23c854ca0 R08: 0000000020000100 R09: 0000000000000000 [ 2095.168752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000012 [ 2095.176009] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c [ 2095.183273] CPU: 0 PID: 25947 Comm: syz-executor.1 Not tainted 4.14.212-syzkaller #0 [ 2095.191157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2095.200513] Call Trace: [ 2095.203098] dump_stack+0x1b2/0x283 [ 2095.206729] should_fail.cold+0x10a/0x154 [ 2095.210877] should_failslab+0xd6/0x130 [ 2095.214862] kmem_cache_alloc_node_trace+0x58/0x400 [ 2095.219882] __kmalloc_node_track_caller+0x38/0x70 [ 2095.224930] __alloc_skb+0x96/0x510 [ 2095.228560] audit_log_start.part.0+0x233/0x650 [ 2095.233232] ? kauditd_thread+0x630/0x630 [ 2095.237379] ? audit_filter+0x2a6/0x960 [ 2095.241355] ? audit_compare_dname_path+0x90/0x90 [ 2095.246201] ? __aafs_ns_mkdir.cold+0xa2/0xa2 18:36:12 executing program 2 (fault-call:2 fault-nth:19): r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:12 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r1}}, 0x30) [ 2095.250696] audit_log_start+0x45/0x70 [ 2095.254581] ? audit_file_mask+0x110/0x110 [ 2095.258813] common_lsm_audit+0xb2/0x19e0 [ 2095.262964] ? ipv6_skb_to_auditdata+0xcb0/0xcb0 [ 2095.267735] ? aa_lookupn_ns+0xfe/0x190 [ 2095.271711] aa_audit+0x1cb/0x61b [ 2095.275159] ? audit_file_mask+0x110/0x110 [ 2095.279400] aa_audit_file+0x2c0/0x540 [ 2095.283294] ? file_audit_cb+0x640/0x640 [ 2095.287352] ? aa_label_parse+0x50e/0xa20 [ 2095.291504] ? lock_acquire+0x170/0x3f0 [ 2095.295479] aa_change_profile+0xcc9/0x2420 18:36:12 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) r2 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1, 0x2000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000380)={0x1, &(0x7f00000002c0)=[{0x0}]}) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f00000003c0)={r3, 0x1}) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) [ 2095.299818] ? trace_hardirqs_on+0x10/0x10 [ 2095.304052] ? aa_change_hat+0xf40/0xf40 [ 2095.308109] ? depot_save_stack+0x10d/0x3e3 [ 2095.312440] ? __lock_acquire+0x5fc/0x3f20 [ 2095.316681] ? do_syscall_64+0x1d5/0x640 [ 2095.320750] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2095.324139] FAULT_INJECTION: forcing a failure. [ 2095.324139] name failslab, interval 1, probability 0, space 0, times 0 [ 2095.326109] ? __lock_acquire+0x5fc/0x3f20 [ 2095.326132] apparmor_setprocattr+0x972/0xa80 [ 2095.326144] ? apparmor_cred_free+0x70/0x70 18:36:12 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000002c0)={0x8, &(0x7f0000000140)=[{}, {}, {}, {0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000380)={r1, 0x5}) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r2, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) [ 2095.326157] ? proc_pid_attr_write+0x152/0x280 [ 2095.326175] ? __might_fault+0x177/0x1b0 [ 2095.358995] security_setprocattr+0x74/0xb0 [ 2095.363323] proc_pid_attr_write+0x1bd/0x280 [ 2095.367733] __vfs_write+0xe4/0x630 [ 2095.371360] ? proc_pid_wchan+0xf0/0xf0 [ 2095.375333] ? debug_check_no_obj_freed+0x2c0/0x674 [ 2095.380342] ? kernel_read+0x110/0x110 [ 2095.384268] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2095.389715] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2095.394724] vfs_write+0x17f/0x4d0 [ 2095.398258] SyS_write+0xf2/0x210 [ 2095.401726] ? SyS_read+0x210/0x210 [ 2095.405349] ? SyS_clock_settime+0x1a0/0x1a0 [ 2095.409752] ? do_syscall_64+0x4c/0x640 [ 2095.413720] ? SyS_read+0x210/0x210 [ 2095.417350] do_syscall_64+0x1d5/0x640 [ 2095.421237] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2095.426430] RIP: 0033:0x45e149 [ 2095.429608] RSP: 002b:00007ff95584bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2095.437307] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e149 [ 2095.444570] RDX: 000000000000000a RSI: 0000000020001800 RDI: 0000000000000003 [ 2095.451837] RBP: 00007ff95584bca0 R08: 0000000000000000 R09: 0000000000000000 [ 2095.459104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2095.466366] R13: 00007ffd133da99f R14: 00007ff95584c9c0 R15: 000000000119bf8c [ 2095.474328] CPU: 1 PID: 25976 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2095.482224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2095.491573] Call Trace: [ 2095.494157] dump_stack+0x1b2/0x283 [ 2095.497784] should_fail.cold+0x10a/0x154 [ 2095.501938] should_failslab+0xd6/0x130 [ 2095.505921] __kmalloc+0x2c1/0x400 [ 2095.509459] ? mpi_alloc_limb_space+0x25/0x50 [ 2095.513952] mpi_alloc_limb_space+0x25/0x50 [ 2095.518278] mpi_powm+0xa66/0x17a0 [ 2095.521825] ? mpihelp_mul_karatsuba_case+0xac0/0xac0 [ 2095.527010] ? mpi_alloc+0x43/0x240 [ 2095.530634] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2095.536095] dh_compute_value+0x18f/0x340 [ 2095.539732] audit: audit_lost=9 audit_rate_limit=0 audit_backlog_limit=64 [ 2095.540237] ? dh_exit_tfm+0x20/0x20 [ 2095.540248] ? __lockdep_init_map+0x100/0x560 [ 2095.540261] __keyctl_dh_compute+0x89b/0x1350 [ 2095.548683] audit: out of memory in audit_log_start [ 2095.550874] ? dh_data_from_key+0x250/0x250 [ 2095.550883] ? get_pid_task+0xb8/0x130 [ 2095.550893] ? proc_fail_nth_write+0x7b/0x180 [ 2095.577553] ? lock_acquire+0x170/0x3f0 [ 2095.581533] ? __might_fault+0x177/0x1b0 [ 2095.585607] keyctl_dh_compute+0x98/0xdd [ 2095.589685] ? __keyctl_dh_compute+0x1350/0x1350 [ 2095.594438] ? vfs_write+0x319/0x4d0 [ 2095.598248] ? SyS_write+0x14d/0x210 18:36:12 executing program 1 (fault-call:1 fault-nth:4): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:12 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f00000002c0)) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r2, 0x0, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r3, 0x0, 0x0) connect$netrom(r3, &(0x7f0000000380)={{0x3, @bcast, 0x2}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r1, r4, r1}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000140)='0', 0x1) 18:36:12 executing program 4: read$proc_mixer(0xffffffffffffffff, &(0x7f0000000380)=""/186, 0xba) r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @reserved}}) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f0000000140)={0x6, 0x29}) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) [ 2095.601960] ? SyS_read+0x210/0x210 [ 2095.605588] SyS_keyctl+0xe0/0x390 [ 2095.609124] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 2095.614052] do_syscall_64+0x1d5/0x640 [ 2095.617944] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2095.623130] RIP: 0033:0x45e149 [ 2095.626313] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 2095.634019] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e149 [ 2095.641285] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000017 18:36:12 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="fcffffff00001000000073b953069d542005d289148fbd32e9d44cb8ea3e1e3010102bae1aaa69f4ae754e3a01ab796f750a18bf7e1c5af94061923e7f677e0a304a7b54181c327bbe10cbe9ec29115fd01ad0614e36731d6e02b7adffba6ccb513ebea7490562c389823cd43edde1a700"/128], 0xa) socketpair(0x1, 0x800, 0x4, &(0x7f0000000080)) 18:36:12 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000380)="eb6ebae6462d28bd41", 0x9, 0x0) 18:36:12 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r1}}, 0x30) [ 2095.648549] RBP: 00007ff23c854ca0 R08: 0000000020000100 R09: 0000000000000000 [ 2095.655814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2095.663093] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c [ 2095.671051] audit: type=1400 audit(1608921372.491:498): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=25995 comm="syz-executor.1" 18:36:12 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r1 = getpid() process_vm_readv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/54, 0x36}], 0x1, &(0x7f0000000180)=[{&(0x7f0000000680)=""/4096, 0x1000}, {0x0}], 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001840)=@bpf_tracing={0x1a, 0x9, &(0x7f0000001680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x328b}, [@ldst={0x3, 0x0, 0x6, 0x7, 0x4, 0x50, 0xffffffffffffffff}, @exit, @generic={0x2, 0x6, 0x2, 0x9, 0x401}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x0, 0xd, 0x6, 0x4, 0xc, 0x4}, @alu={0x4, 0x1, 0x6, 0x8, 0xa, 0xfffffffffffffffc, 0xfffffffffffffffc}]}, &(0x7f0000001700)='GPL\x00', 0x5, 0x57, &(0x7f0000001740)=""/87, 0x41100, 0x0, [], 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000017c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001800)={0x3, 0xb, 0x3f69}, 0x10, 0x153b9}, 0x78) syz_open_dev$vivid(&(0x7f00000018c0)='/dev/video#\x00', 0x0, 0x2) process_vm_readv(r1, &(0x7f0000000140)=[{&(0x7f0000000380)=""/197, 0xc5}], 0x1, &(0x7f0000001540)=[{&(0x7f0000000480)=""/173, 0xad}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/43, 0x2b}], 0x3, 0x0) getsockname$netrom(0xffffffffffffffff, &(0x7f0000001900)={{0x3, @rose}, [@null, @remote, @default, @default, @rose, @netrom, @bcast]}, &(0x7f0000001980)=0x48) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r2, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:12 executing program 2 (fault-call:2 fault-nth:20): r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:12 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000000)) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r2, 0x0, 0x0) setsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000040)=0x2, 0x4) 18:36:12 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000140)={0x1d, 0x9, 0x1f, "303e273dbf69e18a376d2f33e83d17e2c598e01bd58b50ae8d2053b5f6"}) 18:36:12 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}}}, 0x30) 18:36:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r0}}, 0x18) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x7b, 0x1}, 0x7) keyctl$dh_compute(0x17, &(0x7f0000000300)={r1, 0x0, r1}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:12 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}}}, 0x30) [ 2095.896201] audit: type=1400 audit(1608921372.761:499): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=26031 comm="syz-executor.1" 18:36:12 executing program 3: r0 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) write$proc_mixer(r0, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000300)={r1, 0x0, r1}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xa7a, @mcast2, 0x22}, r1}}, 0x30) 18:36:12 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000380)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x9, 0x7fff, {"bfd4701a2aec702a16be94d076d20124"}, 0x8000, 0x1, 0x7}}}, 0x90) 18:36:12 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', '\\^\x00'}, 0x8) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="65000063203a002d2600888f60b6fae76949e75b51cff47d248ee9e223841690c14ecf2ff31d37fcf726395e53c8b7f198ed77779348d9b9a81ef99bf65f8c3679a3dac321b2d67e7dfec861ad7671c701f814045d49433ac96c5873b3"], 0xa) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x8, 0x40100) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000080)) 18:36:12 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}}}, 0x30) 18:36:12 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e0239ce5054a2b685f19186211c1eb456e7ff77bc6acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b2", 0xbf, 0xfffffffffffffffd) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x3ff, 0x4000) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000340)='freezer.state\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, &(0x7f0000000300)={0x0, 0x1}) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:13 executing program 3: r0 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000540)="1091d9c6ad294e9245cfa26bac64d35b1cf02385e53b28f84d62d319c3245cbafd2a1b4935cbb24a001a00face129f30906ded66506a07", 0x37, 0xfffffffffffffffb) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000580)=0x14) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x48, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x5, 0x8, 0x3]}, @SEG6_ATTR_SECRETLEN={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x4080}, 0x24000000) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)="dbd0b25a360ad88fb3b9c8fd9a7514e1b172b7b754ed23edb6ee66a4e8f415ec614a1bf0756b045f996c174441bad29a48f17b40a848bbcf4f8f450b1cfa15f7b8d48107b2a2c2c136d7a5bec3b84d00d9e87445221723e7410704d3ea7efd5c43ca0ac8bf19329cced0fc4fd4d7f5741aa649e8d26e733af0f8d012f7948769824e9e8cf3fb1caa4b962d678095b940244f5fd4bef5f859ff94b68a359590034c3dc0ddcfa8fba56650b3db74d97277d81ee1b2e9490be0d730997aa3", 0xbd, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r3}, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000440)={r1, r2, r3}, &(0x7f0000000480)=""/156, 0x9c, 0x0) 18:36:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'erspan0\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x8, 0x20, 0x7, 0x101, {{0x1d, 0x4, 0x0, 0x15, 0x74, 0x66, 0x0, 0x3, 0x2f, 0x0, @rand_addr=0x64010101, @loopback, {[@ssrr={0x89, 0x7, 0xb, [@empty]}, @end, @timestamp_addr={0x44, 0x44, 0xb4, 0x1, 0x5, [{@local, 0x200}, {@private=0x10000, 0x100}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9b4}, {@broadcast, 0x8}, {@multicast1, 0x2dd}, {@empty, 0xdf}, {@multicast2, 0x1}, {@local, 0xf2}]}, @rr={0x7, 0x13, 0x62, [@loopback, @remote, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x24}]}]}}}}}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x70, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}]}]}, 0x70}}, 0x1) 18:36:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}}}, 0x30) [ 2096.104113] audit: type=1400 audit(1608921372.961:500): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="\^" pid=26068 comm="syz-executor.1" 18:36:13 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r2 = accept$netrom(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) bind$netrom(r2, &(0x7f0000000300)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x6}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 18:36:13 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = getuid() r2 = accept$netrom(0xffffffffffffffff, &(0x7f0000000500)={{}, [@null, @remote, @null, @null, @remote, @null, @bcast, @bcast]}, &(0x7f00000002c0)=0x48) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, &(0x7f0000000580)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bpq0='bpq0\x00', 0x40, 'syz1\x00', @null, 0x8, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB="f20000007d02080000d6000004000001001001000000040000000000000000004890f9ffffff020000000100000000000000450063095b797247e1e0b4a658b5a72b306ab57a1ce84bf9a50f75d8150cf1a168cf56d0e5a0fbcc72832344436515b4ed068c051d5274b1295def8b761e7700000000000000000500697302000001002d5800246cb53519db8d5749a0c52c2dd2bab2a2f6a81f90a59962c78f47ba7b5bd8ceb4c844827ad5cab21c79655219c1f53263dbadf823709539aea5f9ee6293f20f05304819d27d859d4c3276a2b03a9e0fc6c76cba9139ae950700736861323234001171e5e3d545321fbbf745e1ccfd925ba65942fe90c1e806b79775c03c3776f9828868f698680c834a1e0a08f2087b7631c8d54e934c2c7aabf1dd7e37e752f295aeda7e6841fe61ac511b130c34181dfc25ea", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r1], 0xf2) getuid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r3, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000600)=0xffffffd2, 0x4) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r4, 0x0, 0x0) accept$netrom(r4, &(0x7f0000000480)={{0x3, @default}, [@null, @netrom, @default, @default, @rose, @default, @rose, @default]}, &(0x7f0000000140)=0x48) 18:36:13 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r1, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xeab}, @L2TP_ATTR_IFNAME={0x14}]}, 0x30}, 0x1, 0x0, 0x0, 0x8014}, 0x40010) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:13 executing program 1: ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, &(0x7f0000000040)={0x1f, 0x7, 0x3, 0x7, 0x9, 0x32, 0x10000}) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}}}, 0x30) 18:36:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x5}}, 0x1f) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r2}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x106}}, 0x20) 18:36:13 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000580)) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:13 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000380)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x60, r2, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @private=0xa010100}}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xf9}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, 0x60}}, 0x20040001) syz_open_dev$char_raw(&(0x7f0000000140)='/dev/raw/raw#\x00', 0x0, 0x202080) 18:36:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}}}, 0x30) 18:36:13 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffff8) socket$inet_udplite(0x2, 0x2, 0x88) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:13 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000016c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_CHANNELS_SET(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001740)={&(0x7f0000001d80)=ANY=[@ANYBLOB="1400bb00f09dd7a3340373aa9d84c0857f61700083d231f1e5e8e2e74a9103c6dcdb5df17cbebc9cdc9e9ec67948e612690b891f9d3d18f288fd7c9f5d7702844eab60883c01b00e0dcac81b6edbe0173bcad9ead8595394bfc736d25dd0656fc495ee574ae95d31a1d66a6c3f894e03b69ad94eb8c0986c64818804e4f1d2adddb4edda90b12337eb573a07e8043ceb22f449294a9d79a95ebf708c38651453e771abfeffb2e8fea776ab339b60e50d3f6706e3f6d75102d57b39d9f6e056b15e3cbb228abd16520f3cd17357e56d4f2c9b33236e0e6e4fa96f2a", @ANYRES16=r1, @ANYBLOB="000829bd70100100000012000000"], 0x14}, 0x1, 0x0, 0x0, 0x24008042}, 0x20044810) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) r3 = syz_open_dev$video4linux(&(0x7f0000000300)='/dev/v4l-subdev#\x00', 0xff, 0x800) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f00000003c0)={0x980000, 0xc72, 0x4, 0xffffffffffffffff, 0x0, &(0x7f0000000380)={0xa30001, 0x0, [], @string=&(0x7f0000000340)=0x1}}) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x1, 0x40) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x0, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="180000006495000000000000f500000085100000ffffffffe118d90b1508e0183e00000200000000000000000000003db0feffedffffff1838000003000000000000000000000081765ed104a29d954432fdfad100fe030000002f150c00080000001834000002000000000000000000"], &(0x7f00000004c0)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000500)=""/4096, 0x41000, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001500)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001540)={0x4, 0x0, 0x1, 0x6}, 0x10}, 0x78) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r6 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001900)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r6, 0xaf02, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f00000017c0)={0x8, 0x120, 0xfa00, {0x3, {0x8, 0x9, "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", 0x0, 0x80, 0x7d, 0x40, 0x0, 0x1, 0xff, 0x1}}}, 0x128) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001640)='/dev/vhost-vsock\x00', 0x2, 0x0) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001980)='ethtool\x00') ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000001b40)={'gre0\x00', &(0x7f00000019c0)={'syztnl0\x00', 0x0, 0x8001, 0x20, 0x0, 0x0, {{0x40, 0x4, 0x2, 0x4, 0x100, 0x65, 0x0, 0x80, 0x4, 0x0, @local, @rand_addr=0x64010100, {[@timestamp={0x44, 0x4, 0x5b, 0x0, 0x6}, @timestamp_prespec={0x44, 0x2c, 0xb3, 0x3, 0x0, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x7}, {@multicast2, 0x5}, {@local, 0x6}, {@rand_addr=0x64010100, 0x3}, {@dev={0xac, 0x14, 0x14, 0xd}, 0x4}]}, @end, @timestamp_prespec={0x44, 0x4, 0xf5, 0x3, 0x6}, @ra={0x94, 0x4}, @cipso={0x86, 0x5e, 0x3, [{0x7, 0xb, "e08ac945985d819861"}, {0x0, 0xf, "a3d4378e4337e83eae41d3168d"}, {0x7, 0x7, "8c01f1e3dc"}, {0x7, 0xe, "6c4278858bdd0a2ad83c3f6c"}, {0x1, 0x5, "fb761e"}, {0x1, 0x10, "2e6d0f4cc49526950b7902c19774"}, {0x0, 0x7, "c6be310ccf"}, {0x0, 0xd, "02a3537d06967a876191ae"}]}, @timestamp_addr={0x44, 0x54, 0xd7, 0x1, 0x4, [{@empty, 0x9}, {@empty, 0x7}, {@loopback, 0x7}, {@dev={0xac, 0x14, 0x14, 0x1b}, 0x5}, {@empty, 0x1}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x2}, {@empty, 0x81}, {@multicast2, 0xe}, {@multicast2}, {@dev={0xac, 0x14, 0x14, 0xd}, 0x20}]}]}}}}}) sendmsg$ETHTOOL_MSG_RINGS_GET(0xffffffffffffffff, &(0x7f0000001c40)={&(0x7f0000001940)={0x10, 0x0, 0x0, 0x10004400}, 0xc, &(0x7f0000001c00)={&(0x7f0000001b80)={0x6c, r7, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x2004c034) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001600)={&(0x7f0000000400)='mm_shrink_slab_start\x00', r4}, 0x10) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r2, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'sha224-avx2\x00'}}) 18:36:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:13 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:13 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x3ff, 0x10280) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, r1}) 18:36:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xc}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r4, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000180)={0x5, 0x10, 0xfa00, {&(0x7f0000000700), r4, 0x1}}, 0x18) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r6, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r6, 0xc}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x5, @dev, 0x22}, r2}}, 0x30) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r1}}, 0x18) 18:36:13 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000002c0)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000003c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r2}}, 0x18) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:13 executing program 1: syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r1 = accept$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @netrom}, [@bcast, @default, @null, @default, @null, @default, @rose]}, &(0x7f0000000080)=0x48) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000100)=0x7, &(0x7f0000000140)=0x4) 18:36:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:13 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000005c0)="d9799a708c09a96009356a687117180077500c66a8c484a513f2b30d034dabb5c3db82021684f06284c411418854cc85943dcb4b1d3236da0265e58521", 0x3d, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r3}, 0x0, 0x0, 0x0) getpid() keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r0}, &(0x7f00000004c0)=""/241, 0xf1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000380)={0x8, 0x120, 0xfa00, {0x4, {0x7fffffff, 0xffff, "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", 0x3d, 0xff, 0x2, 0x5, 0x4, 0x3, 0x6}}}, 0x128) r4 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000009c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000a00)={r5}) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r4}, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000600)={r4, 0x0, r1}, &(0x7f0000000780)=""/212, 0xd4, &(0x7f0000000980)={&(0x7f0000000680)={'ghash-ce\x00'}, &(0x7f0000000880)="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", 0xff}) 18:36:13 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r1}, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) socket$l2tp6(0xa, 0x2, 0x73) 18:36:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:13 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000000)="af665c38590e0b9b6a263290342466adec52d2ac37991f778ec827c8a768cb11538cca7e4e121aac2179a2fc1f1924aa7d1d4ed120200acbd8628ac18fd6c7dc6600bba52cb89c4286b1059a43a1cea37210805be90dbbdf21e48f69a5f0ec36f7393e3feb0e6d", &(0x7f0000000080)=@tcp6, 0x4}, 0x20) 18:36:13 executing program 4: syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r1 = accept$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @netrom}, [@bcast, @default, @null, @default, @null, @default, @rose]}, &(0x7f0000000080)=0x48) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000100)=0x7, &(0x7f0000000140)=0x4) 18:36:13 executing program 0: r0 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) write$6lowpan_enable(r0, &(0x7f0000000080)='0', 0x1) write$6lowpan_enable(r0, &(0x7f0000000040)='1', 0x1) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x3, 0x0, @private2={0xfc, 0x2, [], 0x1}, 0x22}, r2}}, 0x30) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x0}, {}]}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f0000000300)={r4, 0x6, &(0x7f0000000200)=[0x8, 0x100, 0x20, 0x6, 0x6, 0x1000], &(0x7f0000000240)=[0x6], 0x2, 0x2, 0x9, &(0x7f0000000280)=[0x2, 0x9], &(0x7f00000002c0)=[0x401, 0x3, 0x6]}) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000100)='FREEZING\x00', 0x9) r5 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0xefa2, 0x21a040) ioctl$SG_GET_LOW_DMA(r5, 0x227a, &(0x7f0000000380)) 18:36:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:13 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000004c0)={0x1, &(0x7f0000000480)=[{0x0}]}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000500)={r1, 0x5}) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r3, 0x6) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="ac000000ff03000003000000e877fe97415b77a93a4243ec8d5a96a193b6d0d6618cc47b939497acf2dd7f2db7b9d0c75a79662cbba04fbba83fbce26485dcb59c8deda006f808772fe253d6288c40e9d3ae9c423d543ee8bf41a83528d1f7722af83a564680c717b9a160eaddf14045a703a5778b2306195c9553f62ecddc9eba37b6fe403e1b58afc4b7fa00129b4d130546c119238bca3299b29eaebd8f8a5fab335e6cd0485912b05f4afb72fe99068981bd3b7ee173"]) pipe2$9p(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RREMOVE(r4, &(0x7f0000000440)={0x7, 0x7b, 0x1}, 0x7) r5 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) getsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f00000000c0), &(0x7f0000000300)=0x4) ioctl$KVM_GET_DEBUGREGS(r5, 0x8080aea1, &(0x7f0000000580)) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:13 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', ':\xc2\x00q\v'}, 0xa) 18:36:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xc}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r4, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000180)={0x5, 0x10, 0xfa00, {&(0x7f0000000700), r4, 0x1}}, 0x18) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r6, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r6, 0xc}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x5, @dev, 0x22}, r2}}, 0x30) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r1}}, 0x18) 18:36:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:13 executing program 2: getpid() r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) write$6lowpan_enable(0xffffffffffffffff, &(0x7f00000000c0)='0', 0x1) 18:36:13 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000580)) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2096.890348] kauditd_printk_skb: 9 callbacks suppressed [ 2096.890355] audit: type=1400 audit(1608921373.751:510): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=26204 comm="syz-executor.4" 18:36:13 executing program 1: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x40, 0x200) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2096.935187] audit: type=1400 audit(1608921373.791:511): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=3AC2 pid=26210 comm="syz-executor.1" 18:36:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r3, 0x2}}, 0x18) r4 = accept$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000080)) accept$netrom(r4, &(0x7f0000000100)={{0x3, @netrom}, [@remote, @rose, @default, @default, @default, @default, @null, @netrom]}, &(0x7f0000000180)=0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r3}}, 0x30) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_BIND_IP(r5, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xd442, @mcast2, 0x5}, r1}}, 0x30) 18:36:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 18:36:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xc}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r4, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000180)={0x5, 0x10, 0xfa00, {&(0x7f0000000700), r4, 0x1}}, 0x18) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r6, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r6, 0xc}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x5, @dev, 0x22}, r2}}, 0x30) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r1}}, 0x18) 18:36:13 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = getuid() r2 = accept$netrom(0xffffffffffffffff, &(0x7f0000000500)={{}, [@null, @remote, @null, @null, @remote, @null, @bcast, @bcast]}, &(0x7f00000002c0)=0x48) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, &(0x7f0000000580)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bpq0='bpq0\x00', 0x40, 'syz1\x00', @null, 0x8, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r1], 0xf2) getuid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r3, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000600)=0xffffffd2, 0x4) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r4, 0x0, 0x0) accept$netrom(r4, &(0x7f0000000480)={{0x3, @default}, [@null, @netrom, @default, @default, @rose, @default, @rose, @default]}, &(0x7f0000000140)=0x48) 18:36:13 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r1}, 0x0, 0x0, 0x0) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)="8d88513bdb328245e868f5730e2017cb00e83a8dd4844647dcd35e04b45f6d4c9c055bbf58fc3f750fb0f2bb45dcde497c91df87410cf021d1afa2c96cdbfffd52510ea4a651ad5838936142e4bf8d9f423266fb67", 0x55, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r1, 0x0, r2}, &(0x7f0000000400)=""/238, 0xee, &(0x7f0000000580)={&(0x7f0000000500)={'sha512-ssse3\x00'}, &(0x7f0000000540)="19ab4be92d16d01a62021ac03caf85f207a8b053eb9b7149", 0x18}) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) [ 2097.038291] audit: type=1400 audit(1608921373.851:512): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=26231 comm="syz-executor.4" 18:36:13 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000002c0)={0x0, 0x9, 0x3c4cd82f, r0, 0x0, &(0x7f0000000280)={0x98090f, 0xffff, [], @p_u32=&(0x7f0000000240)=0x55d}}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="657865639b5794713dd54a64420a0f92155cae5dead28a69dd09d7a36bf7d1570bc5c6d72b503863e1227fd0bd13abf2dbc8360eb300000000000000000000000000ca4cc244846309126dc2d9d333db1ba335ae473b77dc4bb57cde4061672d8ab96b5c183ff77562f5ac32541f6900006019ba44da3005ce0721cd0a9e17624956206ca838eaa0d92f50a9ffe34ab1bd818efb55f47b370c769301d70e495fec198eb65961e6d04dda06d3d57bf34e6a6036e411efc9a27d37b21c411ef58ebbfd6a28ca995d8a173f8fc7b31869ba2896ae0ddf1e278ad96b42ac4c393a7bcc59"], 0xa) r2 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x8001, 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f0000000100)={0x0, 0x4}) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) r3 = accept$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000300)) socket$inet_tcp(0x2, 0x1, 0x0) accept4$netrom(r3, &(0x7f0000000340)={{0x3, @rose}, [@bcast, @netrom, @bcast, @bcast, @netrom, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f00000001c0)=0x9, &(0x7f0000000200)=0x4) r4 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r4, 0xc0945662, &(0x7f0000000400)={0x90, 0x0, [], {0x0, @reserved}}) [ 2097.074127] audit: type=1400 audit(1608921373.921:513): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=26239 comm="syz-executor.1" 18:36:14 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 18:36:14 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) socketpair(0x1a, 0x6, 0x7, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$l2tp(r2, &(0x7f0000000300)="b4ae98acae29f81083603b08cdf31b473b3d8118d0a7d39b9de704f05b", 0x1d, 0x6e375c719ad9ba9d, &(0x7f0000000680)={0x2, 0x0, @multicast2, 0x4}, 0x10) r3 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r3, 0x0, 0x0, 0x20048010, &(0x7f0000000740)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000006c0)={0x6e, ""/110}) recvfrom$l2tp(r3, &(0x7f0000000380)=""/131, 0x83, 0x40000000, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) setsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000640)=0xffc00000, 0x4) getgid() ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f00000004c0)={'tunl0\x00', 0x0, 0x7800, 0x7800, 0xfff, 0x60a2, {{0x1b, 0x4, 0x3, 0x29, 0x6c, 0x66, 0x0, 0x4, 0x0, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@rr={0x7, 0xf, 0x1b, [@multicast2, @loopback, @loopback]}, @timestamp_addr={0x44, 0x44, 0x9f, 0x1, 0xc, [{@dev={0xac, 0x14, 0x14, 0x3a}, 0xff}, {@local, 0x9b4d}, {@empty, 0x6}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}, {@broadcast, 0x7}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x4a56315}, {@multicast1, 0x1ff}, {@rand_addr=0x64010101, 0x80}]}, @noop, @noop]}}}}}) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000600)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000780)={0x224, 0x13, 0x300, 0x70bd2c, 0x25dfdbff, {0x21, 0x8, 0x3f, 0x9, {0x4e21, 0x4e23, [0x401, 0x45f55a05, 0x0, 0x6], [0x11d, 0xf23c, 0x401, 0x4], r4, [0x9bc, 0x8001]}, 0x5, 0x9}, [@INET_DIAG_REQ_BYTECODE={0x54, 0x1, "f6ce2f43d44146ae922fabfddadb5a79a4bfffba8f91ca04385ff7bec2d8f041250a2cc18d666bd8075b567ea0b45568286661cc25bf7a43d2f2d93288347295291ef9f7866fd217c35c2f9eff524beb"}, @INET_DIAG_REQ_BYTECODE={0x79, 0x1, "3731e7411299c71b63ef557d152fbb92d0b257398e09a064d1ead9315cf0aca1c4fa3677fd4e99f470ea9aeb7b43d8ca7e690a21380552b1e660ca242d55c927ceb366451a12d5f412ed5d767e4fee51c5005e9eaf9c4fbbad9bab0447191a8effd9559c484be68e98eb948cae176d568ed87893fe"}, @INET_DIAG_REQ_BYTECODE={0x47, 0x1, "813ae1cfd3662689d90db2e258aa9bcc2a317bd13a987fdd43ee5275bc6b9bba0617ce59c4b61b054ace7423a5bc2372fc72887747d6b07bb938e81027bdb938bec3fa"}, @INET_DIAG_REQ_BYTECODE={0x73, 0x1, "d06b0d5e3e356e3057e70bad91a6d9a361d88e1fb6032f02208bfff0fd158b048a11a679faef84e82870477800f191507b3b4daa66abb863f1443d40a622df812ee9332374f3a90a00251a72fde7ae15cf6520b67437481652dc30c58706b6bb1660cf99d35ad8d6e1fec4a5d11c57"}, @INET_DIAG_REQ_BYTECODE={0x4b, 0x1, "284f4df0c70277c1db1198d68c9788315b06020cefb24f311362f5da4d906d4974eb1a49319ebb2fb53691169aa6a89cee1875af17cb7f5e7a6d00a0411b746c8d3a5e7314db42"}]}, 0x224}, 0x1, 0x0, 0x0, 0x8000}, 0x4080) r5 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r5, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:14 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', ':[--\x00'}, 0xa) 18:36:14 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e0239ce5054a2b685f19186211c1eb456e7ff77bc6acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b2", 0xbf, 0xfffffffffffffffd) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x3ff, 0x4000) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000340)='freezer.state\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, &(0x7f0000000300)={0x0, 0x1}) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xc}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r4, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000180)={0x5, 0x10, 0xfa00, {&(0x7f0000000700), r4, 0x1}}, 0x18) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r6, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r6, 0xc}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x5, @dev, 0x22}, r2}}, 0x30) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r1}}, 0x18) 18:36:14 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="657865632092edd15a3aef17a281bfe13b2d26d4e30bce7d09e54d71064c8fd0ff86e789170a6eb1fad6255dbf75f496b18ced4614a485281237538e07f5b6f13a19232563272b0946ba36caf298f2ce13c34f9a39a3381b905ab0c2b77acf8c4a26a811dd279248c87d299355bbe763ca1aed15c7ecad2f4f1c719e00a0e8a854353d2875a59f6214b43eff6c77f058669d455518b8a2fb06b860f748d7a58bae0c7aeda241c06134c0a95c0e066a82a310ae479c0f881776996c2a331179b91b7f63aa2920bbf6a1d9a430364a638eb7ebbbfe461b660316dffd16b201240044014d7c7a9766f65cd47728fbc91771c525b7898520f1b5b4"], 0x50) pipe2$9p(&(0x7f0000000100), 0x88000) [ 2097.248331] audit: type=1400 audit(1608921374.111:514): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[--" pid=26280 comm="syz-executor.1" 18:36:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x24, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x24}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000080)={'gretap0\x00', 0x0}) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='d\x00\x00\b', @ANYRES16=r3, @ANYBLOB="010029bd7000fddbdf250400000008000a0003000000080011000100000006001a004e23000005000700030000000c00160060e500000000000008001900ac1e000105000600050000000c001600060000000000000008001700", @ANYRES32=r4, @ANYBLOB], 0x64}, 0x1, 0x0, 0x0, 0x4001004}, 0x14004051) 18:36:14 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9", 0x3, 0xfffffffffffffffe) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000002c0)={0x8, &(0x7f0000000140)=[{}, {}, {}, {0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000380)={r1, 0x5}) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d79cb65380862860ed", 0xd9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r2, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:14 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 18:36:14 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="0091d9a917a694800f7b5efe7ed0574f844e", 0x12, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab30eb987394c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a8de2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73338dc1582cd6915e041b29938277ec1259a3df92b11632c1b69b6f37cdb8137aab6694e56d97d64d7", 0xd1, 0xfffffffffffffffd) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x7, 0x10, 0x38, 0x3f, {{0x1e, 0x4, 0x2, 0xb, 0x78, 0x68, 0x0, 0x3f, 0x4, 0x0, @broadcast, @empty, {[@timestamp_addr={0x44, 0x3c, 0xc9, 0x1, 0xc, [{@broadcast, 0x1000}, {@multicast2, 0x80000001}, {@multicast2, 0x4}, {@loopback, 0x9}, {@remote, 0x4}, {@remote, 0x4}, {@private=0xa010102, 0x81}]}, @end, @generic={0x82, 0x3, "0f"}, @noop, @end, @end, @generic={0x44, 0x12, "035db82f7204f3902aba49475026b1c7"}, @timestamp={0x44, 0xc, 0xdb, 0x0, 0x6, [0x0, 0x10001]}]}}}}}) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0xc0, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x84}, 0x8) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'sha224\x00'}}) 18:36:14 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYRES32], 0xa) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f0000000040)) ioctl$VIDIOC_G_INPUT(0xffffffffffffffff, 0x80045626, &(0x7f0000000000)) 18:36:14 executing program 3 (fault-call:1 fault-nth:0): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2097.324855] audit: type=1400 audit(1608921374.181:515): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=92EDD15A3AEF17A281BFE13B2D26D4E30BCE7D09E54D71064C8FD0FF86E789170A6EB1FAD6255DBF75F496B18CED4614A485281237538E07F5B6F13A19232563272B0946BA36CAF298F2CE pid=26300 comm="syz-executor.1" 18:36:14 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000280)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), r1, 0x2}}, 0x18) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='e:[\b&\x00'], 0xa) [ 2097.420889] audit: type=1400 audit(1608921374.181:516): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=92EDD15A3AEF17A281BFE13B2D26D4E30BCE7D09E54D71064C8FD0FF86E789170A6EB1FAD6255DBF75F496B18CED4614A485281237538E07F5B6F13A19232563272B0946BA36CAF298F2CE pid=26300 comm="syz-executor.1" [ 2097.472501] FAULT_INJECTION: forcing a failure. [ 2097.472501] name failslab, interval 1, probability 0, space 0, times 0 [ 2097.510795] CPU: 0 PID: 26334 Comm: syz-executor.3 Not tainted 4.14.212-syzkaller #0 [ 2097.518698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2097.528047] Call Trace: [ 2097.530634] dump_stack+0x1b2/0x283 [ 2097.534272] should_fail.cold+0x10a/0x154 [ 2097.538438] should_failslab+0xd6/0x130 [ 2097.542411] __kmalloc_track_caller+0x2bc/0x400 [ 2097.547073] ? proc_pid_attr_write+0xfe/0x280 [ 2097.551584] memdup_user+0x22/0xa0 [ 2097.555122] proc_pid_attr_write+0xfe/0x280 [ 2097.559441] __vfs_write+0xe4/0x630 [ 2097.563099] ? proc_pid_wchan+0xf0/0xf0 [ 2097.567071] ? debug_check_no_obj_freed+0x2c0/0x674 [ 2097.572088] ? kernel_read+0x110/0x110 [ 2097.575986] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2097.581433] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2097.586450] vfs_write+0x17f/0x4d0 [ 2097.589978] SyS_write+0xf2/0x210 [ 2097.593409] ? SyS_read+0x210/0x210 [ 2097.597012] ? SyS_clock_settime+0x1a0/0x1a0 [ 2097.601513] ? do_syscall_64+0x4c/0x640 [ 2097.605474] ? SyS_read+0x210/0x210 [ 2097.609093] do_syscall_64+0x1d5/0x640 [ 2097.612966] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2097.618185] RIP: 0033:0x45e149 [ 2097.621374] RSP: 002b:00007f1404b95c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2097.629063] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e149 [ 2097.636319] RDX: 000000000000000a RSI: 0000000020001800 RDI: 0000000000000003 [ 2097.643576] RBP: 00007f1404b95ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2097.650825] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2097.658072] R13: 00007ffddf8265df R14: 00007f1404b969c0 R15: 000000000119bf8c 18:36:14 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000300)={{0x3ff, 0x70, 0x6, 0x6}, 'syz1\x00', 0x2c}) 18:36:14 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r1, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00'}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x44, r4, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={[], [], @empty}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x8040}, 0x4000005) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r3}}, 0x30) recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000100)=""/170, 0xaa, 0x0, &(0x7f0000000040)={0x2, 0x0, @private}, 0x10) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r6, 0x4004556a, 0x0) ioctl$UI_SET_MSCBIT(r6, 0x40045568, 0x33) ioctl$UI_SET_SNDBIT(r5, 0x4004556a, 0x0) ioctl$UI_SET_KEYBIT(r5, 0x40045565, 0x1fc) socketpair(0x8, 0x800, 0x9, &(0x7f00000003c0)={0xffffffffffffffff}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r7, 0x6, 0x1d, &(0x7f0000000400), &(0x7f0000000440)=0x14) 18:36:14 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:14 executing program 4 (fault-call:2 fault-nth:0): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:14 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="65afc8fa10f51c40d3d5a4786563203a5b2d2600e16778e40c7e26c392544eca64d148c5cbb2a1fddc9e274ae3e3845acb0dfe4c138ce7966b1521d67c09bc94804c2b42e2a335a2aea9bf32981374361bfad7a6b3744def7397b332f910e655222dfe57377d05c33ba780eb4300"/124], 0xa) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x3, 0x111800) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000080)) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3, 0x4a2981) socket$inet6_udp(0xa, 0x2, 0x0) 18:36:14 executing program 3 (fault-call:1 fault-nth:1): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2098.087585] FAULT_INJECTION: forcing a failure. [ 2098.087585] name failslab, interval 1, probability 0, space 0, times 0 [ 2098.108350] CPU: 1 PID: 26352 Comm: syz-executor.3 Not tainted 4.14.212-syzkaller #0 [ 2098.116425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2098.125773] Call Trace: [ 2098.128353] dump_stack+0x1b2/0x283 [ 2098.131970] should_fail.cold+0x10a/0x154 [ 2098.136098] should_failslab+0xd6/0x130 [ 2098.140050] kmem_cache_alloc+0x40/0x3c0 [ 2098.144090] audit_log_start.part.0+0x20e/0x650 [ 2098.148737] ? kauditd_thread+0x630/0x630 [ 2098.152872] ? audit_filter+0x2a6/0x960 [ 2098.156834] ? audit_compare_dname_path+0x90/0x90 [ 2098.161708] ? __aafs_ns_mkdir.cold+0xa2/0xa2 [ 2098.166201] audit_log_start+0x45/0x70 [ 2098.170079] ? audit_file_mask+0x110/0x110 [ 2098.174296] common_lsm_audit+0xb2/0x19e0 [ 2098.178426] ? ipv6_skb_to_auditdata+0xcb0/0xcb0 [ 2098.183163] ? aa_lookupn_ns+0xfe/0x190 [ 2098.187136] aa_audit+0x1cb/0x61b [ 2098.190578] ? audit_file_mask+0x110/0x110 [ 2098.194839] aa_audit_file+0x2c0/0x540 [ 2098.198829] ? file_audit_cb+0x640/0x640 [ 2098.202873] ? aa_label_parse+0x50e/0xa20 [ 2098.207006] ? lock_acquire+0x170/0x3f0 [ 2098.210961] aa_change_profile+0xcc9/0x2420 [ 2098.215266] ? trace_hardirqs_on+0x10/0x10 [ 2098.219487] ? aa_change_hat+0xf40/0xf40 [ 2098.223526] ? depot_save_stack+0x10d/0x3e3 [ 2098.227829] ? __lock_acquire+0x5fc/0x3f20 [ 2098.232058] ? do_syscall_64+0x1d5/0x640 [ 2098.236104] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2098.241546] ? __lock_acquire+0x5fc/0x3f20 [ 2098.245767] apparmor_setprocattr+0x972/0xa80 [ 2098.250294] ? apparmor_cred_free+0x70/0x70 [ 2098.254615] ? proc_pid_attr_write+0x152/0x280 [ 2098.259182] ? __might_fault+0x177/0x1b0 [ 2098.263224] security_setprocattr+0x74/0xb0 [ 2098.267647] proc_pid_attr_write+0x1bd/0x280 [ 2098.272090] __vfs_write+0xe4/0x630 [ 2098.275696] ? proc_pid_wchan+0xf0/0xf0 [ 2098.279657] ? debug_check_no_obj_freed+0x2c0/0x674 [ 2098.284660] ? kernel_read+0x110/0x110 [ 2098.288546] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2098.294031] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2098.299036] vfs_write+0x17f/0x4d0 [ 2098.302564] SyS_write+0xf2/0x210 [ 2098.305997] ? SyS_read+0x210/0x210 [ 2098.309620] ? SyS_clock_settime+0x1a0/0x1a0 [ 2098.314016] ? do_syscall_64+0x4c/0x640 [ 2098.317968] ? SyS_read+0x210/0x210 [ 2098.321591] do_syscall_64+0x1d5/0x640 [ 2098.325466] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2098.330635] RIP: 0033:0x45e149 18:36:15 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:15 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x2cb) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f00000000c0)) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000340)) [ 2098.333811] RSP: 002b:00007f1404b95c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2098.341508] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e149 [ 2098.348765] RDX: 000000000000000a RSI: 0000000020001800 RDI: 0000000000000003 [ 2098.356014] RBP: 00007f1404b95ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2098.363264] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2098.370564] R13: 00007ffddf8265df R14: 00007f1404b969c0 R15: 000000000119bf8c 18:36:15 executing program 4: r0 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000480)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x11ed}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xf, 0x1, 0x2, 0x1f, 0x80, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x3}, 0x40) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r0}, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000080)={0x0, r0}, &(0x7f0000000140)=""/77, 0x4d, &(0x7f0000000000)={&(0x7f0000000200)={'sha3-384\x00'}, &(0x7f0000000380)="10063f458468abaea5ccac53be74568085e242170d0b468a43336ccb8868372548581d477095bf230a2ae9e192e7dafbbbc64c7a57077e0d5f33d9cf3dfd76463b164b8032a3e41030c9eae66b9904ae66240633859bd59579f9f96e0b1e145f34b66592829826e23638965edd82f15693d869611fdbc40acae27df8e8c37d8cd4cc866e5dd76b0957b78a5714a60b975cc242fd63d16b39d70b4cfe59ef092df98a8fe5413d14137587c74ad6d5457f19b099ed8226fe1e699cb95a80aa384a84a9625cb45ab573805cdcb444bad71c30ffadc602b98fd2403ac6e8ea86d9304b90bd", 0xe3}) pipe2$9p(&(0x7f00000004c0), 0x4000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x20}, 0x22}}}, 0x7f) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x848, 0x84880) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000500)=0x1, 0x4) 18:36:15 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) [ 2098.400251] audit: audit_lost=10 audit_rate_limit=0 audit_backlog_limit=64 [ 2098.414142] audit: out of memory in audit_log_start [ 2098.423420] audit: type=1400 audit(1608921375.281:517): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=26364 comm="syz-executor.1" 18:36:15 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000)=0x3, 0x4) 18:36:15 executing program 3 (fault-call:1 fault-nth:2): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) prctl$PR_SVE_SET_VL(0x32, 0x1b478) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r3, 0x2}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r5, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r5, 0x1c, 0x0, @in={0x2, 0x4e21, @local}}}, 0x90) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r3, r4}}, 0x18) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r6, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r7, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r8, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000000780)={0x8, 0x120, 0xfa00, {0x4, {0xffffffff, 0x7ff, "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", 0x0, 0x4, 0x3f, 0x9, 0x0, 0xf6, 0x20}, r8}}, 0x128) 18:36:15 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 18:36:15 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)={'exec ', 'BE\x9f\xad\xdb\x96B\x81\xcfV\xd7\xdda\xaf=\xf2\xe2H\x82\xf5N\xb6@@\x91A\'2gy~\xe9\xa5\x9b$\xf7\xda!\x15\xa3\xd08\x9a\xbab\x98\xc0\x98\xa7\x02\x80\x9a\xe0$\x94\x81\xda\xe9\ab\x9a+u\xfd*\xb8y;?\x96\xe9Yp\x1a6\fz\x00\x00\x00\x00\x00#\xe0\xbe\xd2\xb93\x81\x90\xa9*\x9e\x8c\xcfzx\xf8\x9c\x8c\xa8\x8a\f\n\xd4W\x94\xbdG_\xd6,-\xd0fJ4\xe0\\\xb1\x15/_}\x1eVy,u\xbc\xa0\x16\xdf\x9c(b\xb2\x12\x83\n)L^\xab=\xd7\xf2-\xc9\xaf\xfd\x05\xc8f\xc1@\x7f!Ad\xa84\x8d\x8c.\xaa\xad\x9a^\xefXI\x1b\fu\x19>\xef\x0e\xe8\xa0\x12'}, 0xffffffffffffffc3) 18:36:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000140)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r1, 0x1}}, 0x18) [ 2098.551228] FAULT_INJECTION: forcing a failure. [ 2098.551228] name failslab, interval 1, probability 0, space 0, times 0 18:36:15 executing program 1: r0 = accept4$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @netrom}, [@default, @remote, @default, @remote, @null, @null]}, &(0x7f0000000040)=0x48, 0x800) getpeername$netrom(r0, &(0x7f0000000240)={{}, [@remote, @null, @null, @netrom, @netrom, @bcast, @null, @netrom]}, &(0x7f00000000c0)=0x48) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) write$apparmor_exec(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6d8c5738e692e2cc00b50400303b2398c22fa96b4e160e91d4ed427565bf1864224734e304e389bdbc5068bdf3990c6a96e7ecbab723ec37e5ab0c52876748059ac39a4c0dab11301f23b6525fd7338b4ce48161ff0c5d8f10d2a02659297f47cef99cce82ed1423982ca9c926b42e814c14f3df4130eea7f373246ad0c0de889844d5e817449037bb1fa80f142015dc2489347b5af7452c5126c15c760d2bdf23293def5063380bcf8837136666"], 0xa) 18:36:15 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) [ 2098.617838] CPU: 0 PID: 26386 Comm: syz-executor.3 Not tainted 4.14.212-syzkaller #0 [ 2098.625750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2098.635132] Call Trace: [ 2098.637720] dump_stack+0x1b2/0x283 [ 2098.641351] should_fail.cold+0x10a/0x154 [ 2098.645504] should_failslab+0xd6/0x130 [ 2098.649492] kmem_cache_alloc_node+0x54/0x410 [ 2098.653988] __alloc_skb+0x5c/0x510 [ 2098.657611] audit_log_start.part.0+0x233/0x650 [ 2098.662280] ? kauditd_thread+0x630/0x630 18:36:15 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000ff03000000000000000000808d28f4ff010000001a720400010000008591f4ff0000000005343f005933000018190000", @ANYRES32, @ANYBLOB="0000000002000000000000000f0000004eb06f7945e32440a51afd300dcd5cbf073f4e44077ce4eb12bb7c250d81b5ed3a1f5c7812581b2ac42782b0d8586364f85dbbbdac631d17ec4f7bb1a9faab547015542bfbce3f16764e1272975ecf337100b7bc05a494ce117e68d1d9c299bfe5f136c1dede2d282da4be9379377f1e9f8ba10d1516826ffde09e951b224569385824a3f127c8ec4e669ebea85b2298a71ce8ccd16f4fbd3fb6ec821a5e97160737a3eba62907a15fce5b35b0197e30d2726386db57437a90dfdffecc2a5b4f8f6510c3b3cc32ae7abc29773ea2e0823adb677d439123cba47cf1ffa5f607129941849c9aef07c4d87b30cef3f1cb1d49a007b4f32d54"], &(0x7f0000000580)='GPL\x00', 0x101, 0xe, &(0x7f00000005c0)=""/14, 0x41000, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x1, 0xffffffff, 0x458}, 0x10}, 0x78) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x6, &(0x7f00000000c0)=ANY=[@ANYBLOB="7546000010ff0000adc869b00000fcffffff9500000000000000008209000100"/48], &(0x7f0000000300)='syzkaller\x00', 0x1, 0x61, &(0x7f0000000340)=""/97, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x9, 0x6, 0x7fff}, 0x10}, 0x78) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f00000004c0)=0x1000, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) [ 2098.666429] ? audit_filter+0x2a6/0x960 [ 2098.670403] ? audit_compare_dname_path+0x90/0x90 [ 2098.675253] ? __aafs_ns_mkdir.cold+0xa2/0xa2 [ 2098.679743] audit_log_start+0x45/0x70 [ 2098.683635] ? audit_file_mask+0x110/0x110 [ 2098.687874] common_lsm_audit+0xb2/0x19e0 [ 2098.692035] ? ipv6_skb_to_auditdata+0xcb0/0xcb0 [ 2098.696791] ? aa_lookupn_ns+0xfe/0x190 [ 2098.700763] aa_audit+0x1cb/0x61b [ 2098.704221] ? audit_file_mask+0x110/0x110 [ 2098.708452] aa_audit_file+0x2c0/0x540 [ 2098.712336] ? file_audit_cb+0x640/0x640 18:36:15 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000580)) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f00000000c0)={0x3, 0x7}) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) [ 2098.716395] ? aa_label_parse+0x50e/0xa20 [ 2098.720553] ? lock_acquire+0x170/0x3f0 [ 2098.724529] aa_change_profile+0xcc9/0x2420 [ 2098.728855] ? trace_hardirqs_on+0x10/0x10 [ 2098.733089] ? aa_change_hat+0xf40/0xf40 [ 2098.737171] ? depot_save_stack+0x10d/0x3e3 [ 2098.741497] ? __lock_acquire+0x5fc/0x3f20 [ 2098.745729] ? do_syscall_64+0x1d5/0x640 [ 2098.749789] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2098.755147] ? __lock_acquire+0x5fc/0x3f20 [ 2098.759389] apparmor_setprocattr+0x972/0xa80 [ 2098.763887] ? apparmor_cred_free+0x70/0x70 [ 2098.768214] ? proc_pid_attr_write+0x152/0x280 [ 2098.772978] ? __might_fault+0x177/0x1b0 [ 2098.777041] security_setprocattr+0x74/0xb0 [ 2098.781363] proc_pid_attr_write+0x1bd/0x280 [ 2098.785772] __vfs_write+0xe4/0x630 [ 2098.789395] ? proc_pid_wchan+0xf0/0xf0 [ 2098.793380] ? debug_check_no_obj_freed+0x2c0/0x674 [ 2098.798393] ? kernel_read+0x110/0x110 [ 2098.802375] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2098.807821] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2098.812838] vfs_write+0x17f/0x4d0 [ 2098.816377] SyS_write+0xf2/0x210 [ 2098.819826] ? SyS_read+0x210/0x210 [ 2098.823448] ? SyS_clock_settime+0x1a0/0x1a0 [ 2098.827856] ? do_syscall_64+0x4c/0x640 [ 2098.831827] ? SyS_read+0x210/0x210 [ 2098.835454] do_syscall_64+0x1d5/0x640 [ 2098.839358] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2098.844542] RIP: 0033:0x45e149 [ 2098.847727] RSP: 002b:00007f1404b95c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2098.855432] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e149 18:36:15 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLINK(r0, &(0x7f0000000040)={0x7, 0x47, 0x1}, 0x7) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000580)) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000240)) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r3 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @reserved}}) ioctl$VIDIOC_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000000280)={0x4, 0x0, [], {0x0, @bt={0x904, 0x7fffffff, 0x0, 0x2, 0x6bfb5f6, 0x0, 0x6, 0x7, 0x1, 0x0, 0x0, 0x9, 0x800, 0x40, 0x4, 0xc, {0x78, 0x6}, 0x9, 0x9}}}) write$apparmor_exec(r2, &(0x7f00000000c0)=ANY=[], 0x8) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, 0x0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x0, 0x4, 0x0, 0x5, 0x6]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x40}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1000}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x24000}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1d5d38248c3ac85fc4140600000000000000c1e69b77fa29bf8b666cbe3efb2c65d3f38c8609723f635adde8fa6aba8c470f5493f9a676"], 0xa) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) [ 2098.862695] RDX: 000000000000000a RSI: 0000000020001800 RDI: 0000000000000003 [ 2098.869962] RBP: 00007f1404b95ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2098.877222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2098.884485] R13: 00007ffddf8265df R14: 00007f1404b969c0 R15: 000000000119bf8c 18:36:15 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 18:36:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x5, @ipv4={[], [], @local}, 0x3}}}, 0x30) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r4}}, 0x30) 18:36:15 executing program 3 (fault-call:1 fault-nth:3): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2099.010822] FAULT_INJECTION: forcing a failure. [ 2099.010822] name failslab, interval 1, probability 0, space 0, times 0 [ 2099.023030] CPU: 0 PID: 26456 Comm: syz-executor.3 Not tainted 4.14.212-syzkaller #0 [ 2099.030915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2099.040262] Call Trace: [ 2099.042849] dump_stack+0x1b2/0x283 [ 2099.046485] should_fail.cold+0x10a/0x154 [ 2099.050644] should_failslab+0xd6/0x130 [ 2099.054622] kmem_cache_alloc_node_trace+0x58/0x400 [ 2099.059656] __kmalloc_node_track_caller+0x38/0x70 [ 2099.064589] __alloc_skb+0x96/0x510 [ 2099.068221] audit_log_start.part.0+0x233/0x650 [ 2099.072891] ? kauditd_thread+0x630/0x630 [ 2099.077042] ? audit_filter+0x2a6/0x960 [ 2099.081018] ? audit_compare_dname_path+0x90/0x90 [ 2099.085863] ? __aafs_ns_mkdir.cold+0xa2/0xa2 [ 2099.090356] audit_log_start+0x45/0x70 [ 2099.094257] ? audit_file_mask+0x110/0x110 [ 2099.098486] common_lsm_audit+0xb2/0x19e0 [ 2099.102638] ? ipv6_skb_to_auditdata+0xcb0/0xcb0 [ 2099.107397] ? aa_lookupn_ns+0xfe/0x190 [ 2099.111425] aa_audit+0x1cb/0x61b [ 2099.114856] ? audit_file_mask+0x110/0x110 [ 2099.119078] aa_audit_file+0x2c0/0x540 [ 2099.122965] ? file_audit_cb+0x640/0x640 [ 2099.127041] ? aa_label_parse+0x50e/0xa20 [ 2099.131182] ? lock_acquire+0x170/0x3f0 [ 2099.135141] aa_change_profile+0xcc9/0x2420 [ 2099.139446] ? trace_hardirqs_on+0x10/0x10 [ 2099.143661] ? aa_change_hat+0xf40/0xf40 [ 2099.148135] ? depot_save_stack+0x10d/0x3e3 [ 2099.152539] ? __lock_acquire+0x5fc/0x3f20 [ 2099.156763] ? do_syscall_64+0x1d5/0x640 [ 2099.160809] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2099.166197] ? __lock_acquire+0x5fc/0x3f20 [ 2099.170415] apparmor_setprocattr+0x972/0xa80 [ 2099.175076] ? apparmor_cred_free+0x70/0x70 [ 2099.179397] ? proc_pid_attr_write+0x152/0x280 [ 2099.183978] ? __might_fault+0x177/0x1b0 [ 2099.188150] security_setprocattr+0x74/0xb0 [ 2099.192484] proc_pid_attr_write+0x1bd/0x280 [ 2099.196883] __vfs_write+0xe4/0x630 [ 2099.200496] ? proc_pid_wchan+0xf0/0xf0 [ 2099.204459] ? debug_check_no_obj_freed+0x2c0/0x674 [ 2099.209477] ? kernel_read+0x110/0x110 [ 2099.213349] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2099.218783] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2099.223781] vfs_write+0x17f/0x4d0 [ 2099.227300] SyS_write+0xf2/0x210 [ 2099.230730] ? SyS_read+0x210/0x210 [ 2099.234333] ? SyS_clock_settime+0x1a0/0x1a0 [ 2099.238725] ? do_syscall_64+0x4c/0x640 [ 2099.242720] ? SyS_read+0x210/0x210 [ 2099.246327] do_syscall_64+0x1d5/0x640 [ 2099.250198] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2099.255374] RIP: 0033:0x45e149 18:36:16 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r2 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x5, 0x4000) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000300)) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000340)={0x0, 0x20}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000380)={'gretap0\x00', 0x0, 0x20, 0x8, 0x1, 0x4, {{0x22, 0x4, 0x1, 0x7, 0x88, 0x6, 0x0, 0x1f, 0x4, 0x0, @remote, @multicast2, {[@timestamp_addr={0x44, 0x3c, 0xac, 0x1, 0x7, [{@multicast2, 0x5}, {@local, 0x5}, {@multicast1, 0x8000}, {@private=0xa010102, 0x3ff}, {@loopback, 0x5}, {@remote, 0x3}, {@broadcast, 0xb}]}, @generic={0x83, 0x4, "e05f"}, @timestamp_prespec={0x44, 0x34, 0xbe, 0x3, 0x9, [{@rand_addr=0x64010100, 0x6}, {@multicast2, 0x200}, {@broadcast, 0x4a}, {@remote, 0xfff}, {@loopback, 0x6}, {@multicast1, 0x8}]}]}}}}}) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f00000004c0)={0x0, 0x5, 0x101, [], &(0x7f0000000480)=0x8}) 18:36:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}}}, 0x30) 18:36:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000600)={0xffffffffffffffff}, 0x15}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r2, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0xffffff69, 0xfa00, {0x0, {0xa, 0x0, 0x5, @dev, 0x22}, r2}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r4, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x1, @private1={0xfc, 0x1, [], 0x1}, 0xc3f4}, r4}}, 0x30) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r5, 0x8008af00, &(0x7f0000000080)) getpid() 18:36:16 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2099.258551] RSP: 002b:00007f1404b95c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2099.266247] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e149 [ 2099.273496] RDX: 000000000000000a RSI: 0000000020001800 RDI: 0000000000000003 [ 2099.280770] RBP: 00007f1404b95ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2099.288039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2099.295296] R13: 00007ffddf8265df R14: 00007f1404b969c0 R15: 000000000119bf8c 18:36:16 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000300)="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", 0x10c, 0xfffffffffffffffd) socketpair(0x15, 0x4, 0x1f, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000500)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000004c0)={&(0x7f0000000200)={0x48, 0x0, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_IFNAME={0x14}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x200040cd}, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:16 executing program 3 (fault-call:1 fault-nth:4): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}}}, 0x30) 18:36:16 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r1, 0x0, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000)=0x8, 0x4) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @reserved}}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000000c0)={0x980000, 0x9, 0x7f, r2, 0x0, &(0x7f0000000080)={0x990a6e, 0x6cf, [], @p_u16=&(0x7f0000000040)=0x3}}) 18:36:16 executing program 2: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340)='l2tp\x00') r4 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r4, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f0000000480)={0x0, 0x6a8d4ac3536597eb}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00'}) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x50, r3, 0x100, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r5}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'syzkaller0\x00'}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}]}, 0x50}}, 0x400c051) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000500)=ANY=[@ANYBLOB="02800000f6ff84000000000000000002000000000104000000000000fffd00000300000000000000418e492d27aa639f1c09526a32adeb6582fb3d"]) r6 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r6, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x10, &(0x7f0000000180)=0x8, 0x4) setsockopt$inet_tcp_int(r7, 0x6, 0x28, &(0x7f00000004c0)=0x100, 0x4) 18:36:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e23, 0x4, @private2, 0x8001}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000600)={'syztnl0\x00', &(0x7f0000000580)={'syztnl0\x00', 0x0, 0x7, 0x8000, 0x7, 0x4, {{0x10, 0x4, 0x2, 0x4, 0x40, 0x65, 0x0, 0x9, 0x29, 0x0, @broadcast, @multicast2, {[@end, @timestamp={0x44, 0x1c, 0xc4, 0x0, 0x8, [0x4, 0x401, 0x5, 0x5, 0xda, 0xffffffe1]}, @generic={0x88, 0xd, "3019eb1e5c37ba786306ab"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000006c0)={'syztnl1\x00', &(0x7f0000000680)={'ip_vti0\x00', 0x0, 0x8000, 0x7809, 0x3, 0x3, {{0x5, 0x4, 0x0, 0x25, 0x14, 0x68, 0x0, 0x80, 0x29, 0x0, @local, @remote}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000007c0)={'erspan0\x00', &(0x7f0000000740)={'tunl0\x00', 0x0, 0x80, 0x700, 0x5, 0xe4, {{0x10, 0x4, 0x2, 0x3, 0x40, 0x67, 0x0, 0xdf, 0x2f, 0x0, @remote, @multicast1, {[@rr={0x7, 0xf, 0xc1, [@multicast1, @dev={0xac, 0x14, 0x14, 0x1}, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x7, 0xb9, [@broadcast]}, @rr={0x7, 0x13, 0x11, [@local, @local, @empty, @broadcast]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000900)={'ip_vti0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="7379fa746e6c310000000000000000004b4f158a3421d4111f2f3693967da1b3930665d8506c4308cebf5336ad8f", @ANYRES32=0x0, @ANYBLOB="00070080000000020000a6694225004800660000082f9078ffffffffac1e0101442493110000000000001000ac1414aa00000004e000000100000006ac14140b00000001860fede6abe8917c52383b7844065200"]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', &(0x7f0000000980)={'gre0\x00', 0x0, 0x20, 0x20, 0x7, 0x1, {{0x3f, 0x4, 0x1, 0x31, 0xfc, 0x65, 0x0, 0x0, 0x6, 0x0, @loopback, @multicast1, {[@rr={0x7, 0x1f, 0x5d, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @private=0xa010100, @broadcast, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_prespec={0x44, 0x4c, 0xcf, 0x3, 0x6, [{@multicast2, 0x343}, {@rand_addr=0x64010100, 0x7}, {@local, 0x1ff}, {@rand_addr=0x64010102, 0x44a1}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@broadcast, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2d}, 0x1000}, {@remote, 0x20}, {@loopback, 0x1}]}, @timestamp={0x44, 0xc, 0xdb, 0x0, 0x6, [0xff, 0x9]}, @rr={0x7, 0xf, 0xc8, [@empty, @private=0xa010100, @remote]}, @rr={0x7, 0x1f, 0x58, [@dev={0xac, 0x14, 0x14, 0x37}, @private=0xa010101, @multicast1, @private=0xa010100, @empty, @multicast2, @remote]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x2b, 0xd4, [@multicast1, @remote, @loopback, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100]}, @generic={0x44, 0x11, "d1a997decb4516da73ab4e54f08518"}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b00)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001580)={&(0x7f0000000b40)={0xa20, 0x0, 0x400, 0x70bd29, 0x25dfdbfd, {}, [{{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x292e}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0xc, 0x4, [{0x400, 0xff, 0xf8, 0x9}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x900}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0xc, 0x4, [{0x7f, 0x3f, 0x36, 0x8001}]}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r2}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0x1e8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0xffffffb4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x121}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x200}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x3ff}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x40}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x214, 0x2, 0x0, 0x1, [{0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x34, 0x4, [{0x2, 0x2, 0x9, 0x9}, {0x0, 0x3, 0x4, 0xee6}, {0x8, 0x7, 0x5}, {0x1, 0x3, 0x20, 0x10000}, {0x1, 0x81, 0x7f, 0x1}, {0xa0c, 0xff, 0x1, 0x7}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x1, 0xf6, 0x80, 0x6}, {0x9, 0xe9, 0x7f, 0x7}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x138, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x80}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0xc, 0x4, [{0x8933, 0x52, 0x1, 0x4}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r11}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}]}, 0xa20}, 0x1, 0x0, 0x0, 0x8001}, 0x20040810) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) r12 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) r14 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x2e9, 0x440283) ioctl$SCSI_IOCTL_SEND_COMMAND(r14, 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="7a0000000900000020000000cfe1cbfb45d6c390db08ddbc7cb4fb01fe5f18693766df80b451365f94f84021c52a8a7436937e3643105075925c24590be54d8211e36338d1ad26d7bc169df46cc1d86cc86b6433e35d96ddeffa1020aa8a8b5b27d5c9c2aaf2c5665c9dbd50cd5de21ebe70ec9b7212abae047b564b820a01f86838b49d978dc6"]) write$RDMA_USER_CM_CMD_BIND_IP(r12, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x7f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, r13}}, 0x30) 18:36:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r2, 0xfffffffd}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r3}}, 0x30) 18:36:16 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000000)=0x7, 0x4) r2 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000001480)={0x0, 0x2, &(0x7f00000012c0)=[0x6, 0xe3], &(0x7f00000013c0)=[0x2, 0xc087, 0x2, 0x3, 0x3, 0x100, 0x1b7, 0x3, 0x4], 0x0, 0x3, 0x9, &(0x7f0000001400)=[0x3, 0x3, 0x7], &(0x7f0000001440)=[0x8, 0x4, 0xfffffffe, 0x3]}) write$apparmor_exec(r1, &(0x7f0000000100)=ANY=[@ANYRES64=r0], 0xa) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x15, 0x3, 0x1, 0x0, 0x8, 0x1, 0x7, [], 0x0, 0xffffffffffffffff, 0x5, 0x3}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r4, 0x8008af00, &(0x7f0000000580)) ioctl$VHOST_SET_OWNER(r4, 0xaf01, 0x0) socketpair(0x0, 0x4, 0x590, &(0x7f0000001340)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000000080)={'gretap0\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001380)={r3, &(0x7f00000002c0)="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", &(0x7f0000001300)=@udp=r5, 0x4}, 0x20) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x102) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x80140, 0x0) 18:36:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}}}, 0x30) 18:36:16 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) socket$inet_udplite(0x2, 0x2, 0x88) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x1, @null, @netrom={'nr', 0x0}, 0x7, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r2}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r5, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r5}}, 0x18) 18:36:16 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:16 executing program 0: sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000700)=ANY=[@ANYBLOB="385a8bf7b1a800e4a106f04eee101c1289182c85d162721dd99dd8d4456375c1173dbf973e5b7f0ebe65eaf26eaf94131584c533ba656a51229661ceccfbf43f20f3e0f5df28151c1088cb7737d0b3e6bab056e020e0368ae1fe8ed3", @ANYRES16=0x0, @ANYBLOB="000426bd7000fbdbdf250d0000008000b30b9b1cecba29086c19342cc2c301807f0002006d615b736563", @ANYRES32=0x0, @ANYBLOB="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"/391, @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e30000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x1}, 0x20000081) r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$l2tp(0x2, 0x2, 0x73) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000180)) bind$l2tp(r1, &(0x7f00000001c0)={0x2, 0x0, @empty, 0x4}, 0x10) bind$l2tp(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x8000, 0x0, @dev={0xfe, 0x80, [], 0x3}}, r2}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000140)={0x13, 0x10, 0xfa00, {&(0x7f0000000500), r2, 0x1}}, 0x18) 18:36:16 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0x1, &(0x7f0000000300)="6d1403abae1ce8194ea51d0bb463cde1e279bc939885ea54d55dd0c4c91e329ff62626ab4953d2ffeb9ac25b4b6c3d9931a685a95c4366dc2c053eb1024a7231a097664c857506b55b918db56fcfdb0eadc586e9b30d1ed2a14b31354fef27a10d270b50b653adfff16c08b5ce35639b196fc2f1df8beca787246b971a", &(0x7f0000000380)=@buf="2d0baccba2e7b9b39c0597ea995324cef730f014b34d246bb65b8db0f0f71f63213c656c061e8d7425019d28ff9b9866b662e59d5d5a2c20e151b736d8d60c366d62527506443e20fd02d6c351899b0ed715ebbeced71752b574d1fcea9ab30b15a349bd68abca07b28b7cec2c88a2cc4f62ce7408e57ec1f0eda7e9a8b33d673db65adc5956307b8827cd01a57e3e273870906c8c85d69fd76f2beb92ac", 0x2}, 0x20) r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000500)={0x0, 0x3}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)={0x81}, 0x8) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:16 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000000)=0x7, 0x4) r2 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000001480)={0x0, 0x2, &(0x7f00000012c0)=[0x6, 0xe3], &(0x7f00000013c0)=[0x2, 0xc087, 0x2, 0x3, 0x3, 0x100, 0x1b7, 0x3, 0x4], 0x0, 0x3, 0x9, &(0x7f0000001400)=[0x3, 0x3, 0x7], &(0x7f0000001440)=[0x8, 0x4, 0xfffffffe, 0x3]}) write$apparmor_exec(r1, &(0x7f0000000100)=ANY=[@ANYRES64=r0], 0xa) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x15, 0x3, 0x1, 0x0, 0x8, 0x1, 0x7, [], 0x0, 0xffffffffffffffff, 0x5, 0x3}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r4, 0x8008af00, &(0x7f0000000580)) ioctl$VHOST_SET_OWNER(r4, 0xaf01, 0x0) socketpair(0x0, 0x4, 0x590, &(0x7f0000001340)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000000080)={'gretap0\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001380)={r3, &(0x7f00000002c0)="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", &(0x7f0000001300)=@udp=r5, 0x4}, 0x20) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="02010000750100f70000006e8cc86cd2be362b0c8ccaa96e1786daee86ce6c9a0fbc9ca97f6d0845d3a23bba46da67d646210b753f7a15b839a29a45d7cbe7802fcf45aa706223c7674a35c24a58588c6572246253a45e121b6c9345bfd5283dd800f7bfb60a1d2577a7b39bd6ac65aa5fabbabd99a0e9f711c434c002df49b4ce82b826b982aaed6dd83d6cd6fc5edddb3b2eaeb8c8de9ce20022627853cd4c2e9ff38c408b51d206b2d70ed480afb169800b63ff37c59e7b4bf451da28823f07d2783ec00097015a0f2b6e16ee64527457ec61a23b574ed9c361dc17e594a582b6f6ea99141fc56c1bbcaa75bbae49c45a6d3e567cbbb89ecc11bd08a4d3537e60"], 0x102) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x80140, 0x0) 18:36:16 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000000)) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x7fff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0xe34}}, 0x10) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={0x0, 0x0}) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000140)={0x8, &(0x7f0000000100)=[{}, {}, {0x0}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000180)={r4, 0x3}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f00000000c0)={r3}) 18:36:16 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socketpair(0x31, 0xa, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000300)={'tunl0\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x80, 0x80, 0x8, 0xfffffff8, {{0x7, 0x4, 0x2, 0x14, 0x1c, 0x67, 0x0, 0xd3, 0x563803e06f683726, 0x0, @local, @broadcast, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}]}}}}}) r6 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r6, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @reserved}}) ioctl$VIDIOC_S_OUTPUT(r6, 0xc004562f, &(0x7f0000000240)=0x7fff) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x80000020}, 0x54, &(0x7f0000000740)={&(0x7f0000000380)={0x3a4, r3, 0x400, 0x70bd26, 0x25dfdbfb, {}, [{{0x8}, {0x1cc, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x34, 0x4, [{0x9, 0x9, 0x4, 0x7}, {0x6, 0x7f, 0x3, 0x101}, {0x2, 0x4, 0x93, 0x7fff}, {0x4, 0xc, 0xf8, 0xfffffffc}, {0x2, 0x2, 0x9, 0x7}, {0x2, 0x5, 0x3f, 0x1}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r7}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x80000001}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0x3a4}, 0x1, 0x0, 0x0, 0x200080c5}, 0x20004040) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'syztnl0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7800, 0x700, 0x4, 0x8, {{0x7, 0x4, 0x1, 0x8, 0x1c, 0x66, 0x0, 0xfa, 0x2f, 0x0, @remote, @empty, {[@rr={0x7, 0x7, 0x15, [@empty]}, @end]}}}}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, r3, 0x1, 0x70bd28, 0x25dfdbff, {}, [{{0x8, 0x1, r8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x7ff}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000050}, 0x8000) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:16 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000001380)=0x6, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000300)={0x100b, 0x75, 0x1, {0x1000, "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"}}, 0x100b) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000001340)={'syz', 0x0}, &(0x7f0000001380), 0x0, 0x0) 18:36:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x8, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:16 executing program 4: ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000000)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:16 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="ffff0000000000001e00"], 0xa) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r1, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x620, 0x70bd2b, 0x25dfdbfc, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4010}, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x24, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r3, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0) 18:36:16 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='ex?- :[-&\x00'], 0xa) 18:36:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r3, 0x401}}, 0x10) 18:36:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) prctl$PR_SVE_SET_VL(0x32, 0x1b478) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r3, 0x2}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r5, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r5, 0x1c, 0x0, @in={0x2, 0x4e21, @local}}}, 0x90) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r3, r4}}, 0x18) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r6, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r7, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r8, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000000780)={0x8, 0x120, 0xfa00, {0x4, {0xffffffff, 0x7ff, "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", 0x0, 0x4, 0x3f, 0x9, 0x0, 0xf6, 0x20}, r8}}, 0x128) 18:36:16 executing program 2: add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)="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", 0x11d, 0xfffffffffffffffe) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, @default, @bpq0='bpq0\x00', 0x10000, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x20000008, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @null, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000300)}}, 0x18) r3 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)="62593ceb1e513fed1bf1b3fa68496784b2dd09b1760fabac7eff593175a688c8ae3e2d760f9ccee386c7e09848988c6e615472276af373fd132f0c04705ad536f195162de5938d6041aa6e4aa1bee506df62235c748ae0cea0fc67927670020a6f455c9e2e231ad68839671f616d97d125bb8d904581a548a88a0cf0f5ec0e3a1c47e140b0c776ae649b09319606d9725820c62bc17e97471fd94d1e2d17f34642", 0xa1, 0xfffffffffffffff8) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r0, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'digest_null\x00'}}) 18:36:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000), 0x4) 18:36:16 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r1 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000140)='/proc/asound/card0/oss_mixer\x00', 0x0, 0x0) read$proc_mixer(r1, &(0x7f0000000180)=""/44, 0x2c) write$proc_mixer(r1, &(0x7f0000000000)=[{'CD', @val={' \'', 'Capture Switch', '\' '}}], 0x29) 18:36:16 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @reserved}}) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000000)=0x19f) 18:36:16 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[], 0x8) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '\x00'}, 0x6) 18:36:16 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYRESHEX=r0], 0x19) r1 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000080)='0', 0x1) write$6lowpan_enable(r1, &(0x7f0000000080)='1', 0x1) 18:36:17 executing program 2: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:17 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec`0x0, 0x80, 0x1, 0x8001, 0x20, {{0xc, 0x4, 0x2, 0xd, 0x30, 0x64, 0x0, 0x6, 0x29, 0x0, @rand_addr=0x64010100, @private=0xa010100, {[@end, @end, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x14, 0xc9, 0x3, 0x5, [{@local, 0x7}, {@multicast2, 0x5}]}]}}}}}) sendmsg$ETHTOOL_MSG_RINGS_GET(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0xc4, 0x0, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [@HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x20000000}, 0x180) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r3}}, 0x30) 18:36:17 executing program 1: setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000000)=0x8671, 0x4) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:17 executing program 5 (fault-call:2 fault-nth:0): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r2, 0x0, 0x0) ioctl$SIOCNRDECOBS(r2, 0x89e2) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r4, 0x6) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) ioctl$SCSI_IOCTL_STOP_UNIT(r3, 0x6) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000680)={0x1000, 0x40, 0x4, "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"}) 18:36:17 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000080)={r1, 0x16}) 18:36:17 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', '\xabm\x13\xe6\x92'}, 0xfffffffffffffc9b) 18:36:17 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x2c, 0x0, 0x10, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x10}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x42}, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1={0xfc, 0x1, [], 0x1}, 0xb5f1}, r1}}, 0x30) 18:36:17 executing program 1: write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x4e21, @private=0xa010101}}}, 0x90) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x7, 0x40040) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x0, {0x1, 0x4, "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", 0x4, 0x7f, 0x4, 0xb0, 0x80, 0x2, 0x96}}}, 0x128) r2 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000040)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000180)={r3}) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000005f69e5f00"], 0xb) 18:36:17 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r2, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r2, 0x24, 0x0, @ib={0x1b, 0x7ff, 0x3, {"10907e761f428959ac3b9a8cbfde3292"}, 0x80000001, 0xaa2b}}}, 0xa0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000100)=0x1, 0x4) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) socketpair(0x2a, 0x80f, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_EEE_SET(r3, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x118, r4, 0x2, 0x70bd28, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_EEE_ENABLED={0x5}, @ETHTOOL_A_EEE_MODES_OURS={0xd8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x9c, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ':[-&\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ':[-&\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}]}]}, @ETHTOOL_A_BITSET_MASK={0x38, 0x5, "1d29c5b4cca6ace9b641dd0ddc6d671877d54bebbc09ff93f69f3dcd6308684c0603773dd2e8e9e68c3e7c9fe301615f482cc30a"}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}]}, 0x118}, 0x1, 0x0, 0x0, 0x20040081}, 0x4000001) 18:36:17 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x5}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xba}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4000084) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r1, 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x2, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x4, 0x5, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) 18:36:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @empty, 0x22}, r1}}, 0x5) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000080)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), r1, 0x2}}, 0x18) 18:36:17 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x48, 0x15, 0x1, 0x0, 0x0, {0xa}, [@INET_DIAG_REQ_BYTECODE={0x31, 0x1, "9f1fdf3e5b3d9b7c2fc3dbb409eeb355db91c8cda18b724f56a01d3a2b8b50cd58d7f395e615fc50ffe0ed4d93"}]}, 0x48}}, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000300)='xprt_enq_xmit\x00'}, 0x10) write$P9_RREAD(r3, &(0x7f0000000380)={0xb}, 0xb) write$P9_RWRITE(r3, &(0x7f00000000c0)={0xb, 0x77, 0x2, 0x7f}, 0xb) pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RREAD(r4, &(0x7f0000000380)={0xb}, 0xb) write$P9_RLINK(r4, &(0x7f00000003c0)={0x7, 0x47, 0x1}, 0x7) 18:36:17 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="da02000026000000007965000000000000175d0c32f599db1f85a7a5e71157fb669866c81164af88c236b1c50c2b699c902de7c65ee0bc65b314496c6f0867dbd1bae00feca266d2b51a7e5064fab8ea0d1825fea62134e76160bb2ff00773791398027aa58522161ae3a7395f52dd6f28a0876e3c590fc7c64a1ab5d9fdbe65d08b5ca2fb818ec2ed069baa4a0a933aa812a87dda87395b9ca8ad7f9037316bbbd3c4cdcd8552931a976b050eac8b582709812376224d78ba9bcc3da49fca37b1fef9491fd5e943540e1db2a235f5bc899905b42504dda5"], 0xa) 18:36:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @dev, 0x22}, r1}}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r2, &(0x7f0000000100)='freezer.state\x00', 0x2, 0x0) socketpair(0xb, 0xa, 0x5, &(0x7f0000000040)) ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f0000000200)={0x8575a0f4b00c9df0, @vbi={0x2, 0x4, 0x6, 0x20323159, [0xfffffff9, 0x800], [0x72c6, 0x1ff], 0x2}}) 18:36:17 executing program 3: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x7, 0x101000) 18:36:17 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x3, 0x202000) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) 18:36:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x113, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r3}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r3, 0x7}}, 0x10) 18:36:17 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000000)={0x0, 0x3}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000001840)) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r4, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000004c0)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), r4}}, 0x18) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, r5, 0xc30, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_vlan\x00'}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4024800) r6 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x4, 0x4000) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x6c, 0x0, 0x300, 0x70bd27, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x9, 0xfffffff7, 0x2709]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x200}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x4]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x40}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40001}, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r6, 0xc00c642e, &(0x7f0000000280)={0x0, 0x0, r0}) 18:36:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x13f}}, 0x20) 18:36:17 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000040)=0x200, 0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f00000000c0)) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x14) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:17 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r2, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000600)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r2}}, 0x18) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="d0f21bed5118e45e69168160bf80fb18568a61499b4678c5776b017e619722a4909f28a35aba87223128ed3e45a23544fcebd4079c0fd8e0bce053ea6199c8d6b2dd20c367393cd76d4532a79a81760fccd9a7f375c1eebb695863f086c6222f871f51dfc524f0645e919d3bb69c14f78795e7b569259750dcd409c48aceb5c3f8bba6f876ba5c1be923f9e47b70e63e7a535ef06cc5eb23cfc9ea4b819f7f0d27081d81f283129c6efcdb", 0xab, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r4, r3, r0}, 0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={'crct10dif\x00'}}) 18:36:17 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYRESHEX=r1], 0x6f) 18:36:17 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r2 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f00000000c0)) r3 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) 18:36:17 executing program 3: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @bcast, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1000, 0x40c042) 18:36:17 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @empty}, &(0x7f0000000080)=0x10) 18:36:17 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563d0930e4546c32a203a5b2d2600f171a4ccc82c12ded2f521cd3394e6fb11d24527aa0c751a7d74da0843767ef2d1cc7838a9f58a31f30410b15dbaf6f6dde2b31a6f8cd0e27f92c2ffb3988897e7"], 0xa) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 18:36:17 executing program 2: ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000340)={0x3, 0xfb72}) r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r2 = syz_open_dev$vivid(&(0x7f00000000c0)='/dev/video#\x00', 0x1, 0x2) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000300)={0x1, 0x3, 0x2de9afc3, 0x900, 0x10000, 0x2, 0x1}) 18:36:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x0, {0xfffffff8, 0x135155f, "18c8cbe843f891148b201d33f1bef116050804a018a664f53998d6eeb8210343cd8eaaea79a3ed1a2d7baaa38345edf908c78fb38ab10ccb59be3e5b55fa025fba704a5774d621af58204cfda02099afbe3b364c916c72846d9cecb2f5591a13a938a09f08451243edb81bc80f693feb8e1808585ba93fd9d6175daf315df2c92710507e9e639a684a8d0e18ec9b239804ae2ffe216a96e6ce9c05bdf3b5196a9e0970e16c5a15a379514e4ee5f04e1d10f0abefa5f975d6541ae7558ee5eb3dce6b8dd140fdfae9caeba2b754390d3d9d42868b036e9a2cc24a367035705be3adc28705799ad7f324fe9493893bf6894fc6a5a21d1d087aed56e12903f971bd", 0x5, 0x17, 0x7a, 0x5, 0x20, 0xff, 0x7, 0x1}, r2}}, 0x128) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:17 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r2, 0x4, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8400}, 0x1) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000001c0)='THAWED\x00', 0x7) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', ':[-c\x04'}, 0xa) 18:36:17 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000500)="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", 0x10f, 0xfffffffffffffffe) r1 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r1, 0x0, 0x0, 0x0, &(0x7f0000000740)={0x2, 0x0, @local}, 0x10) recvfrom$l2tp(r1, &(0x7f0000000300)=""/158, 0x9e, 0x20, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xffffff6a, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r4, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in6={0xa, 0x4e23, 0x800, @private0={0xfc, 0x0, [], 0x1}, 0x4}}}, 0x90) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x4, r4, 0x10, 0x0, @ib={0x1b, 0x8, 0x3, {"3a5920f57b611a8959872da748ae2bd8"}, 0x7ff, 0x2caf}}}, 0xa0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x200000, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x40}, 0x22}, r2}}, 0x30) 18:36:17 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r2 = getpid() r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r2, r3, 0x0, 0x4, &(0x7f0000000200)='*&$\x00'}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x2, {0xa, 0x4e20, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, r4}}, 0x38) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r6}}, 0x30) 18:36:17 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="65846563203a5b2d2600"], 0xa) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x24, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x24}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r3, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x24, r5, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r3, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r5, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x3ff}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x6}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0xc800}, 0x4000) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r2, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x6}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) 18:36:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r2, 0xc0285629, &(0x7f0000000180)={0x0, 0xfffffff9, 0x7, [], &(0x7f0000000140)}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video2\x00', 0x2, 0x0) 18:36:17 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r1, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{}, {}, {}, {}, {0x0}, {}, {}]}) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{0x1ff, 0x0, 0x7fff, 0x8}, 'syz0\x00', 0x39}) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendmsg$TCPDIAG_GETSOCK(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)={0x4c, 0x12, 0x1, 0x70bd25, 0x25dfdbfe, {0x18, 0xc0, 0x2, 0x20, {0x4e23, 0x4f20, [0x7905, 0x7fffffff, 0x80, 0x80000000], [0x9, 0x101, 0x8000, 0x7], 0x0, [0x9, 0x568]}, 0x4, 0x59}}, 0x4c}, 0x1, 0x0, 0x0, 0x4000851}, 0x40000) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={r2, 0x3}) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4a6d2adfa5ba59ad}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x38, r4, 0x4, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x40080) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:17 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="72036e4e0f7ee6d827eefb4e69cee8e04f23c97c2c0567de8d3c6db4f0d145371a5f5ac53189546e9d095350e7e5257b658751878cc9d08e155bcb5777277ca82aa0396eebd0112c94a1fd389843b66d9b66610dda627da87d1c14385d6df8f068dbf266000800009180abd33aab5769f7254c7d79cd7e0316443d9980a6738112a60f1ec7785e00413d5065f7f35116e18ef1ea4b6175ee0d5e1ba9d6333dfc9b13a03e6dfc3fbcc92e632b6bab81dd56d9e442c68afa5444a6b07b4c8cdca2c06fd6d5ccaa9bacfd69645045676194b1d76d22c50cb5d1e78d710803abe363cac7a65ad597621ec7"], 0xa) 18:36:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, r3}}, 0x38) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:17 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="65786563203a5b2d2600f7dcb186546c1432405fd8128ff441f05b82bcedf05949e1df082140b3b3b8ff14afe3bee09724837451af781788bed64e286e3052beb14ac152b072bb9c456cd0ad0d65eae3e88d4316fb03835082aa"], 0xa) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10, &(0x7f0000000180)=0x8, 0x4) setsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000080)="7904a17bce1b675dee9064aa15c2d2b9930bf83dfb90eb993f8c70fb7a04e59ee0fe73ffff657e94ff7acfec58aaaae134438e5ac0d69dd6e5eb40180538dc86b989d5737f3429686aac483f179f208c912c961cbee30ea574f2922855b24d5f90a2cb1fb7e8fd959f6e2a385498ec2c84cb3c26d19a819e021ce63d8794dedbf1711c945ce6761e7432daf5a3b0b4c686d74a848025eac481f7255f6d2f6e53d5ee60d19ccda9e730a756c08674294083fa7c7c47c32965dce3d16baf94d6cb7d42ceab8c892ba4ac9d7c9097031cd10000fde73487fef2e4cebefa9939d5d8e3af762ef144b86a79bd9e2559f6", 0xee) 18:36:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xb}, 0x22}, r1}}, 0x30) r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) r3 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @reserved}}) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000140)={0x9e0000, 0x0, 0x6, r3, 0x0, &(0x7f0000000100)={0x9b0970, 0x2, [], @string=&(0x7f0000000080)}}) 18:36:17 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 18:36:18 executing program 1: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) 18:36:18 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r2, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r2}}, 0x30) 18:36:18 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '\xc0\v\xdf\xb3\xd5'}, 0xb) 18:36:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000080)={0x400, 0x3, 0x0, 0x6, 0xc5, 0x1, 0xf}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r2}}, 0x30) 18:36:18 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)="1f446491dd2541ada349f1b2685220085fed342b0ab9414106476ad482aebc055b3a25245626b47f9bd0e09926e0d43437074f31a43b739e7d1e1f58a946e1eb016574fd01a0a21c71b13a425d47b7fad1ce48a4d84d1ce56062eea2e9c8fe2dad0601c3432654076558c31eccf9fe4ffb6d8fa7cdd1649c08ce0b549eb148e4057d29bc3f7ecf6d507454fc575e70b3fb814289ecbbfecef9d2cafb11df917f4865506af403d253117cec33ee887728f4f1d80ab689", 0xb6, 0xfffffffffffffffa) r2 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r2}, 0x0, 0x0, 0x0) r3 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000480)="be41d5cc00f586", 0x7, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'sha256_mb\x00'}}) 18:36:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f0000000140)={0x0, 0x1f49, 0x0, [], &(0x7f0000000100)=0x8}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:18 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b201859f0260024f941d192b31f7a87cef47dea1585b189f003eda5ea4e1925b512943d387e676500000000"], 0xffffffffffffff52) 18:36:18 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video2\x00', 0x2, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000000)=0x40, 0x4) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) ioctl$CHAR_RAW_ROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000040)) 18:36:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, &(0x7f0000000100)={0x9, 0x0, [], {0x0, @reserved}}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r5, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000240)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r5}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2={0xfc, 0x2, [], 0x1}, 0x22}, r2}}, 0x30) 18:36:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000019a852fa72fb21acb8000000"], 0x14}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x24, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x24}}, 0x0) socketpair(0x2b, 0x1, 0x7f, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000700), 0x4) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r4, 0x0, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000740)=0x9, &(0x7f0000000780)=0x4) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, r2, 0x900, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xadc}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x4}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'team_slave_0\x00'}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2c004141}, 0x4008000) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r2, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x20}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x40080) r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0xa) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x27c, 0x0, 0x2, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_EEE_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @ETHTOOL_A_EEE_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x1}, @ETHTOOL_A_EEE_MODES_OURS={0x1ec, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x400}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0xc8, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '+\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffd}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffc}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'exec '}]}, {0x4}, {0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '(:.\x0f({}^\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '}{[\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_EEE_ENABLED={0x5}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}]}, 0x27c}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x10, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r7, 0x6, 0x1d, &(0x7f00000007c0), &(0x7f00000001c0)=0x14) 18:36:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x2, r3, 0x30, 0x1, @ib={0x1b, 0x3, 0x1, {"4f20f9b97f4eead7a3beb2b764bed838"}, 0xfffffffffffeffff, 0xffffffffffff8001, 0x7ff}}}, 0xa0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r2, 0x11}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r4}}, 0x30) 18:36:18 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = accept$netrom(r1, 0x0, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000000)=0x30d, 0x4) setsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000080)=0xdb, 0x4) 18:36:18 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) socket$l2tp(0x2, 0x2, 0x73) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x1, {0xffff8001, 0x2, "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", 0x7f, 0xb7, 0x5, 0x0, 0x1, 0x80, 0x8}, r2}}, 0x128) r3 = syz_open_dev$char_raw(&(0x7f0000000040)='/dev/raw/raw#\x00', 0x0, 0x110342) ioctl$CHAR_RAW_REPORTZONE(r3, 0xc0101282, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]) [ 2101.763042] could not allocate digest TFM handle sha256_mb 18:36:18 executing program 2: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000500)={'exec ', '\x00'}, 0x6) r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f00000003c0)="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", 0x105, 0xfffffffffffffffe) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000000)={0xb, 0x75, 0x2}, 0xb) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000300)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffff9) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000540)={0x59, 0x7d, 0x1, {{0x0, 0x43, 0x0, 0x800, {0x10, 0x2, 0x6}, 0xa0000000, 0x4, 0x6, 0x4, 0x5, 'user\x00', 0x0, '', 0x2, '*)', 0x9, '+%]+.,][$'}, 0x1, '{', 0x0, 0xffffffffffffffff}}, 0x59) sendmsg$SOCK_DESTROY(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x1c, 0x15, 0x10, 0x70bd2c, 0x25dfdbfe, {0x1e, 0x2}, [@INET_DIAG_REQ_BYTECODE={0x5, 0x1, "84"}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48000}, 0x0) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r0, r0, r1}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'sha224-avx\x00'}}) 18:36:18 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', ':[-f\x1f\xc3\x905=\xd1\xe8\xb80\xca\xeb?^\\\xde\xb3\xe6\xf8\xd1\x8fV\xf6\xd4\xbd\xd93\x8bF\xca\xda\xa7>9\xa0\x98\xcbA%\x9dz\xba\xed<\xfc\x00\x00\x00\xbb\xff\xfe\nE\x15\xdd\x04\x84\x84\x11\b47\x9090e\xa2D\x96\xe9\xc3\x97\xf3\x82\xf7\xd701\aY+\x8fu\xd9#\xa3\xe5\xd3w\xfbI\x1d\xc0\x02\x8c\xa1\xbb\xbeA\xc1\xec\x84\xa7\xab\xf1b\xa5.\x02]@j\x1d\x9a.Z\\\xe6Q\xc9\x9eW\x8e4\xda\x9e\xe09\xfc\xeeI\x86m=\xb2\x95\xa3]\"\xa9\x192\xac\xfb\xb0sL&\x11t\xdb1*I\xa7e\x92]8\x91P\xa2PPG\xffz,u\xb2\xaeN\xc0q:nE\xe0M\xcc\xea\xe5\xcd\x92a\xaa\xf5S%t\xd1\x8a\xe5\xfd\x91\xd0\xd6&\x13O\xdd\xfa\x06le\xa9\'P\xf5u\a0\xe0\\E\x05a|^\xebS\xdb\xef\xc7\t*\xa8G\xc0\v\xf3\x80!\xba:\x06\x80\xa0\xf4\xc1x\xad\x85\xe4\x8b\xe7V\xde\xfe\xe2\x94\xf0\xc6Ck\x02\xcf\xe1\xcb\x13yt4\xbc\xaf\xab\x96\xb6R\x8a\xe6A\xe0$\xf3\xed\x0e\x16\x9bS\xd4Gi\x95\xc3Y\xedJ\xbea\x15.\xb6\xc4,\xe0/_\x10\xeb\xd5\x00'/316}, 0x142) [ 2101.828427] could not allocate digest TFM handle sha256_mb 18:36:18 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000048ae8170afe3dff4491059c80c9fd21900"], 0xa) 18:36:18 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) socket$l2tp(0x2, 0x2, 0x73) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x7b, 0x1}, 0x7) 18:36:18 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000300)={0x18, 0xf, 0x2, {{0x2, 0x2, 0x7}, 0x40}}, 0x18) 18:36:18 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10, &(0x7f0000000180)=0x8, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000000)=0x9, 0x4) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="c3496563203a5b002600"], 0xa) 18:36:18 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x9}}, 0xfffffffffffffdff) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x2, {0xa, 0x4e23, 0x7, @mcast1, 0xdda}, r1}}, 0x38) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) [ 2101.970336] kauditd_printk_skb: 40 callbacks suppressed [ 2101.970344] audit: type=1400 audit(1608921378.832:554): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=26985 comm="syz-executor.1" [ 2102.006858] audit: type=1400 audit(1608921378.862:555): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=26985 comm="syz-executor.1" 18:36:18 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 18:36:18 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)="200048732854206a0584ecac45e3c6ed299c0393df5827c6f4c56f5671a2c2cac072500d1a8420ce52ce95a420d5dd5912b738f007837ea967f0537bcf505cb6365422b4e92e71645e6395a076285de61de06dc140686763aa23248348b3afc931692006b5cab38ab2650a7554e99c5ca05578fa", 0x74, 0xfffffffffffffff9) 18:36:18 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000000)={0x200, 0xff, 0x3}) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) 18:36:18 executing program 0: socket$nl_sock_diag(0x10, 0x3, 0x4) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x43, 0x0, @private2, 0x1}, r1}}, 0x30) [ 2102.050853] audit: type=1400 audit(1608921378.872:556): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=26992 comm="syz-executor.3" 18:36:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r1, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) [ 2102.123659] audit: type=1400 audit(1608921378.982:557): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=27021 comm="syz-executor.1" 18:36:19 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='e :[-&\x00'], 0xa) 18:36:19 executing program 4: ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000100)={0x0, 0x2}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000040)={0x0, 0x0}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @dev, 0x22}, r1}}, 0x30) r3 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000000200)={0x0, 0x0, [], {0x0, @reserved}}) ioctl$VIDIOC_S_OUTPUT(r3, 0xc004562f, &(0x7f0000000140)=0x345c) r4 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r4, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f00000002c0)={r2}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x20000, 0x0) 18:36:19 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) [ 2102.182195] audit: type=1400 audit(1608921378.982:558): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=27021 comm="syz-executor.1" 18:36:19 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000580)) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000080)) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000001800)=ANY=[@ANYBLOB='exec :[E&\x00'], 0xa) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000000)) 18:36:19 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="00040000203a5b2d2600"], 0xa) 18:36:19 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="44000000cb430a1293799466405792ea09d46fd0195d897c94fbfc3f3b72f133e26bd78e3dc24aca83ffd3f9eca5907d1fb4eaf2b48990c95bb8681a7fec4c31d40727bb5f1d49a3107ea2fc380136d1e427a0493ffe41edf4fc90437d6119761a636f8a665105093da100a83db76cc7e32ee9912608fc969a6bb2c67caf20649e814e2b6a00"/147, @ANYRES16=0x0, @ANYBLOB="000226bd7000fddbdf2505000000080018007f00000108000b00010000000800110001000000050005000100000006000e00090000000600020001000000"], 0x44}, 0x1, 0x0, 0x0, 0x4004}, 0x18000) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={'crc32c-generic\x00'}}) [ 2102.239580] audit: type=1400 audit(1608921379.042:559): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=27022 comm="syz-executor.3" 18:36:19 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @rose}, [@default, @bcast, @null, @default, @null, @rose, @netrom, @default]}, &(0x7f0000000080)=0x48) 18:36:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000080)={0x24, ""/36}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000040)='1', 0x1) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r2}}, 0x30) 18:36:19 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) [ 2102.293521] audit: type=1400 audit(1608921379.042:560): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=27022 comm="syz-executor.3" 18:36:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) [ 2102.349878] audit: type=1400 audit(1608921379.092:561): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=27042 comm="syz-executor.1" 18:36:19 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0xb8, 0x0, 0x2, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x3}, @ETHTOOL_A_CHANNELS_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xfffffff9}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xffff}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x4}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$CHAR_RAW_IOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000080)) write$apparmor_exec(r0, &(0x7f0000000140)={'exec ', ':[-&\x00+0\xff\xf52\x02\x02\'L\xf1E\x98`\x1d\x17\xa7\xbah\xe2\x03D\x03\xc32i{\xb3IL\x11\x10c\xcc-\xdd>\x11\x1cY^\x8b+\xac7,<\xa9\xbd\x82{\x14\'1\x82N/\xf1\xbbd\xda\x8c\xebJ\xbbG\x12\xad\xa6\xeb \xfdV4\xdb\xfb\x86b.P\xb4@\x9e\x85\f\x11\xd9!a\x8d*\x0e\xf7v\xae\xae\t\xd6\a\x1dn\x18Y\xd4\x91\xa6H\xb9>\xe3\xf7\xd0\x99~\x86\xae\xfd:\x98\xd8\x9a\x8eT\x05\xb5vk\x9f\x12*\x04\xbc\x1e5\xee\x86\x82\x82\xc2\x92\x9e{Ov\n\x17\b\x9c\x93\xd0\x98\xe2\x12\x83\xc4\xb5P:X\xe5\x8e\xe3xrl\v\xf9\x02\x00\x00\x00\x00\x00\x00\x827P\xb3\xa7xs\x1b\t\xfe\x98\xf9\xd5\xbf\x86U\x83\xe6Z\xc4)Y\xdd\n\xa47^'}, 0xaf) [ 2102.398700] audit: type=1400 audit(1608921379.152:562): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[E&" pid=27054 comm="syz-executor.1" 18:36:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000700)={'ip_vti0\x00', 0x0, 0x1, 0x8000, 0x8, 0xcba, {{0x16, 0x4, 0x0, 0x36, 0x58, 0x67, 0x0, 0x6, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@rr={0x7, 0x13, 0x2a}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4, 0x8b, 0x1, 0x6}, @cipso={0x86, 0x10, 0x2, [{0x7, 0xfffffffffffffdf1, "d3b5919ac183d5d2"}]}, @timestamp={0x44, 0xc, 0x8b, 0x0, 0x9, [0x8, 0xffffff81]}, @timestamp_addr={0x44, 0x0, 0x57, 0x1, 0x1, [{@multicast1, 0x9256}, {@local}, {@multicast1, 0x3}, {@empty}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000200000000000000000000c7b6896865713aa5ec205bffc188749606939f1799a73560e0ef39dd6ad37c01e302040c933029b57f9b32b5bfe3ca521a784fd7c4602acbc0404e4689a89a7367b53ff532c3df79bee4af108bb1c2a555a6", @ANYRES32=0x0, @ANYBLOB="00100020c3d10004000000074cc2007000660000c1049078ac141438ac1414bb831f0c7f0000017f000001ac01ac1414bbac1e000144061512eec7004408685000000001070b13ac141423ac1414aa00831fe3ac1414bbac1414bbac1414aaac14141ce0000001ac1414bbac1414bb0100"/124]}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000380)={'tunl0\x00', &(0x7f0000000300)={'tunl0\x00', 0x0, 0x7800, 0x0, 0x1, 0x3cb0, {{0x16, 0x4, 0x1, 0x5, 0x58, 0x67, 0x0, 0x1, 0x2f, 0x0, @multicast2, @loopback, {[@generic={0x44, 0xe, "2306c72ce43b4ebbb287cf94"}, @lsrr={0x83, 0x3, 0xf}, @timestamp={0x44, 0x20, 0x53, 0x0, 0x0, [0x6, 0x0, 0x6, 0x4d3, 0x7fff, 0xfffffff8, 0x7f]}, @ssrr={0x89, 0xf, 0xb7, [@rand_addr=0x64010102, @loopback, @dev={0xac, 0x14, 0x14, 0xe}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000400)={'ip_vti0\x00', &(0x7f00000003c0)={'ip_vti0\x00', 0x0, 0x700, 0x8, 0x80000, 0x4, {{0x7, 0x4, 0x2, 0x3d, 0x1c, 0x64, 0x0, 0x2, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x38}, @local, {[@end, @rr={0x7, 0x7, 0x76, [@rand_addr=0x64010102]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'gretap0\x00', &(0x7f0000000440)={'gre0\x00', 0x0, 0x7800, 0x40, 0x8000, 0x8000, {{0xe, 0x4, 0x2, 0x27, 0x38, 0x66, 0x0, 0x81, 0x2f, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x1c}, {[@timestamp={0x44, 0x20, 0xc1, 0x0, 0x0, [0x20, 0x0, 0xd7, 0x5, 0xcb7f, 0x81, 0x1]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000005c0)={'ip_vti0\x00', &(0x7f0000000c00)={'gre0\x00', 0x0, 0x1, 0x7800, 0x5654, 0xffffff4f, {{0x1c, 0x4, 0x0, 0x19, 0x70, 0x67, 0x0, 0x81, 0x2f, 0x0, @multicast1, @loopback, {[@noop, @timestamp={0x44, 0xc, 0xfa, 0x0, 0x4, [0x0, 0x40]}, @timestamp_prespec={0x44, 0x24, 0x79, 0x3, 0x5, [{@remote, 0x2}, {@multicast2, 0xffffffc0}, {@remote, 0x4}, {@multicast2, 0x5}]}, @rr={0x7, 0x17, 0xa, [@local, @multicast1, @dev={0xac, 0x14, 0x14, 0x2a}, @broadcast, @broadcast]}, @rr={0x7, 0x13, 0x76, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x31}, @private=0xa010102, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_RINGS_GET(r2, &(0x7f0000000800)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2020902}, 0xc, &(0x7f0000000a40)={&(0x7f0000000f80)=ANY=[@ANYBLOB="80010000", @ANYRESHEX, @ANYBLOB="100029bd7000ffdbdf250f0000007c000180140002006261746164765f736c6176655f31000008000300020000001400020073797a6b616c6c657231000000000000080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020076657468305f746f5f626f6e640000000800030005000000140002007767320000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="0c0001fa0800030002000000180001801400020076657468315f746f5f627269646765004000018008000100", @ANYRES32=0x0, @ANYBLOB="0800030001000000140002006d61637365633000000000000000000008000100", @ANYRES32=r4, @ANYBLOB="080003000100000008000300010000004800018008000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYBLOB="952f4721a6211961a190dff104a0303a221597974940968be0a4ebcf92706ef27877ce928d3f60c0f9a279ee94603767ca27ae1ec5387e2ebf1b5d97937d89cef6eb3013b9630ecd053c880f8e2630dd1e5b3c2bce45018e57b206370fcf13f0cbfee565374c7522e43657d96b8e35dac875edcc746f0e8d1e069c7fe6b272f4eef78088f1048bc4bd3f13c1ea4125b5e2257820108c75c4285656524ffada97e8fc3d", @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="080003000200000008000300020000001400020077673000000000000000000000000000080003000200000030000180140002006272696467655f736c6176655f30000008000100", @ANYRES32=r7, @ANYBLOB="080003000200000008000100", @ANYRES32=r8, @ANYBLOB="1400018008000100", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB], 0x180}, 0x1, 0x0, 0x0, 0x400c004}, 0x400c089) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r10, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r11, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000001", @ANYRES16=r12, @ANYBLOB="010000000000000000000200000005000500000000000800090000000000"], 0x24}}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r10, &(0x7f0000000a00)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000a80)=ANY=[@ANYBLOB="90000000", @ANYRES16=r12, @ANYBLOB="020026bd7000fddbdf250500000014001f00fe8000000000000400000000000000aa050000000100000000000e00ff010000050007000200000014002000fc01000000000000000000000000e7ff0b00000000050000000000000000f6c7e1b4249494ac14002000ff02000000000000000000000000000100000000f70fde630b998f5bd3a6215f00deead20a41767f9921235b8602e381e40c1e23b4f000d9a8ddb0a3f0649e65afa9d537fb0befa32f45c3c8fadbd2580c02ee69fb6c315cabfabe4543dc86a8f752e09d50d90d109e847ece35e447c9770899f5d6a0496818eb704e25dac4e74c72144ca42f20f33f00000000000000"], 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x4800) r13 = socket$l2tp(0x2, 0x2, 0x73) getsockname$l2tp(r13, &(0x7f0000000840)={0x2, 0x0, @loopback}, &(0x7f0000000880)=0x10) 18:36:19 executing program 3: ioctl$VIDIOC_DBG_S_REGISTER(0xffffffffffffffff, 0x4038564f, &(0x7f0000000000)={{0x1, @name="209a099a078f7328ef37869a4c24bd6680eb26787bcf52478b848e1d247ba6c4"}, 0x8, 0xaf, 0x8001}) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)=ANY=[@ANYBLOB="650600005b2d2600"], 0xa) 18:36:19 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="b5786563203a5b2d0b9e9b7f63b2a771ed111325b262d9ab980d0730b8fd599c6254dacae812266a2edbeb1333247f96923c43b29a5fb080d57c08058cff5af7c0e4787974592392c67026ebc14bd6bdf46ff8580a9b42759862da2d86796c4cc2338488e3a46b0a7044858b9345828459"], 0x71) r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x5, 0x400) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{}, {}]}) 18:36:19 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000340)={'exec ', 'crc\x1b2c-gen\xd3\x80\xba\x14\n'}, 0xfffffffffffffd92) socket$nl_sock_diag(0x10, 0x3, 0x4) pipe2$9p(&(0x7f00000003c0), 0x1800) pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RREAD(r3, &(0x7f0000000380)={0xb}, 0xb) write$P9_RLINK(r3, &(0x7f0000000440)={0x7, 0x47, 0x143}, 0x7) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, &(0x7f00000000c0)={0x7f, 0x1, 0x2e, 0x4, 0x2, 0x81, 0x40}) socketpair(0x26, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x3c, 0x0, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev={0xac, 0x14, 0x14, 0x26}}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}]}, 0x3c}, 0x1, 0x0, 0x0, 0x448c4}, 0x4004000) [ 2102.449045] audit: type=1400 audit(1608921379.252:563): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=27071 comm="syz-executor.3" 18:36:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x3, @private1, 0x5}, r3}}, 0x30) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000200)={r1, 0x2}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r2}}, 0xffffffffffffff5e) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r4, 0x2}}, 0x18) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 18:36:19 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000)=0x5, 0x4) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) socketpair(0x28, 0xcfe253093d1399, 0x1, &(0x7f0000000040)) 18:36:19 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', '@*(\xff\x00'}, 0xb) 18:36:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @in={0x2, 0x4e20, @private=0xa010101}}}, 0x90) 18:36:19 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:19 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec0?[M&\x00'], 0xa) 18:36:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r3}}, 0x30) 18:36:19 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0xffffffffffffff07, 0xfffffffffffffff9) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:19 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '@1\xb2\xee\xa8Yo\xbc\x8c\xb9\x12\xd2h\xb0\x17\x97\x9d\xbcr\xf0\x1d\xd8\xfc@\xba\xe8\xee&9\x1b\n\x16\xe8\xc9\xac\x8a\xa7C]\"Ju\xbd\xccT\x7fw}\f\xf0x\xc5!\x00\xb7\x82\xdf\a\x92)\x01<\xf8\x92\xb8\t\xec\xbbH\xfe\xa4'}, 0x4d) 18:36:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x36, 0xfa00, {0xfffffffffffffffc, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000040)=0x1) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:19 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(0xffffffffffffffff, 0x4038564f, &(0x7f0000000040)={{0x2, @name="911fe56805f3373b08b27ecfd5150b9a318698aa4b78640a8c16da8b33952037"}, 0x8, 0x2, 0x80000001}) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) socket$l2tp(0x2, 0x2, 0x73) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:19 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r2 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000340)={r3}) 18:36:19 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000000)=0x2, 0x4) 18:36:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x13}, 0x22}, r1}}, 0xffffffffffffff11) 18:36:19 executing program 3: setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x501, 0x4) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="657839790461723d80656320966c86473e2761dc"], 0xa) 18:36:19 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="657880632000002f1948de0baec0bdf5a326ea10000000000a554d60bf15ea67b08076ed977a746914420597bcbef0395f3208cf8c3d4645a447d1f350634b3a2d688af40bc2a90bc1a9aa263fdf6c58177b1d75e6d8f8411beab04490d77ff81423d3fceb4345f3e61d2a3dc2d05300e2b060842ae276cf98d8ab"], 0xa) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) 18:36:19 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0805814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c600229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632ce8ee7bfab3113537986bd55765a912b4f5812e4335e1b13afca2470f67", 0xdd, 0xfffffffffffffffd) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r2, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000340)={0x14, 0x88, 0xfa00, {r2, 0x10, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0x90) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r0, r0}, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)={'sha3-256-ce\x00'}}) 18:36:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r1, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000040)={0x0, 0x2}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r2}}, 0x30) 18:36:19 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="ca2600"], 0xa) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @bt={0xa764, 0x8, 0x1, 0x3, 0x9, 0x5, 0x45, 0x6, 0x10010, 0x101, 0x5, 0x4, 0x3, 0x65, 0x9, 0x30, {0x7fffffff, 0xfffffc01}, 0xc8, 0x1}}}) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000000)={0x6}) 18:36:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) getpid() write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x47, 0x2}, 0x7) 18:36:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r3, 0x1}}, 0x18) connect$netrom(r1, &(0x7f00000000c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}, 0x48) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r4, 0x0, 0x0) connect$netrom(r4, &(0x7f0000000140)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000200)=ANY=[@ANYBLOB="0900000003ecf06f29f70e71680000000800000000000000fdffffff000000000500000000000000090000000000000005000000000000000008000000000000ff00000000000000000000000000000008000000000000005c129724000000000200000000000000000400000000000080000000000b00000400000000000000400000000000000000000000000000000100000000000000"]) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40220}, r5}}, 0x30) 18:36:19 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r1, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x24, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, r3, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010100}, @L2TP_ATTR_PEER_SESSION_ID={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, r5, 0x409, 0x0, 0x0, {}, [@SEG6_ATTR_SECRET={0x4}]}, 0x18}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r6, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'erspan0\x00', &(0x7f0000000240)={'erspan0\x00', 0x0, 0x8006, 0x8000, 0x3, 0xffff, {{0x2d, 0x4, 0x1, 0x1, 0xb4, 0x66, 0x0, 0x6, 0x2f, 0x0, @remote, @rand_addr=0x64010100, {[@rr={0x7, 0x1f, 0x56, [@private=0x5, @loopback, @multicast2, @initdev={0xac, 0x1e, 0x9, 0x0}, @remote, @local, @multicast2]}, @ssrr={0x89, 0x1b, 0x65, [@local, @rand_addr=0x64010100, @private=0xa010102, @broadcast, @private=0xa010101, @loopback]}, @cipso={0x86, 0x1e, 0x3, [{0x2, 0xc, "6964caa440bc36d0ea31"}, {0x7, 0xc, "3aea06775001c86b799b"}]}, @cipso={0x86, 0x18, 0x3, [{0x0, 0x4, "936a"}, {0x1, 0xb, "441a77c5be97260d95"}, {0x7, 0x3, "cb"}]}, @timestamp_addr={0x44, 0x2c, 0xcf, 0x1, 0x6, [{@broadcast, 0x5}, {@remote, 0x7}, {@dev={0xac, 0x14, 0x14, 0x18}, 0x2}, {@private=0xa010101, 0x2}, {@multicast1, 0xfffffff9}]}, @end]}}}}}) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r6, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x4, 0x70bd2b, 0x25dfdbfb, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x6}, @ETHTOOL_A_CHANNELS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_CHANNELS_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0xc8a4a5cdd48cbd87) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="100025bd7000fcdbdf25010000000500060004000000050006001f00000067bbb02049ffffff000800000800030004005ada58bfb5cf5e0000"], 0x38}, 0x1, 0x0, 0x0, 0x801}, 0x4000000) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) read$proc_mixer(0xffffffffffffffff, &(0x7f0000000000)=""/211, 0xd3) 18:36:19 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '@\x00\xf1\xff\xff\xff\x00\x00\xc3'}, 0xe) 18:36:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x8000, @dev, 0x22}, r1}}, 0x30) socket$nl_sock_diag(0x10, 0x3, 0x4) 18:36:19 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000200)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x2}}, 0x18) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2102.928599] could not allocate digest TFM handle sha3-256-ce 18:36:19 executing program 4: sendto$netrom(0xffffffffffffffff, &(0x7f0000000200)="800b1cf01016e5af7c6c37ce8d8793ee8e6e45d38db57f11b5d480f88f30da96e96bf8640cea1ef7db1f07859504cefcb046cba6af80d29af1f71a96e16a9e70ea268db11d03e09071463646fff25f8666a6a34c3db9e8ccf3b2208eb13938ab4430dc6babc0b30617291bc871563429a1914eac204ce51651f2508c03e0f7ca8d90eb477b953514cc1379bee3d0513f15d0acb5ad7a48861d1ec76fd01033faaefdcd899aa2cae1db944c4d60d96048bd26d17ed4ee974b89b16997296c927ed8d9c8ed07425026d1e5bc4c3e85ce31fd575e7b0749ae6fc9b46652e99f293d0afca99a70a07f54", 0xe8, 0x5, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x3, 0x0, @dev={0xfe, 0x80, [], 0x29}, 0x22}, r1}}, 0x30) 18:36:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) socket$inet6_udp(0xa, 0x2, 0x0) 18:36:19 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r0, &(0x7f00000007c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000780)={&(0x7f0000000100)={0x668, 0x15, 0x400, 0x70bd29, 0x25dfdbfc, {0x1a, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xfb, 0x1, "d8047b059208bd48f4d011d6b3f8b5f1940edfb6abb8854e7821e34ed56a401f49d09f84d5f6fcde32dd786915d22aea70da393e000dae4059178d57ee6b8758ed9b9ecb606b15870aeeab2d949e10d428fbcf98c0a4e1563fe615247317d8474b929f851bdd66949328ceda1e3b125f022ce059c78ef40fab4ad0ed0d7d21082f61fb6e81cb3a127754637ac8cf971657c24547660fdf32aef42529e4ea3ad592d6b5940feb603518406271979d4610e71354f8e93f022613529783c81e9fbfb4f7340a57ef39272f6cb4e40548e05cf543ffbf6748f0d3169c0766c91f9fb488ea83f9d6b7354c6e8d1baf34be356657f2da99c7a6aa"}, @INET_DIAG_REQ_BYTECODE={0xae, 0x1, "134c194ec22796aba894c77369c3c8f5471bc58fd95c3ea5e6022a559efff35538a36bf8db973a34165aa4a87a06dd4ed63ed23783b22d78e572da36ee7a2f6266b14954a4b72a6c22121d975451c80c1dc44f6c0bff0c03627f77394536910f75e1f0a296bbae3b4b49a7695659899597b016514ba8f2c1ba31eebc6c35d4fa1262785582819930c0916dad2314d060962ee56b79d5d3bb76fc88d59dd662124e0cdd414439521edec5"}, @INET_DIAG_REQ_BYTECODE={0xce, 0x1, "a532e6f3992d064f1ad48f2521624f3b3ddc63eec88b858c321c7426cc4d4ca3f7635d7d8c80bf2d1bdfc91800b161e1dabed07c6caaca52b80563f5cf01b035f412f7925046e72eaaf7408f1e2a6b61e7a341abcd01500a838a331fcc2b0867dd75c5ba791702e381c014f40d189ab864bca6f6ef3c8a00548aa1fdbcee6d654e6f43d490b166e8f9cdcab21ec2f2d18ef2b1e3297050979db61f5f03a72c635a6c4df579f0e23966e716d479586b5ac9159d54e7109114c0ab74474b1cea8ac56675fe814d6766c099"}, @INET_DIAG_REQ_BYTECODE={0xf7, 0x1, "d5b7f9e6f0d07ee9bd9864cb35d64aa724fdd2538fc081a6df00eb843a7a033ce8ef1c800945353ed1fd077681ca6b01232235d911ddfaf700340423e78e500aa2ec7d78931e49e4b5ae68b8f3fb818a4d9cde90cf2252138041c7bef6b95ac9c4ff92bf79fb028b682d561e7c7b793179f01692c1b310d932eab3571af8e59b6fc9a4ce48e556d38edf1080f18fc209a8f88a55ffc6ea900caa9d86b750f326069d2abdef846ef11ca8ef81a9f21de299c0b2eaf5aea4d3f128a03e0522b88c0403f72e5789881e1d463c57cecdf6b006f449a3bec338f642d3647ce30e5140af73bb101d109b8ace2d5a8098414db3768ea4"}, @INET_DIAG_REQ_BYTECODE={0x1a, 0x1, "ea0012473e71222d305f5095bb817ec165423bcf29f3"}, @INET_DIAG_REQ_BYTECODE={0x9c, 0x1, "1e49645c97ce52466438b1586e51770ab92da3b9fc9740d603872001385b277f164898be48374dad13d9e0e213c4cc94bf184540a79e5b7c7023e8bbb93ec92186df0315a36bd4eec8f694edc6f26111695312a5edeeead3c71af1f8a96b0c944cb77988f003f4f5de8ec73d57325acc13d2ef9f6fbc1d330ec28bce55bd3efc4e3470a81d0532e341ca00e50ce752e085521cac80d069d3"}, @INET_DIAG_REQ_BYTECODE={0x1f, 0x1, "b73daeb28ad1e6c0f0320ad4f8a1693c1f94bf005dd9541e6f3fb6"}, @INET_DIAG_REQ_BYTECODE={0x4b, 0x1, "753fb732165dd55a823a2edd53489f16a40fcdbb8075f331a7eb752fb6742e352720f31d4ae222689833fab1701c8493b33b260b02b8e8bd01b4a4c0917105ef02fba47b4c8b18"}, @INET_DIAG_REQ_BYTECODE={0xfb, 0x1, "e28c18eee8b6e61a7cf7d2fa73c8931ea664cb67ecf2948bcfd11198425e50369e8c4338112b094332908269979d9e4657114619fb26d9df0170eaffab63f99fb59f2e999f6f9d9c7a6fa1ab396f1a91bf198222920f321390722965d60303e0142a7451ca8b88768f6785bf60dfb1e973304338c60bd324a392a3ac831965774bce505d4633ea1f10d6f92d64cc189dc49cb6743399d35e743fc7232ecdb8ea1c2394b2403a1ab728053c6cac3b4de8b7fcfed2a49933488dab39672552c77643cbdd2ccb12461126ddc7ea4543d7d6dd9e9fdc8e9fda661dfcaa819a127ccce0321db996120fc53a64cb5ab616937222067a42580f18"}, @INET_DIAG_REQ_BYTECODE={0xbd, 0x1, "40a9c389a05d798b19c1c188e3e62ef472027640854adb26dff8b97ff8dae14cb37707d9b681dc0377c1c2e6506953e5f6d4dfda153d69ef8a41f34445d7c0dbbacbcfa5a8a7029b79e73e213d4014f3b095a18e32384de204cc356acdb606e3eac889e336233c4f36c82eabd0492cedf7053b3c3ca98a996249d0aedc15989940c2c5ae3fc502510c4b7ac2ff0e14cf6bd41eb614f0d63d49498d8be5c5c124f8b9df9025ad20c7453ec04d5e138f3d1fc6615528b8e069b9"}]}, 0x668}}, 0x20040000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[], 0x8) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FREEZING\x00', 0x9) write$apparmor_exec(r1, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:19 executing program 2: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) [ 2103.024361] could not allocate digest TFM handle sha3-256-ce 18:36:19 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000000)=0xfffffe01, &(0x7f0000000040)=0x4) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="6578866301005b2d26005c4fc0074ab51cb67242c1"], 0xa) r2 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000280)={0x8, 0x3, 0x40, 0x0, 0x0}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x5, 0xf3f08fb6, 0x9, 0x2, 0x81, 0xffffffffffffffff, 0x9a, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000380)={'gre0\x00', &(0x7f00000001c0)={'gre0\x00', 0x0, 0x8000, 0x7, 0x6b, 0x4, {{0xb, 0x4, 0x0, 0x9, 0x2c, 0x66, 0x0, 0x91, 0x2f, 0x0, @empty, @rand_addr=0x64010101, {[@timestamp={0x44, 0x18, 0x3a, 0x0, 0xd, [0x1f, 0xffffff01, 0x80000000, 0x3ff, 0x1]}]}}}}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, [@jmp={0x5, 0x1, 0xd, 0xa, 0x8, 0xfffffffffffffff0, 0x10}, @ldst={0x1, 0x1, 0x2, 0x2, 0x9, 0x2, 0x10}, @map_val={0x18, 0x0, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x81}, @ldst={0x0, 0x3, 0x1, 0x6, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000180)='GPL\x00', 0x7, 0xbd, &(0x7f00000002c0)=""/189, 0x41000, 0x18, [], r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0xf, 0xfff, 0xa8a}, 0x10}, 0x78) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f0000000240)={r3}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f0000000080)={r3}) 18:36:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0xfffffffffffffffd, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x15) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:20 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) socket$inet_smc(0x2b, 0x1, 0x0) 18:36:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=@gcm_256={{0x303}, "3158efc9e68d5cb1", "18583bd580dfb72fb3f451258c68d6c43b074fbbe7991cedf474d33e7f2fc856", "cb3a24b2", "a4ffa27f14778327"}, 0x38) 18:36:20 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000300)={{0x3, @bcast}, [@netrom, @remote, @default, @rose, @default, @default, @default, @null]}, &(0x7f00000000c0)=0x48, 0x80000) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000380)=0x9, &(0x7f00000003c0)=0x4) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'sha224-avx\x00'}}) prctl$PR_MCE_KILL_GET(0x22) 18:36:20 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x33, 0x1}, 0x7) accept$netrom(r1, 0x0, 0x0) pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RREAD(r2, &(0x7f0000000380)={0xb}, 0xb) write$P9_RFSYNC(r2, &(0x7f00000000c0)={0x7, 0x33, 0x1}, 0x7) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000000)=0x99, &(0x7f0000000040)=0x4) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x24, r5, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x60, r5, 0x200, 0x40000000, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x7}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x40}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1}, @L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x40}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xff}]}, 0x60}, 0x1, 0x0, 0x0, 0x810}, 0xc000) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x1a}, 0x4}, r1}}, 0x30) 18:36:20 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='eye\x00'], 0xa) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x80000000, @private2={0xfc, 0x2, [], 0x1}, 0x2}}}, 0x38) 18:36:20 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$CHAR_RAW_RESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000040)={0x2, 0x9}) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:20 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x5) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) r2 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000400)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), 0xffffffffffffffff, 0x2}}, 0x18) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000100)={0x0, &(0x7f0000000680)=""/4096}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000480)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000500)={0x4, 0x8, 0xfa00, {r5, 0x80}}, 0x10) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f00000000c0)) r6 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x8, 0x501000) ioctl$DRM_IOCTL_GEM_FLINK(r6, 0xc008640a, &(0x7f0000000180)) r7 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001680)=ANY=[@ANYBLOB="80030000", @ANYRES16=0x0, @ANYBLOB="200025bd7000fbdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="b00102804c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e670000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000010000008000600", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="780002803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="2c0102803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000100000008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600c6dfc12ab5e73cfb280140e94c81533e211fb0510950a22d8659a329f874da823e0086eee098a55f1c4fdbf5bf5c81b33f1334ab9c1d5a010a73b6945d3b24d9c8f964ce7d059bf698dd58c632bae76fd44508e73520b04e1a6a3dc4d48e6bfaa34728302dce614d3142be0a84215331f6a00246fec611f170d7fcd8a2f6a089e7a250b3778ff68b4c2589ebcfc7e616", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400090000003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB], 0x380}, 0x1, 0x0, 0x0, 0x4055}, 0x40cc) sendto$l2tp(r7, 0x0, 0x0, 0x0, &(0x7f0000000740)={0x2, 0x0, @local}, 0x10) connect$l2tp(r7, &(0x7f0000000540)={0x2, 0x0, @empty, 0x4}, 0x10) ioctl$DRM_IOCTL_RM_CTX(r3, 0xc0086421, &(0x7f0000000580)={0x0, 0x1}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000040)) 18:36:20 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000400)={'ip_vti0\x00', &(0x7f0000000340)={'gretap0\x00', 0x0, 0x7, 0x8, 0x8, 0x811, {{0x1b, 0x4, 0x1, 0x3d, 0x6c, 0x68, 0x0, 0x1, 0x29, 0x0, @empty, @multicast1, {[@timestamp_addr={0x44, 0x1c, 0x88, 0x1, 0x7, [{@rand_addr=0x64010102, 0x1}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, {@loopback, 0x437}]}, @rr={0x7, 0xb, 0x91, [@loopback, @loopback]}, @rr={0x7, 0x1f, 0xa5, [@loopback, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @broadcast, @remote, @broadcast]}, @timestamp={0x44, 0x10, 0x58, 0x0, 0x4, [0x6, 0xe21ce3fb, 0x5]}]}}}}}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000600)={&(0x7f0000000440)={0x198, 0x0, 0xc00, 0x70bd27, 0x25dfdbfd, {}, [@ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x4}, @ETHTOOL_A_EEE_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0xffffffff}, @ETHTOOL_A_EEE_MODES_OURS={0xf0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xe5, 0x5, "ba76ef8c8fe373aaeec0527cb705c13505f2aa9928e47e25bad33dbe495324b38f48907a99a5bf83704e811320d9a16b20c4e4043a0d0d16ab6d3554991e09e2ceb8b3768d1f868a91be01445f978ec24bd6986a584fbe86a91fccd9eab712ce0cce7f8d7576723ff30756d9f331244a669e4368915adec3329d0b0a4dc5844b0bcb0354fc81effed82b68401032502d6ac2977b96334a1a44eed35713657fda8d318abc4f63dfb303aea323b5231205e9d3dd8587081658f0a7d6d90303357814dbf3ca9ee41b159355cd5223442c121e8c91a59a46449ff4cd12a9d604ac63fb"}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}]}, 0x198}, 0x1, 0x0, 0x0, 0x4800}, 0x4008004) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x9, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="600000001300000829bd7000fedbdf251e056ab14e204e20030000000200000000800400000000000000000001800000000000807f000000", @ANYRES32=0x0, @ANYBLOB="010000000600000006000000cc833c24becb9be8df0931f22e00"], 0x60}, 0x1, 0x0, 0x0, 0x20004840}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:20 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r1 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r1, 0x0, 0x0, 0x0, &(0x7f0000000740)={0x2, 0x0, @local}, 0x10) sendto$l2tp(r1, &(0x7f0000000000)="3ad7ee8e3c4129fa31650bfeb8c4a2010f03948cc122146490dfccdd1f6f103564ae8d680215ad1a7b154e51f735411b96b1b2b5d6e69bb714311bb6c05c8993bd5d9dfbae789d52c03af3138db5103a0189eccc60b5d0fce988d809429df70097ec4ce20e98befeabd31b40d697e6af4de5abe7d3e001964d66680b660b953fa26cd105742028b5a5de298af54e541d3bbfdf118d692c0b30556fdfec87b73d0e3995fff6f824bab426e4ee075bcf77426b6d4f5772769682309fca6cb420cbf4cca19dbc79a9f166f219338ef69606415b62e2c2d789d51aec360db885ab5e78b54830eff3ea504b3f983d3c51458690", 0xf1, 0x8800, &(0x7f0000000100)={0x2, 0x0, @local, 0x3}, 0x10) 18:36:20 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x561d, 0x400000) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000100)={0x3f, ""/63}) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000000)) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000000080)={{0x2, @addr=0x80}, 0x8, 0x20, 0xf1f}) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:20 executing program 2: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000300)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a5c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc15822a42a2d13c82e1e8e0bceedb96cd6915e041b29938277ec1", 0xc5, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, &(0x7f0000000040)={0x101, 0x1, 0x10000, 0x6, 0x3, 0xffffffff, 0x200}) sendto$l2tp(0xffffffffffffffff, &(0x7f0000000400)="42f1fbc3e4c49e513729f3f5a6930d6782a95ef37bbb6766411d0d650ef6fec0265036ed156d4ffddedcb36f02adf5aa24e4cafc9fab98f94c96885f70beb0b881d71a10c220344c7f6d7f8f4ac7b765b29197da115c055e36dfaf7d626bc959faf2fde56108d65cf5ebefa8babb99a08783a7ad5b193d390c177c0b22a8ecb883f97baa7b9eb6c64436b7cd8e6072c8a1d2b801902261233a4d8f3d15f392a4277ac65a6f681fe48ed785c4764e6a7797ae47e7a72993600e5a2a6a9056937c309058c48bb481f1d227ae468ae284bf0260875d4e4b7284749a20d28d3533", 0xdf, 0x800, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f00000000c0)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x2, &(0x7f0000000180)=[{}, {0x0}]}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000200)={r1, 0x21}) 18:36:20 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140)=0x8, &(0x7f0000000180)=0x4) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="65786563203841afb56a48a0d2edf7da051a9620096459e07eb53bf528f63dc7f0e020fd030e7a22153c94d6588807ff3bd2e630cfec287e894899d2209da6c8b467509fa3eda2d47b4a38d77a084187f66a4272b48b4d7a6d3a225f11e6c1b9639b2ca2e883b85176c96bf0895e3b368fa6636cc8ff4f7128819cd844bd53d8bb9d69e9521579e539c82c009c18a545af695d48599a93b38df249772760"], 0xa) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0), 0x111, 0x8}}, 0x20) 18:36:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xfd}, 0x22}, r1}}, 0x30) 18:36:20 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:20 executing program 5: syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00') r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:20 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) 18:36:20 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f0000000180)=0x8, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x8, 0x6bae, 0x1, 0x1000, 0x5}, 0x14) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000001800)=ANY=[@ANYBLOB='e\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa) 18:36:20 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000300)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3d792b11632ce1dbc4f0fa9b0f2cde61617a215f692a88fdb6f379386a8ebf79a69de7f24080bb108930e9f1c31173b302eeb959d68b7b312cfb23ec478172fc4fcc00734cb17b5766f230a317ed8670c49a92add7585d00f9d636cfdf6eaf137997f38abcc06da04af357e6d49a79d85a0b80", 0x12d, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) sendto$netrom(0xffffffffffffffff, &(0x7f0000000100)="5662132672704ed5ac4c8059ea95b7c849f7eae2eac02a79fdeec0f45665dc3ae34eacde167bf8d1519175b65c506b9b79583809b543ceea3082bb1bf75ab5268828385d95e97e6a0cf23d46c83436a17abfdfbeb8f5ad6867960da882d344ee9e4f74ee145c018d5e4373112a3131f34b81ade7667c70a3650c27b3cfe5ebcc58fad251721b92131dd8d073425ccc7ac54ab47e974fe7d3708ae09d96c386", 0x9f, 0x8000, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x48) 18:36:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:20 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:20 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r4, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r4, r0}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:20 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="73745ebb681d6025423081"], 0xb) ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f0000000040)={0x9, @pix_mp={0x6, 0x86c7, 0x32314d56, 0x2, 0x0, [{0x2, 0x1000}, {0x400, 0x6}, {0x40000000, 0x10000}, {0x100, 0x6}, {0x3, 0x81}, {0x3, 0x4}, {0x5, 0x1}, {0x8, 0x8}], 0xff, 0x7f, 0x7, 0x2, 0x5}}) 18:36:20 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="65781f00000000000000"], 0xa) 18:36:20 executing program 1: socketpair(0x8, 0x800, 0x1000, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x10, 0x8000, 0xc1ec, 0x800, {{0x11, 0x4, 0x1, 0x14, 0x44, 0x66, 0x0, 0x0, 0x2f, 0x0, @private=0xa010101, @empty, {[@lsrr={0x83, 0x1f, 0xa6, [@dev, @broadcast, @empty, @rand_addr=0x64010101, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2]}, @noop, @rr={0x7, 0xf, 0xe, [@private=0xa010102, @multicast1, @multicast1]}]}}}}}) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000200)='0', 0x1) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', ' \x00\x00\x00\x00\xe4\x1c\x82\xd2\x99u3\xee\xa6\xa8\x84\xc2\x0e\xa80\xa4\xe07=\x00\x00\x00\x00\x00\x00\x00\x00\xaa\xa5\xa0M\xc0gd\x8d\xb1\x06r\xc2aC\x83\xf6D\x15\xa44\xa2\xabCx\xf8\xd1\x18\x93\x9e\xdb\xf9 \xfe\x8d\x91\xcem\x8c\xc6\xb4\xa3YM\xa0#\xf5\x12\xa2?twC\xd4\xd8\xd5\xa4\x867\xd0q\x00NP\x19-\x81\xcdI\x8c\xd4\xb8\x0f@`n2\xa36\x15\x05\xbc^\xb7\x8bt\x05\xc9EKT\xfd\x19\xcd\xdc8r0J\xa6\xc0\x96\xbcvN\x99\xdf\x10\x8c\xb3%\x82*\xf3<[\xe8=F\x00g\xb2\x86B\xa0#I[\xf7'}, 0xa5) socketpair(0x1f, 0x0, 0x7, &(0x7f00000001c0)) 18:36:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @local, 0x40020}, r1}}, 0x30) 18:36:20 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r2}, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f00000004c0)={0xf, 0x3, 0xfa00, {0xffffffffffffffff, 0xa}}, 0x10) getpeername$netrom(r3, &(0x7f0000000400)={{}, [@default, @rose, @bcast, @default, @netrom, @remote, @remote, @netrom]}, &(0x7f0000000500)=0x48) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r0, r0, r2}, &(0x7f0000000300)=""/237, 0xed, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:20 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', 'G@\xe0\xe8\x0e{l\xc5\x81\x96\xecr\x83\xc1\xc5\"\xd1\x86H\xd0\x15\x9eE\xa4\x1f\xe5\x90\x84\xaa\xe4l!\xdc\xff\x10\x88\x9dz\x9f\xcf\xc5\x80\xe0\x7f\xfe\x85\xee\x8bl\xf0\x9d\xff\a\x00\x00\x00\x00\x00\x00\xba_G\xc5\xb6\x86'}, 0x47) 18:36:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) socket$nl_sock_diag(0x10, 0x3, 0x4) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:20 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="6578040b000000000000"], 0xa) 18:36:20 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x0, 0x284402) ioctl$CHAR_RAW_FRASET(r1, 0x1264, 0x0) ioctl$CHAR_RAW_IOOPT(r1, 0x1279, &(0x7f0000000280)) ioctl$CHAR_RAW_ROGET(r1, 0x125e, &(0x7f00000002c0)) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x2, 0x3ff, 0x0, 0x7, 0x8]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80000001}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x75}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x2045) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='reno\x00', 0x5) write$apparmor_exec(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xa) 18:36:20 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="6559eebee4030000009d0100000000000000090000"], 0xa) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000200)={0x5, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000340), 0x13f}}, 0x20) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') 18:36:20 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYRES64=r0], 0xa) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 18:36:20 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000040)={0x2}) 18:36:20 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x6800) write$P9_RREMOVE(r2, &(0x7f0000000300)={0x7, 0x7b, 0x2}, 0x7) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:20 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'stack ', ':[-S\x00\xb3)\x03\xeb\xee~\xb2\'\xfe\x1f\xcf\xabh\xd3\xecO\x84\x9c\xef\xcbfO\xf1\\\x11\x1e\xddp\xdd\x81\x94\x97\x81\b\xa7e\x12\xc7o\xbe\xac\x82\x9c\n\xcf\x997F@\x1di\xf8n\x85\x01\x1bw\x0e\xd7\xe3\xd0\xd2\xac\xe5\xa7\x86\xa2\x13Ig\xc9\v\x04\n\x8e\x0e\x99\x98H\xcf\x11$\xdc\xdccJW\x89c\xc3N%\xc3K,Y\xc6\xc7\xc8\xf9\x94\xbb\xadd>\xde~\xe1\xa6\xa2\x1e\xad\vLgO\xb1[\xb6\xa5\xe1\x1fJ\xaa\xcc\xf4\x04B\xa6\xb1\xd5\xa2\x82\xa6\xef\x17P\x940`/\xdb\x0f\xc7$\xf6\x8c\v\xd48>\xdb\x05^\xd4\xe3\xcf\xf7q\xee\x98\x82\xf7\xcd\x9f{\xb3K\xc1\xca\"\xd6\xd1}s\xa7'}, 0xbb) 18:36:20 executing program 4: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @reserved}}) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000040)={{0x3, @name="3b44fe0185923f34376db1314d2e7061522de3dc1d0034a50a3180865e4699a0"}, 0x8, 0x9, 0x4}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r4 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x20, 0x701203) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000180)={0x80000000, 0x200, 0x10000}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r3}}, 0x30) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000100), 0x0, r3, 0x1c, 0x0, @in6={0xa, 0x4e24, 0x6, @private1, 0x2}}}, 0xa0) 18:36:20 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:20 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000300)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a32cd05ba024d8b73b398db16503f4bb27652ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fad06000000ac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d8646576b03f5749c29cdcce667b8481c8a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce18756abb94c36fdf97376e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653da4fac2fabdd6104cf501ce", 0xcc, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:20 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[], 0xa) 18:36:20 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x80100) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, r1}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x22}, r2}}, 0x88) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000200)={0x7, 0x8, 0xfa00, {r4, 0x3}}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000100)=0x4, 0x4) 18:36:20 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB], 0xa) 18:36:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}, 0x9}}}, 0x90) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={r2}) 18:36:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:20 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r2 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r2}, 0x0, 0x0, 0x0) add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000680)={'syz', 0x1}, &(0x7f00000006c0)="7f4d7483c429940c8e9b66717817be2278e29f915fc8e318f57620e86a9da80bfdb414bc9553a02304ecf3bce792e199f6d650968f9058f4c65d2886ee65682c388c5763fda21e4f37af4b8da27ad73d3845de193e9cc2a568f2fc6c1abd96116884d10a9180a3ac6a975a75a4fd8e492cd49727a7228d3e7352cf7f983e02269e50a9494104aeeb73532d0ae99667f5c65e0e89ae6a20e6be1eaf0321a6619201fc97108ccf76df4726b68945f27cd16f40240b1bc7eb1d2d581a936b63718246b8b888c767939f956f9027924ee3d7200b957dff833bc118a8cb055a738372a98466b7eefd5947ba4a47baa467", 0xee, 0xfffffffffffffff9) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)="ed5c06829362b20b13424cc10dd7a1d89ab7bb2b9a15e9d0b1fdb4a0b0e601c05462676f02ae00470b9003b8e787fdb86a5ce69af3c71a1f147894702d2de09853b2ca96c338596dd60ea26f2dc59747694b87c888c65d1b6802b2a8fccfb7ed915ff1bacf74d6fe0e2756f5c69194cda34f56c45dc090c39ab1", 0x7a, 0xfffffffffffffffc) r4 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r4}, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r2, r3, r4}, &(0x7f0000000400)=""/215, 0xd7, &(0x7f0000000600)={&(0x7f0000000500)={'ghash-ce\x00'}, &(0x7f0000000540)="0d382adee95aeabc3dfedfa225ac7274a14677b36e5f19fefddb08e67790d88fe1c14484f146920f014bbe7da10779606dac8a512c96f6004f2c65ba7643b87e2d35a3a289d67ebf9762f0176faa1b7d4f4295d1d3cecb0ddc079a16746cc27c7affbf11cfee851ae44b3760568ee05fbdd4a0024ea3122aad45776e94641368f97c7e88581ddd957d431830d693e20dfb53f41bd6986c4a46e3f5308a5710f833a88f5049b1be1de0ebc8d32336c28adf76", 0xb2}) 18:36:20 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001100)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000000)=@raw=[@ldst={0x1, 0x3, 0x0, 0x0, 0x8, 0xfffffffffffffff4, 0x1}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1f}], &(0x7f0000000040)='GPL\x00', 0x8001, 0x1000, &(0x7f0000000080)=""/4096, 0x40f00, 0x1, [], 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000001080)={0x5, 0x4}, 0x8, 0x10, &(0x7f00000010c0)={0x1, 0x2, 0x8ec8, 0x3df}, 0x10, 0x9201}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000001180)={0x0, r1}, 0x10) write$apparmor_exec(r0, &(0x7f00000011c0)=ANY=[@ANYBLOB="09ed00af5410266d3fa0f742aff716224d2d9b88dfc5138122772cdbe8df99901bad42619a5a5bc7d0569ef2ad041b761a76a7a7806bb465079fd07ad9e35d5a766ea65d25360f240cfd23b222e339c8eecf12e03cc5a53ce4735f6bd6ebd8e4eff7a03234e19c4fc48189a51e78a3c0c1eeacb87ac3d793750733e066058b034df77713b5fd2fe4ffb7875797b03166b98081bac90f62f3acfbae8ba5347af22d7d3fa8a6911a30235ae198"], 0xa) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r2, 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f0000001280)={0x0, @null, @rose={'rose', 0x0}, 0x6, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x800, 0x3, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001340)={0x1b, 0x80000001, 0x5, 0x2cc, 0x1, 0xffffffffffffffff, 0xa5e, [], 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000014c0)={r3, &(0x7f0000001380)="55acec23a277918b5a7a12e08b7c593017fc25ebd1af7a35c1d5ff84fa1ab7031d8d9593e846e22f98327d1959ce70f124f177e26e289b780d2a2455809c98097c7e159f93d849d08b11474814b29ac8d96f2d8bfe92cc55bb14464d7fd6efdf0c2af9cf2c40c50f8487c937df7480849ed1b459ffa4f8659c0307f4b5db6e5082894c5504867ea7ef8983fef9540c74c3fe3ed221b94a42db22c68a6b266200b3dbd6c381f0f9de781fd94566dc1eb6a1094f9e085127113d14683026d4f510b7ff9a2011b931310246d0d029cabafb542935f1ee92", &(0x7f0000001480)=@tcp, 0x1}, 0x20) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000001300)=0x17, 0x4) 18:36:20 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="65786563203b5b2d26000e4c41f4520000000000000063ae18aa0ce88dab65af468c11c80d1e8a9a6cc7636ef5d2f3c8ec8345da67fc7c58947c59d69098163459b8fde40fe26eb9e984b7e8b2754414d9000000000000000000"], 0xa) 18:36:21 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000000)={0x3, 0x0, [{}, {}, {}]}) 18:36:21 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x80, 0x0) write$vga_arbiter(r1, &(0x7f0000000300)=@target_default='target default\x00', 0xf) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:21 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r2, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r2, 0x5}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r5, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x7, @private1={0xfc, 0x1, [], 0x1}, 0x9}, r5}}, 0x30) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {r1, 0x7}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r4, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r4, 0x6}}, 0x10) 18:36:21 executing program 2: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000580)) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000440)={0x3ff, 0x6, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000480)={r3}) r4 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000300)={{0x3, @rose}, [@default, @rose, @default, @bcast, @bcast, @bcast, @netrom, @bcast]}, &(0x7f00000000c0)=0x48, 0x800) r5 = syz_open_dev$vivid(&(0x7f00000004c0)='/dev/video#\x00', 0x3, 0x2) ioctl$VIDIOC_SUBDEV_S_EDID(r5, 0xc0285629, &(0x7f00000005c0)={0x0, 0xfc13, 0xffffffff, [], &(0x7f0000000500)=0x29}) getsockname$netrom(r4, &(0x7f0000000380)={{}, [@null, @bcast, @bcast, @default, @default, @remote, @null, @netrom]}, &(0x7f0000000400)=0x48) 18:36:21 executing program 3: ioctl$VIDIOC_G_PARM(0xffffffffffffffff, 0xc0cc5615, &(0x7f0000000000)={0xa, @capture={0x0, 0x0, {0x8001, 0x9351}, 0x7f}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000180)='l2tp\x00') r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="65786543203a5b6d2600f76a0f6715a51a5c56872060f7b5313b17d26f7156973f26f254115ca262e29331078fbc8cd4cc73591367fcd4589174d99dc850fd54e83bb2fdb32d831c836016b7acb281dad783c7035ea3e854685184ed923901c6"], 0xa) 18:36:21 executing program 4: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="65786563202f6465762f696e66696e6962616e642f72646d615f636d00504de782150ec1614138cfc33b77b511ac6086da66cc6e1e7c3271e36576c266881570f63eb6f9ff1f3fffb1e3574631a6171d2c5e709436016279a06261dc87da487687cc53f3a47a94fc9b32e55f44bebf4c9b2bf40cf7abfc6391cf9ee5f572f2f66a6e58a47864841ac5c7e811cbd5fc2e2aa993be107100444aaa847e7f008054"], 0x1d) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000b80)=ANY=[@ANYBLOB="00000000a632000000000000c2fcbebd5b6424509ed9883b76ee2821aedcbe35b2ddd9b66d54985f2e8a2825d0edbe8fd84f65b8551c5294693b5576a06506a21a2b82f677ccda0a9c511ec148f891cac75a6a8ecffd927d580a20071f9d430f2140e6d72aaddf27032fecef8c52d3abb7596f3206ce206e67d10b060000000000000000000000000091ae81368d31f7b5fef2633868c2457c596f8f3dc0596aed45e7f309a8a9bc17bd44c8444898ec287849dece1147125e"]) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e23, 0x4, @empty, 0x10000}}}, 0xa0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000c40)={&(0x7f00000002c0)={0x30, r5, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x7}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r6, 0x2}}, 0x18) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'erspan0\x00', &(0x7f0000000780)={'syztnl1\x00', 0x0, 0x80, 0x40, 0xc9, 0x0, {{0x2e, 0x4, 0x3, 0x7, 0xb8, 0x64, 0x0, 0x62, 0x2b, 0x0, @dev={0xac, 0x14, 0x14, 0x34}, @multicast2, {[@rr={0x7, 0xb, 0x74, [@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0xb, 0xbd, [@remote, @remote]}, @ssrr={0x89, 0x27, 0x5a, [@multicast2, @rand_addr=0x64010101, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @private=0xa0100ff, @empty, @empty, @remote]}, @timestamp_prespec={0x44, 0x24, 0x13, 0x3, 0xd, [{@remote}, {@local, 0xfff}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x7f}, {@local}]}, @timestamp_addr={0x44, 0x34, 0x1f, 0x1, 0x6, [{@multicast1, 0x9538}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@rand_addr=0x64010100, 0x7fff}, {@loopback, 0x6723}]}, @timestamp_prespec={0x44, 0xc, 0x2f, 0x3, 0x6, [{@local, 0x6}]}]}}}}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r8, &(0x7f0000000b40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000880)=ANY=[@ANYBLOB="6c020000", @ANYRES16=r9, @ANYBLOB="10002cbd7000ffdbdf250300000008000100", @ANYRES32=r10, @ANYBLOB="7c0002803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r11, @ANYBLOB="080009000000000000000001", @ANYRES32=0x0, @ANYBLOB="4801028038000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300030000000800040003000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000700000008000600", @ANYRES32=0x0, @ANYBLOB="4c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e6700000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000800000008000600", @ANYRES32=0x0, @ANYBLOB="400001002400010071756575655f6964000000000000000000000000000000000000000000000000050003000300000008000400ffffff7f08000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="7c00028038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000005000300030000000800040061000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000000000008000600", @ANYRES32=0x0, @ANYBLOB], 0x26c}, 0x1, 0x0, 0x0, 0x84}, 0x4004001) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x2, r6, 0x30, 0x0, @in6={0xa, 0x4e23, 0x40006, @remote, 0x6}}}, 0xa0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r2}}, 0x30) 18:36:21 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8c8080802c78f4e0c79fde2e9d057d43aea4c849703c997e153152f0d7b79a1236c2fd69a17df725b74757a5bf1f18ecf8e44006bfcf3f7acc5af001f40fcbbabc8cd6dc2af849249dbc5945b74536a53b8c5510d9db0a0f8f85040000000000000004ff4ed7b26ab8b67bd99523ba100f2d2327a295b9f43066647e832c5b982a5c05be0b0e7437ca4c2d14adb980b69e5e3c47dbe9c00645e466378133803daaa8925f4139a994f489dd07d72c498f7badeb092bed6f836dae316f9613323105"], 0xa) 18:36:21 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec :{-&\x00'], 0xa) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e21, @remote}}}, 0xa0) pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RREAD(r1, &(0x7f0000000380)={0xb}, 0xb) write$P9_RMKDIR(r1, &(0x7f0000000100)={0x14, 0x49, 0x1, {0x80, 0x0, 0x4}}, 0x14) 18:36:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000300)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r1, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x40000) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r2}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:21 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000040)={0x258, 0x13, 0x719, 0x70bd25, 0x25dfdbfb, {0x4, 0x9, 0x8, 0x21, {0x4e23, 0x4e20, [0x7fff, 0x0, 0x0, 0x9], [0x100, 0x9, 0x1000, 0x6], 0x0, [0xb, 0x4]}, 0x6, 0x6}, [@INET_DIAG_REQ_BYTECODE={0x9b, 0x1, "b0a53435ae8d4be9d252ade1f56eebb340e560502b28439156d6cd18686fddca4c8decef2788b40c5870771c91d4bf52781b764d15e2d8a242622a228668403945a85dabfea7c587f243d274c6ece6391a4ab441cdbb04255c523c0a65c23fded4f5effc2d06f7a82c90e9ce96038201dbf0cb1c31e3006e428500fda656b75dbc6e8425e6ab02ab5c2585718ac0d8247db43374ba11ae"}, @INET_DIAG_REQ_BYTECODE={0xfb, 0x1, "010d0fe093a9d67bc5de212965973e24cfbfeb9ff8a4a8295fe02c9d5451aa1efa7355a2ba492dee2c7d3c76d621559fbf0eac2f956cbcd979fdbf0a4c9709a1d20ea06f914eecb6d08ee90a2de9acd2534df8c1356719437db0bcfdfa002d977fa3d6c40ca985b16f3480451be8626788817606a60724673cac9b739b932ba5d7000c55a1df04c0176dbcf09dbc166cae3d5a70bd983c364d4293248f806425b43bcd0d6ed05a08ff2ff09fb59c72cd03c8ed0f893441e15df685166e069817f0054bb6ccb00f9c26c2f53496a20f8e355308af24490dac682108aebc762f0bea1ee810f2073a420fe2390a23118c5cf91c99af40d22c"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "caa88e7d8c0ee469397d4e164cd5f8bbbfd630540fc4f76e81334b37ce4828292ee33389e8dd68f9e1e4edf7e33c7def98ac29474e32f1d4aaa7da30cb803fc6809a4a0a55afd8ea84c0b49485297629d2457be4739c735109f78fbdfe1148f70f90859449af6894154b62562f19"}]}, 0x258}, 0x1, 0x0, 0x0, 0x40000}, 0x24048800) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:21 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @reserved}}) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @reserved}}) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r2, @ANYRESHEX=r2, @ANYRESOCT=r2], 0xa) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$P9_RREADLINK(r3, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 18:36:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x80000000000001, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x0, @remote, 0x48020}, r2}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x7, 0x9, {"271e06df986ab72a9fefbf3f509eb74e"}, 0xadb, 0x1ff, 0x6}}}, 0xa0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r5, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r5, 0x7fff}}, 0x10) 18:36:21 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="cad7a89cc9389bd935d98b6cfdb1acd8b201701ee7ab1ce72dff9322b1dbf550ed7cf4eb05e4dfba72bdacf6d0fae25e1a596a2c66c0d497d73c10d2f5f4678d218d1d4583b98bb7d41e18311c34956543f4267a75cd355d450126d697f2f7006deee02d4c232e76bd0600a9deff00"/124], 0xa) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r1, 0x0, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000000)=0x2, &(0x7f0000000040)=0x4) 18:36:21 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x200, 0x6, 0x3, 0x800, 0x1, 0x2010, [], 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x2}, 0x40) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x19, 0xfff, 0x70, 0x6, 0x1010, 0xffffffffffffffff, 0xffffff7f, [], 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x1}, 0x40) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_ext={0x1c, 0x1, &(0x7f00000001c0)=@raw=[@alu={0x4, 0x0, 0xb, 0x6, 0x1, 0xfffffffffffffff0, 0x4}], &(0x7f0000000200)='syzkaller\x00', 0x5, 0x65, &(0x7f0000000240)=""/101, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xc, 0x20, 0x8}, 0x10, 0x19286}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x8}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x10001}, @map={0x18, 0x7, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x62}, @ldst={0x0, 0x0, 0x0, 0xa, 0x8, 0xfffffffffffffffc, 0x7ffffffffffffffa}]}, &(0x7f0000000100)='syzkaller\x00', 0x3e, 0x0, 0x0, 0x40f00, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0xd, 0x7, 0x3f}, 0x10, 0x2630e, r3}, 0x78) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:21 executing program 0: syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:21 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'sha224\x00'}}) 18:36:21 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000400)={'syztnl2\x00', 0x0, 0x8000, 0x7, 0x3, 0x2, {{0x6, 0x4, 0x1, 0xe, 0x18, 0x65, 0x0, 0x80, 0x0, 0x0, @remote, @remote, {[@noop]}}}}}) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000200)={'gretap0\x00', 0x0, 0x7, 0x10, 0x1, 0x80000001, {{0x1a, 0x4, 0x1, 0x1, 0x68, 0x86, 0x0, 0x7, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@rr={0x7, 0xf, 0x79, [@private=0xa010101, @multicast1, @loopback]}, @generic={0x94, 0x4, "451a"}, @ssrr={0x89, 0x17, 0x25, [@loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0x11}, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback]}, @timestamp={0x44, 0x8, 0xef, 0x0, 0x2, [0x442c]}, @lsrr={0x83, 0x1f, 0x1b, [@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, @broadcast, @dev={0xac, 0x14, 0x14, 0x25}, @dev={0xac, 0x14, 0x14, 0x44}, @empty]}, @noop]}}}}}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9}, [@map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xaeb}, @generic={0x40, 0x2, 0x5, 0x8000, 0x4}, @alu={0x7, 0x0, 0x6, 0x3, 0xb, 0xfffffffffffffffe, 0xfffffffffffffffc}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @alu={0x7, 0x1, 0x9, 0x9, 0xb, 0x4, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x2}, @exit]}, &(0x7f00000000c0)='syzkaller\x00', 0xff, 0xd8, &(0x7f0000000100)=""/216, 0x40f00, 0x11, [], r1, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x3, 0x9, 0x35, 0x8000}, 0x10, 0xffffffffffffffff}, 0x78) 18:36:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x4}, 0x22}, r1}}, 0x30) 18:36:21 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="65c284a58829905c49f6"], 0xa) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000040)=0xe7, 0x4) 18:36:21 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RREAD(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="0b0000067500000000002a6abcadc6c9203363b5e3b0b735bdf44de2a0bbdddc44ce23356e136c653fa715522816f89e88aae1d983b37dfd"], 0xb) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10, &(0x7f0000000180)=0x8, 0x4) setsockopt$inet_tcp_buf(r3, 0x6, 0x33, &(0x7f0000000440)="560f5580d0de7d704cea4d1c7404f320d0f8097c9a36a86b46e0b7aa56a89f9d538f9ca4d8c0f10023fb9d6f0ad0b2202d45079009a8b228f773792376d259d5e1d4f9ec7baf07819fd7bdba1fc4efe0349a078fe4510ccc", 0x58) r4 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r4, 0x0, 0x0, 0x0, &(0x7f0000000740)={0x2, 0x0, @local}, 0x10) sendto$l2tp(r4, &(0x7f0000000300)="95c45bdd96ab782b08ea0672b4648c9ef4d10686f0620228fb345ef02bbb6774f7401a6571", 0x25, 0x90, &(0x7f00000003c0)={0x2, 0x0, @broadcast, 0x2}, 0x10) write$P9_RLINK(r2, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) r5 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)="1bd7ed1a19a8f928dfacd283638642d73c2cba603c7ed1fd8b36aacc79c719c5de5e0c20c63d00b8a64a71817c760038d4442ea6f08c23ffca2180e12599123d5a5761d87f17a6bf744ea4cf4568306a8920f77a565531ff8017d49c3f4ca57af790647909a34e821145750022d273350aaf7b4f3504a11e10a0cc6afba6e07586", 0x81, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f0000000140)={r5, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 18:36:21 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000240)=ANY=[@ANYRESHEX, @ANYBLOB="a2cb50ea2740134a78735e38e334af43b92947af3ddd3969dd0a755b4515387dee7aeeb495cdf2b4d5016a694f8fa12d4bcc90cf12020b70b6d1a7332425dbbf34897c01d6aa1cd649f0f8dab1d65dfe47813fb87c50bdb42273a0c10a91cc1bda8500db3b3afabdb4d521c149d5046f2e5360dfdf87d3856880c70f72e72651", @ANYRESDEC=r1, @ANYRESHEX=r1, @ANYRESHEX=0x0], 0x8) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000080)=ANY=[], 0x8) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', ':[-_]\xf5&\x00'}, 0xd) 18:36:21 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)="f37aa665125c8ac87f3e1ed476e1eef2ee320c015e962cbe33f08e6a228c5635acdd502359519d5b62910bd8c0e20c1bcbd9f253d1e5c178da9f0bb68d5879e38dc5e032b62617f49c793f0d6e14e8cae32a518757a3d5cda5881eb022b865f74c44", 0x62, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r0, r1, r2}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'nhpoly1305-neon\x00'}}) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000480)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={'nr', 0x0}, 0x4, 'syz1\x00', @null, 0xf77, 0x1, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @bcast, @bcast]}) 18:36:21 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x48) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a5b2d260048c266e6c38ac11c4dc2bada2f0dea6fb2d438cd7a070ad204e685600548cb5d2215c74132deac3c079871a0d79fab7a22841da1e56f619e877abc54040c419c53fd25ff2d126cc0e3177cd1cac97e33c85d5e167bfba078389bd72fd8bf4bbff2525e274eb986d1d500"/127], 0xa) 18:36:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x4e21, 0x3, @dev={0xfe, 0x80, [], 0x34}, 0x400}}}, 0x90) ioctl$CHAR_RAW_FRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000040)=0xc5) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x6, &(0x7f0000000080)=[{}, {}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000040)={r2, 0x15}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000200)={0x7, 0x8, 0xfa00, {r3, 0x4}}, 0x10) 18:36:21 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', ':\xd5\x11/4\x00\x00'}, 0xc) 18:36:21 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[], 0x5) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x3, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x13ee, 0x24002) r2 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000280)={0x8, 0x3, 0x40, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f0000000240)={r3}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r1, 0xc01064b3, &(0x7f00000000c0)={r3}) 18:36:21 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0x101, &(0x7f0000000040)=0x4) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x2, @remote, 0x5}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4000, 0x4000001f, @dev={0xfe, 0x80, [], 0xc}, 0x7}, r2}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r4, 0x5}}, 0x10) 18:36:21 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r1}, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) [ 2104.789165] could not allocate digest TFM handle nhpoly1305-neon [ 2104.812179] could not allocate digest TFM handle nhpoly1305-neon 18:36:21 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000080)={@my=0x1}) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '\x00\x00\x00;\x1c\x19?Qa\xf4\xb5(}\x82\x1868&P\x89\x8c\x118\xa3\x960\x1f\xbd\xcfP\xae\xf7\xf8\x86\xce2n\x13\xd5\x99\x0e\xb7\xb4oN\x95\"\x88\x8d\xe6h\xf8M>-\x9d\xf8N\xb4\xdf\xac\x00\xd8\x89\xb9\xc0\x14__\xcfG\x06\xbc\xb5O;j\x10i\xaf\xc5\xfcLaN\xfa\x81\xc2\\\xe3\xf6\xfa\xfe\x004\xd5\xde]\x0e8\a65\x9dF'}, 0x6e) 18:36:21 executing program 5: sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_SECRETLEN={0x5}]}, 0x24}}, 0x24040000) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x100) ioctl$CHAR_RAW_FRASET(r1, 0x1264, &(0x7f0000000200)=0x5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r2}}, 0x30) 18:36:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:21 executing program 1: getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="35a43fb62cc5b03e2600"], 0xa) 18:36:21 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xd, 0x1f, 0x1000, 0x7, 0x470, 0x1, 0x6, [], 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x3}, 0x40) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000540)={'syztnl0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x7, 0x1, 0x6, 0x8, {{0x9, 0x4, 0x2, 0x25, 0x24, 0x65, 0x0, 0xff, 0x2f, 0x0, @local, @multicast2, {[@generic={0x44, 0x5, "fd5d76"}, @generic={0x88, 0x9, "fa1b2291050b1e"}]}}}}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0xa, &(0x7f0000000300)=@raw=[@alu={0x4, 0x1, 0x0, 0x0, 0x2, 0x100, 0xffffffffffffffec}, @map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @initr0, @map={0x18, 0xa, 0x1, 0x0, r2}, @exit, @call={0x85, 0x0, 0x0, 0x7e}, @ldst={0x3, 0x2, 0x1, 0x7, 0x7, 0xfffffffffffffffe, 0xfffffffffffffffc}], &(0x7f0000000380)='GPL\x00', 0x6, 0xef, &(0x7f00000003c0)=""/239, 0x0, 0x1, [], r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0x6, 0x7, 0x351}, 0x10}, 0x78) 18:36:21 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="65e48c63203a5b2d26000db4682967fb3a145953e007dc96581ed1afd9db2195158913d569e3b4f2ae799ac38e16"], 0xa) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) 18:36:21 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00'}) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000180)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x7, @rand_addr=' \x01\x00', 0x4f}}}, 0x30) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000140)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r2}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r4, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, 0x0, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x40050) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r3}}, 0x30) 18:36:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000000c0)={'team0\x00'}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2, 0x6, @ipv4={[], [], @multicast2}, 0x22}, r1}}, 0x30) 18:36:21 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000300)="7b1fa12c73d8f8745cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48e6479b0cf23bf51e281d4e05c78d86468a4c7682b781e6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc4, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:21 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) socket$l2tp6(0xa, 0x2, 0x73) 18:36:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x54, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x4e}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x5}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}]}, 0x54}}, 0x8011) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$CHAR_RAW_REPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000200)={0x8, 0x7, 0x0, [{0xc2, 0x80, 0x5f, 0x0, 0x3f, 0x9, 0x6}, {0x81, 0x8, 0x8, 0x0, 0x9c, 0x7f, 0x9}, {0x401, 0x100, 0x6, 0x7, 0xff, 0x5, 0x4}, {0x3ff, 0x3, 0x0, 0xff, 0x6, 0x7, 0x3}, {0x6, 0xffffffffffffff00, 0x400, 0x6, 0x7, 0x80, 0x5}, {0x8, 0xfff, 0x8, 0x41, 0x20, 0x7, 0x33}, {0xc4fe, 0x4, 0x2, 0x8, 0xff, 0x94, 0x3}]}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000440)={'ip_vti0\x00', 0x0, 0x8, 0x1, 0x7, 0x101, {{0x20, 0x4, 0x2, 0x1f, 0x80, 0x67, 0x0, 0x8, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, {[@ra={0x94, 0x4}, @ra={0x94, 0x4}, @rr={0x7, 0x7, 0x6f, [@private=0xa010102]}, @timestamp_prespec={0x44, 0x4c, 0x20, 0x3, 0x6, [{@multicast1, 0xfffff9e2}, {@dev={0xac, 0x14, 0x14, 0xa}, 0xffff}, {@multicast2, 0x400}, {@loopback, 0x1}, {@remote, 0x100}, {@multicast2, 0x44}, {@local, 0x239d10dc}, {@multicast2, 0xa6}, {@rand_addr=0x64010100, 0x3}]}, @ssrr={0x89, 0xb, 0xb3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ra={0x94, 0x4, 0x1}]}}}}}) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x78, 0x0, 0x0, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x40000}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0xfc}, 0x22}, r1}}, 0x30) 18:36:21 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 18:36:21 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:22 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000040)) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:22 executing program 1: getpeername$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @rose}, [@null, @remote, @bcast, @default, @remote, @netrom, @netrom, @rose]}, &(0x7f0000000240)=0x48) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0x980000, 0x7, 0x5, 0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x0, 0x2, [], @ptr=0x2e}}) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000000)) r1 = socket$l2tp(0x2, 0x2, 0x73) bind$l2tp(r1, &(0x7f0000000080)={0x2, 0x0, @multicast2, 0x2}, 0x10) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) connect$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @default}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 18:36:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000180)={0x7, 0x8, 0xfa00, {r1, 0xffff537b}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r2}}, 0x30) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000040)=0x8001, &(0x7f0000000080)=0x4) 18:36:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = getuid() write$P9_RSTATu(r0, &(0x7f0000000200)={0x80, 0x7d, 0x1, {{0x0, 0x53, 0x2, 0x0, {0x2, 0x1, 0x7}, 0x80000, 0x7, 0x20fe29b4, 0x0, 0x1, '+', 0x5, ')-&{-', 0x18, '/dev/infiniband/rdma_cm\x00', 0x2, '\x9e-'}, 0x18, '/dev/infiniband/rdma_cm\x00', 0xee01, 0xee00, r2}}, 0x80) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0x6f, 0x0, 0x7, 0x40, 0x1, 0xfffffeff, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x2}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x8, 0x4, 0x7, 0xffffffff, 0x524, r5, 0x6}, 0x40) accept$netrom(r4, 0x0, 0x0) getsockopt$netrom_NETROM_N2(r4, 0x103, 0x3, &(0x7f0000000100)=0x5, &(0x7f0000000140)=0x4) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80000000}, r1}}, 0x30) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:22 executing program 5: ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)={0x59, ""/89}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:22 executing program 3: ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000000)={0x0, 0x2}) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a58817a2a"], 0xa) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000030020000040ffff000000003e8e000000000031"]) 18:36:22 executing program 3: setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r1, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00') socketpair(0x4, 0x1, 0x400, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r4, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000380)={'team0\x00'}) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, r5, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x2b8d}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @loopback}]}, 0x50}, 0x1, 0x0, 0x0, 0x4080}, 0x40d0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000229bd7000fddbdf250300000016000d0001000000147a33f541b3623489c056ae2e13462500080069703665727370616e30000000001c00060002008100000005000500010000000500070002000000"], 0x48}, 0x1, 0x0, 0x0, 0x48080}, 0x40) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:22 executing program 2: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000300)={0x100b, 0x75, 0x2, {0x1000, "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"}}, 0x100b) pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_open_dev$video4linux(&(0x7f0000001400)='/dev/v4l-subdev#\x00', 0x4, 0x2) write$P9_RREAD(r0, &(0x7f0000000380)={0xb}, 0xb) pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RREAD(r1, &(0x7f0000000380)=ANY=[@ANYBLOB='\v\x00\x00\x00u\x00\x00\x00\x00\x00U'], 0xb) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) write$P9_RSTATu(r0, &(0x7f0000001340)={0x76, 0x7d, 0x1, {{0x0, 0x52, 0x5, 0x8, {0x20, 0x2, 0x1}, 0xd0040000, 0x149, 0x0, 0x0, 0x1, '\'', 0xf, 'crc32c-generic\x00', 0xf, 'crc32c-generic\x00'}, 0xf, 'crc32c-generic\x00', 0xffffffffffffffff, 0xee01, 0xffffffffffffffff}}, 0x76) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0)='l2tp\x00') r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r2}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x200000000000, &(0x7f0000000600)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000140), 0x0, {0xa, 0x4e22, 0x3, @mcast2, 0x7}, r3}}, 0x38) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x3, 0x4) ioctl$KVM_SET_XCRS(r4, 0x4188aea7, &(0x7f0000000200)=ANY=[@ANYBLOB="07000000ff0f00000500000000000000051b00000000000081000000000000000600000000000000153c00000000000001000080ffffffff830a00000000000000000000000000004000000002000094d60409679b99c94e8edbdb0000000b0002000000000000000000000000000000ffffff7f000000000400000000000000"]) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x6}}, 0xffffffffffffffa0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x0, @mcast2, 0x22}, r5}}, 0x30) 18:36:22 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) 18:36:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="449912d90a97291eb5a6223d3a891aa00f61ee", @ANYRES16=r1, @ANYBLOB="010000000000000000000200000005000500000000000800090000000000"], 0x24}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x74, r1, 0x800, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xf7}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x6}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1000}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x11) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r4, 0x0, 0x0) setsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f0000000340)=0x2, 0x4) accept$netrom(r3, 0x0, 0x0) getsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f00000000c0)=0xfffffffc, &(0x7f0000000300)=0x4) r5 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r5, r2}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:22 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000040)) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000080)='FROZEN\x00', 0x7) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000000c0)={@local}) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f00000001c0)={0x0, 0x14}) ioctl$UI_SET_SNDBIT(r3, 0x4004556a, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000140)={{0x0, 0xfffd, 0xff, 0x5}, 'syz1\x00', 0x1f}) write$apparmor_exec(r2, &(0x7f0000000080)=ANY=[], 0x8) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$CHAR_RAW_FRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000200)=0x80) write$apparmor_exec(r4, &(0x7f0000000080)=ANY=[], 0x8) write$apparmor_exec(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="737462636b2040f51000"], 0xa) 18:36:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000200)) r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r1, 0xc01064b3, &(0x7f00000000c0)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x9, 0x0) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000040)={0x0, &(0x7f0000000040)}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r3}}, 0x30) ioctl$CHAR_RAW_REPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000240)={0x1, 0x1, 0x0, [{0x4, 0x0, 0x9, 0x1, 0x8, 0xa8, 0x3}]}) 18:36:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x24, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x48, r2, 0x300, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010102}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private0={0xfc, 0x0, [], 0x1}}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x5}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x4050}, 0x4008004) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getgid() write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r4}}, 0x30) 18:36:22 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f0000000040)={0x0, 0x0, 0x6, [], &(0x7f0000000000)=0x9c}) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @reserved}}) write$apparmor_exec(r0, &(0x7f0000000300)=ANY=[@ANYRES16=r0, @ANYRES64=r1, @ANYRES64=r0, @ANYBLOB="f9cb667c5bf67db51668ef70a26d339ca2193df1638993c626f1bdb73218fd6292c20004e3fe860b6ec7bb3888b4018582b889722a29fd233137cf33c1b4372bb15e7303d31f59627dcc219d7c8d2fc04fa02147860d6612239e59b9ff5ed0f3c6233c540fac49bf8520ee4a2a82ad90b0f1afa924ef452ebac7a3adc9ef5d79b77df23c02d2a4c2820de61607474649fa458c0aa8832e596c7b7773432af0", @ANYRESDEC=r0, @ANYBLOB="90b81716cab52e34b3509fa9fa3329a6437a0c330b3692fed978a7213ac697521dd737c9f15da16644eb82f696bd20c0e23503f502545d72b7aab6a594c5ebf3699cc12377248110ba05c33f593b16b96ef0aa04eaff4bd6a778a1a8535facd3625c5496a399e51cbe15af99662a55b0caa4ba54765d0a4cb1df4736b18cd037d72dd1990554bf4e5b2cb198a478c9566074fcf21cbc40649df4fe90daab7653f645bca0fd6623ec23a1000e3c5ab389c0f67bc7e179b3d987e69296b3ef196feb5f385d95e5c1cc8fa359c9bf242c83c63d9898", @ANYRESHEX, @ANYRESDEC=r0], 0xa) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$SOCK_DESTROY(r2, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001c40)={0x1518, 0x15, 0x100, 0x70bd27, 0x25dfdbff, {0x1a, 0x6a}, [@INET_DIAG_REQ_BYTECODE={0x24, 0x1, "d5be5313a8ff2f01506eb517bb34a599eab43db5be4a9fa6e5302a77dff50bb8"}, @INET_DIAG_REQ_BYTECODE={0xd8, 0x1, "38211878008df2507244e6fa07c9a53d741dac10c36bf97a42ba5571a3f51219e60af931e629d840309c3ff653220fdc754e0b135ff37968a02d63958e0efbd7ef6b8990b7d92112dafb8f49cb15ce74f5dfd68863d80157b59a7c8b4fcdf35c8e1e52b8fa513af4f0630c6098b5d0f1a43ca64ec73a544146ca26f05e8c8773edf62ed1c7759d11ef63b4be6524e49959d89457ae4206bec72b0b9c4281e351d48410a4c3329521a2b3a9f994ba3378c8ac9a06741c4c34cfdd7631a21abaeb7eed5cf3fd51faa5a9d0923aaa02dfc7e3026396"}, @INET_DIAG_REQ_BYTECODE={0x61, 0x1, "e48c2ea360e120d1be055c9dcd8946ce1189b00ff8d42cc1f5172a71ff75b9f481c7ea59f11eb81a10c07aa4e46f8257886d82998c09df80983cbc48f998bee13dafce736ecb1ad148be0be80e8717d38bcc87833041408f4d8f53b4d3"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "00295f4e130555cba14032bfb76920ff9e1843cf99db8d45e1f4ecc375"}, @INET_DIAG_REQ_BYTECODE={0xd2, 0x1, "3063664ba8123e490a1dc24f1456b51c4fcae295ce8119f070a95ec481d118e8d0180d014f07a87ea321c7790ce891c98988145870cd48b6fac181dfd0825f1a231794c104345ce2832e8c17510804b5a9be266dd8ff737d18ef70903787c5fc8220664aa1169758b2a309bc1a9e5bf6a5922b99890b8c38045146697dc7293d0c39b15f51eeafececff868c175c69de16a63d600a5c8c95420bcc337da88928fab00d37e88d9bc5991b9382596c2be2a671a225a36cc3c2f03ecb50636bc9b3dadfa85f66af645035fb3d4b40e0"}, @INET_DIAG_REQ_BYTECODE={0xc4, 0x1, "6bc3846ea7ec91dfdf30825f4390fd02a70fe979f002f8f0b6dc4ac806334330cdaa964beb504e5c118f725165e712dc1a38326730aa6f5ce1fb6d50ecdd732ab6a28c8003608e664426709c2748fcc9bea7c24a8dafa0b1e690ae8e37db2c6df5c86f49ac06b6558807c081341218cc3191e023b28a0a4cf59ff755f9fa9ff79a058c117d00badbe4446592d4fc7621be13f464e02550094608786a38286e2e84f557de22d9946748a11148edd364f20f261c7c9bb810ab8d61618215a19160"}, @INET_DIAG_REQ_BYTECODE={0xfc, 0x1, "9bc80dfaad3d63264b0093a07d2e49ec0561eeb02152d495b6825435c16ba30f4d359c1458aacf0364a0779d126d92827975524233adb53e76fa5e08d3edad1a876beea1c190fef358615d384dcb3db87642efd704af2038a72874a685a26d71cae349a8fb02e216f3bdd4b11a19a373bed0f69e9952d1fe23ce2514d1f0486e593dcf50c68821349c7f12c429a3548f2c16e97468b02b74d8507d92feda8e40afbeb210f0fca13d30f80e35fb2f001527b6f3a04b8f1a109f5eae267da49806a2607cd16e27b86045470ad84e972f404fcf319a61b45db69245a3d803640d3fe9d2da5ef14983452abd362d74fa00e952a050da6a9bd002"}, @INET_DIAG_REQ_BYTECODE={0x1b, 0x1, "3e1c98e02ded7b849aaa629595fd3a30a5a310ecd112b0"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0xcb, 0x1, "ec90ece02342d180794cd374061d8b712dbff119f2ff8a82364ace2902d98c3b7dd41fda001c5085db52eaedef7c3ce8d3fa4fa58aa25362916f48ce01423484092eafcdb9b9c3b3c98b02d79727175e24061567b0e8720dff9ffad52c005f048d7aa2742d4484f0af63c3984cb22c44537676f38fa86b834c0594144fb36689604459d28e717b2e696481123bc648843a6bfaeb822f961f2b7050e895d85f25efdca84ac1cb88eed8761ac16dcf6c9f59b4ee03ab5631e9fb7557bd3786d19b63b5afd24f7d90"}]}, 0x1518}, 0x1, 0x0, 0x0, 0x10}, 0x20048054) 18:36:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r2}}, 0x30) 18:36:22 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r1, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x2c}}, 0x0) 18:36:22 executing program 2: setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:22 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x40000) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':{-&\x00'}, 0xa) 18:36:22 executing program 2: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000180)=0x8, 0x4) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000040)=0x1, 0x4) 18:36:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) r2 = socket$inet_smc(0x2b, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000140), 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0xf35a, 0x4}, @mss={0x2, 0x3}, @mss={0x2, 0x7ff}, @timestamp, @timestamp, @timestamp], 0x6) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RLCREATE(r3, &(0x7f0000000080)={0x18, 0xf, 0x1, {{0x8, 0x0, 0x4}}}, 0x18) 18:36:22 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="4ed74c465ef33c422600"], 0xa) 18:36:22 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '\x15\x84\xa4\xf5(\'\xde\xcb\x93\xf3\xd9q\x13\xc7Y\v{\xcf3\n\xe3X\x15\xa7f\xef\x82\xdb\x17\xe4\x8b\x06g\xdf@\x92!\x90\xc3\xc9\xb4\x83\x99q\xd3N\xc7\xc44\xb8D\x87\xab\x80\xa6\xbcD\xda=\xeeb\xa2\xe0\xddA\xa1\x14:+\x19\xbeqo\x99\x1f\xf7\x15\xaa\x84\xfe\xe3\xc2\xbcD@?\x91R\x14\x12\x97\x95\xe5p\x11\xbf\xba\x81\x018\x96\xd1\xb8\xb7'}, 0x6d) 18:36:22 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000300)="019703002074ff03000000000000ffff000000000000265465d42a1014c22c2cbadcc9080dea6b52552eae1131a7c3497be82277c1", 0x35, 0xfffffffffffffff9) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:22 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000000)="b719c92b993cdf89d08839806b93d9e5a59d", 0x12) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000040)=0x5) 18:36:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r2, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x7, @dev, 0x22}, r3}}, 0x30) 18:36:22 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r1 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x1, 0x2c000) ioctl$CHAR_RAW_IOOPT(r1, 0x1279, &(0x7f0000000040)) 18:36:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x1, 0x0, @remote, 0x40420}, r1}}, 0x30) 18:36:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1a6023143f7772f44e5920f776923c5b539ff396a6e5fdf6754e290931b9e20a42ff986eed582cbd96c44ea90de995bec830b0ef82dbaa8c58d1b6530b25d2e09baf0fd6ae2813610e296b15ab0baaf113fd37aafaf799d9bccaae10849b18bbbc453b1b64d7b56922e94f88988125d54d554c5b7f209dab332a61fb481c5c778360ca5fc6570f4c3bd76981dcd4afdcda8e4da326eda8e7cf606a5cdd37bb1a3641c66150c553fc5b54e6374b8433b6b47f7621bcabb4cb2fe59c", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00'], 0x14}}, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000200)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r1, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @remote}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @multicast1}}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x45}]}, 0x38}, 0x1, 0x0, 0x0, 0x20060011}, 0x20000008) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x1, 0x480000) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r3}}, 0x30) 18:36:22 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='j|'], 0xa) ioctl$VIDIOC_G_PARM(0xffffffffffffffff, 0xc0cc5615, &(0x7f00000001c0)={0x3, @raw_data="3e4507e29631585fd267e73e916233724ac24f575d505813050b13bd4cd72c0499c4c08ba4e7116d4df6dc60abac0d53ce0f869327aebf99f468516c5864ee3fae18f421b9d178b43260ac707dc177271035b390bede268cc65a139bcef18e348914b302c388405949a2ce75d3e3c58af0f415d04994bafb3a2fb5e28f14abb0652cd69d7b7c44622a722187f529b79dacdf44b35ee84486b0a6579741a4d4997a6d04bd59edace770ba93dac7e664c86fbcf189872d567a3295b649ac2f73c9edc32d6389adea94"}) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x7, &(0x7f0000000340)=0x4) socketpair(0x0, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x1, 0x48000) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, 0x0, 0x4a4, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_MRU={0x6}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_macvtap\x00'}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x56d3}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x4880) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000002c0)={0x2, 0x200, 0x0, 0x4, 0x9}, 0x14) 18:36:22 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000300)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1819faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab7306e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c4531e8691c4bab", 0xc2, 0xfffffffffffffffd) r2 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x351a, 0x31000) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f00000001c0)={0x0, &(0x7f0000000400)=""/4096}) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:22 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000000000)) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000680)=""/4096, 0x1000, 0x2, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x696, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x8}, r2}}, 0x30) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x24, r5, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4b0010}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r5, 0x4, 0x70bd26, 0x9, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @loopback}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x80000000}]}, 0x30}}, 0x40000c0) 18:36:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), 0xffffffffffffffff, r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r2}}, 0x30) 18:36:22 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="6c87c4a40000003b9fae"], 0xa) 18:36:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x7ff, 0x40100) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x22}, r1}}, 0x30) 18:36:22 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f00000002c0)) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') socketpair(0x15, 0x800, 0x2, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="10002bbd7000fddbdf250700000005000600810000000c0016000500000000000000050006003f000000060002000000000008001900ac1e000108001800ac1414aa080019000000000008001700", @ANYRES32=r2, @ANYBLOB="a258d34f91e4176349927e580a1f069e58a3ca69da514be4a89596568ca4d775749f545f1195b038e1be21380b0fd96584d7389080e69e1339e6d2f6b6c8f0a990b6dd40c6d29f19debedb51a2c011fcb874e89528228105aaed955dab4ef2efb14f34b3a2faec2c549845e34fa5254524e4698495c1935a6323af32d0b5413078c6facf220713718472e2671b"], 0x58}, 0x1, 0x0, 0x0, 0x800}, 0x24000840) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:22 executing program 2: r0 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000180)='cachefiles_create\x00'}, 0x10) r2 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r2}, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) accept$netrom(0xffffffffffffffff, &(0x7f0000000300)={{}, [@bcast, @null, @rose, @netrom, @rose, @netrom, @netrom, @default]}, &(0x7f00000000c0)=0x48) 18:36:22 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getgid() write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:22 executing program 5: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_ext={0x1c, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, [@btf_id={0x18, 0x8, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @alu={0x4, 0x1, 0x1, 0x6, 0x2, 0xffffffffffffffc2, 0xfffffffffffffff0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x2d, &(0x7f0000000100)=""/45, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0xf}, 0x10, 0x198a8}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000280)={0x0, r0}, 0x10) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r2}}, 0x30) 18:36:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000180)=0x8, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x85c5}], 0x1) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r4, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r4, 0x5}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:22 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:22 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000140)={0x3, 0x180000, [{0x4, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x7, 0x0, 0x96}]}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f0000000100)={0x0, 0x7, &(0x7f0000000000)=[0x4ae1, 0x7, 0x800, 0x81, 0x3, 0x5, 0x8], &(0x7f0000000040)=[0x0, 0x5, 0x8, 0xd5, 0x0, 0x81], 0x11, 0x8, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x8, 0xfffffffe, 0x8, 0x43, 0x3, 0x9], &(0x7f00000000c0)=[0x6, 0x5]}) 18:36:22 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000300)="8fb349f67607a3ff628b36f6bab3d335e193716a9bf5847a8898d1567d781af69dc0841a27a2b10927e4d7361935adee85483443ef116219544a96a4fd8dbf40a2943e750e85ed", 0x47, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48eb3bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a99733e000000000000b0e7653bcc4cc78650d73302dc1582cd6915e041b29938278ecc259a3df92b1163", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:22 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:22 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '\xe3h\xde\xd7\xd6?\xc0_\x12|\x9a\xe38.\x1d\xf26-\xd6\x7f\x86\x80\t\xa2/S\r\x99t;\xc8Y\\DG\xb8/E\xb0\xc6\xc79O\x0e\xc0\xf8*H\r\xe3\xa8\xcb\xe12\xc0)\xd0`Y\xb8y\x8e\xa6f\xdef\x14)7\xf8A\xdbDqt\xf6\xb3\x00g$.\xc5W\xc7\xbf\xf2\xba\x9f\xf6\xa5\xbd\xc8\xdc\x02\x03\xa1\xc2\x11\xc5\xd4\x18\x89\xf6\xcb\xbe\xcb\xb9\xf4\xa6\xe08\xf0\x15K\xd8\x8a8\xe85d\xea\x98\xd2:P\xc5\x8dW\x9d\xad)T\x06vg\xcbP\xf4\xee q\x04Ze\x8a\xd7\xdb\xcd\xce\x06\xd5\xb5F\x9b}\xfc\xae\x80\x82\acuy\xfa\xdcL|\x91\xa2Yk\x18\xb2ps\xf3\xa3<\xb4\xdf\x8d#\xe6\xfd\xba\xc59A\x04\x93\xab\x94\nz\xb3g\xf0\xfc\xf1\xf4p\f\xf89\xa8\xe7\x80\xa9~<\xe2\x9e\xd4z\xba~^\xa38`\xa2\x9d\xe6\xd8\xd1p\xda\a\x95\xf6=7\x8b*E\x17\x90\xf1^e\xa9\xac\xd2`\xf1\xf4}n\xaa\xefa\x13\x1fTM~\xd3\x84\xf3\xb6\xfc/\x93)7|\xd2\xcbd\xcf\"\xae\x06\xfd\x93\x92\n\xe9[=\xa4\xb3\xe8\x159Q\x16\x9d.\\\xfe\"B{f$\x01\xf7\xe2>\xf3\xe7|\x98\xdd\xa8 \x88R\xb5\xa6\x86\x7f\'\xa6\x02\xe3\xe5\xf5\x84R?u\xd1\xb5w\xa7\xef?\xf9c\x89\xf8\xf5\x9d\x8e\xe9\xca\xf2\xbf\xcf\x81\x90Ti\xf4\x80\xf0D\xb3\x9e\x9e\x98?\xc8\xab\x8b\xdb:Q\t\fo\xb9\x9d\xd8_\b\xa8\x93Z\x11\xd4\x06\x04\\\x90\bU\x01\xa8OH\xae\x13\xe2\xab\xdf\x88\xe4\x8e\xd4\x02\xafU\x18\x11(\xe9\xa7\x10}\x0fb\xf1mm\xad\xaa\xf3'}, 0x19f) 18:36:22 executing program 0: getsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0xfffffffffffffd5d) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8}, r1}}, 0x30) 18:36:23 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="657865100cee166d932f468d2edd319e6dc6521007a444117194cfca23"], 0xa) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x7f, 0x4) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[], 0x8) write$apparmor_exec(r1, &(0x7f0000000080)={'exec ', '..!%(^\x00'}, 0xc) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f00000000c0)={0xffffffff, 0x9}) 18:36:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000040)=0x10000, 0x4) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000180)=0x7, 0x4) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r1, r4}}, 0x18) 18:36:23 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="6578656320352b023a2c7d2c5b00"], 0xe) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r2}, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r0, r1, r2}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000380)={0x1, 0x10, 0xfa00, {&(0x7f0000000300)}}, 0x18) 18:36:23 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x6b87, 0xf00f3c91848ba8a9) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) ioctl$VIDIOC_G_FBUF(0xffffffffffffffff, 0x8030560a, &(0x7f0000000140)={0x8a, 0x26, &(0x7f0000000200)="5e55598db8049bbae70d37631e35d7bdf3acd6bff0d426490e2ec4264bd0bf98664cddba641c48c1b5f83ea18b67920db85d15d213fe5763a394b02e198bed2ef8e3b4d8f37d2ee519123739ae8db2775fd72f89c8a6fca252c46400be100911eb9fda9e2740c1c200066e6bea1dfb023e7d9e233cd0123958039d406283b37b51989773c66bc5a03a85f78b22f7f0de4e58ed56574658db8a773115f4f8d38775577bd4e90ad077e33001516c2495da904e5142ebd65ee456e3d201516c82dc66135b394ebd9b2e1e1b025fef977f5fec48acfb95650c73cb5220e4b3a1ebed454effbb", {0x4, 0x1, 0x41495043, 0x1, 0x0, 0x1000, 0x4, 0xf10}}) 18:36:23 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f00000000c0)) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x4, 0x80000) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000080)={0x0, &(0x7f0000000040)=""/23}) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:23 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="66fd8bcd2a5a672647"], 0xa) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video2\x00', 0x2, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000040)="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", 0xfb) ioctl$CHAR_RAW_FRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x6) 18:36:23 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000300)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:23 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x4, 0x587100) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r5 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x80000) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000380)=0x58, &(0x7f00000003c0)=0x4) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r4, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000280)={0x5, 0x10, 0xfa00, {&(0x7f0000000080), r4, 0x2}}, 0x18) write$apparmor_exec(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/276], 0xb) getsockopt$netrom_NETROM_N2(r5, 0x103, 0x3, &(0x7f0000000040)=0xe0000000, &(0x7f00000008c0)=0x4) 18:36:23 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000300)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:23 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000280)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) 18:36:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8002000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @broadcast}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x8001) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 18:36:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r1, 0xc}}, 0x10) 18:36:23 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000100)={0x9, 0xb8, 0x9de2}) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000040)={{0x1ff, 0x2000, 0x1, 0x2000}, 'syz1\x00', 0x42}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:23 executing program 2: r0 = add_key$user(&(0x7f0000000300)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="ad", 0x1, 0xfffffffffffffff8) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180), 0x13f, 0x5}}, 0x20) ioctl$CHAR_RAW_IOOPT(0xffffffffffffffff, 0x1279, &(0x7f00000000c0)) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x7d) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x6) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r2}}, 0x30) 18:36:23 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exqn :[-&w'], 0xa) 18:36:23 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x3, @default, 0x3}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x48) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r1, 0x0, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000080)=0x2, 0x4) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:23 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb30f950000ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000080)={0x0, 0x2c}) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:23 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563163a5b2d2600"], 0xa) socket$l2tp(0x2, 0x2, 0x73) 18:36:23 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000040)=0x4, &(0x7f0000000080)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:23 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r4, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r4}}, 0x18) 18:36:23 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000000)) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:23 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, 0x0, 0x0, 0x0, &(0x7f0000000740)={0x2, 0x0, @local}, 0x10) getpeername$l2tp(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="65786563203a5b2f2600345a26c3226d4c8aa697b732dcbdc1c743a891b6ca532170c51d605936758a7148eaa9a6dc82c7d56eb37bd879c93c201069a78a6817e66e0380f33a263344539c2e1ec6982aa6e0fb9f9d6559f8b8cf6a3e0df45c0d920f6af81102d850b24a1b999273f1ad7ef48c1176b69207270cee2d39d2c0b8af7f6065bd1c12bf3451ea0d9cd72521dbd5d0bebdbf8961df9d6bfbb78bd007bf221d526b7b5121bce56b791009fb78a28e190dba666d96212a2c7ecfc5192dc1a464f19745f4b500feb1b34adc3936af4b5f4b8399d3e412fafa8c7d8b712be1180954af6f458856b6e4b019564bf9df0e720a7e6223e2b93c9aa03da9abeba2e922d1229352ce0a6c07d8e3f5f431e434cf3c4b855ac921856f6344c9c3ed4d7bc608f8e25cbf05755f0c98607d6949c3838a4d0afdced526535a94b4f08378091445ca3dd563fb37e77b3aff55f5f9037841efc607346245a76c432aa1451b61006d58c4172214597c0af9b9f18fc4ead0193d3be0a86cbad1cd6eee4ce4e9c497471d8d1397a21b76ecbdafd0fe37833fb316e66b49f1db8fa0a1c33d95d5ee9588923f8c9a506630e153f5479402e3aeae559aec0723071ec8320108"], 0xa) 18:36:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r4, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, r6, 0x409, 0x0, 0x0, {}, [@SEG6_ATTR_SECRET={0x4}]}, 0x18}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r6, 0x200, 0x70bd28, 0x25dfdbff, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}]}, 0x1c}}, 0x20000040) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r7, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r7}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:23 executing program 0: write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xf}}, 0x10) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c0000001500000226bd7000ffdbdf252b4004000100130001000e1ebb7853b2a6bc3cc9addc86a56500000056fd1838019437bf0925b86af03723cae07718bedb6e52e5b0e7f4b23d4a0ec937bfa76250d79677b6c4c992f7a5e5ef47c38d81cd1ce4e6f0370316778297f9"], 0x2c}, 0x1, 0x0, 0x0, 0x752a384775c78ae4}, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x3, {0x5, 0x9, "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", 0x1, 0x2, 0x3f, 0x20, 0x1, 0x8, 0x3}}}, 0x128) pipe2$9p(&(0x7f0000000180), 0x84800) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:23 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r1, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000100)={0x0, 0x7, &(0x7f0000000000)=[0x4, 0x9, 0x4, 0x5, 0x4, 0x2, 0x0], &(0x7f0000000040)=[0x6, 0x4ae, 0x800], 0x62, 0x8, 0x58, &(0x7f0000000080)=[0x5, 0x7, 0x6, 0x1, 0x3, 0x3, 0x6, 0x9c5], &(0x7f00000000c0)=[0x57, 0x9]}) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:23 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '\xa7\x80\x04\x00\x00\x9fD\xf9\xd1h\x82N\x8f\xab\xcca\xf0\b}\xc4\xe6\x83v\xa9\xfe\x1e\x93!\x90\xa2\xda+\x13\x10\xe5kl\xb0\x0e\xed\xc74,=\x8a*\xcc\xbe\xef\xcb\xb7p\xb6\xfb\x84\x1c9\xf2\x8b\xee\xb7\x1f\xf5\x9c\xbaf\xe1\xddN]\xbbR\x82k\x87NT.\xa6i\xd2\xd5GI\x1b\xa4\x10\xb3\xbf\x8c\xe5\x0f.\xa8<\"3\xee\x1d\xd4\x992yF'}, 0x6d) 18:36:23 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RREAD(r1, &(0x7f0000000380)={0xb}, 0xb) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @reserved}}) ioctl$VIDIOC_G_FMT(r2, 0xc0d05604, &(0x7f0000000140)={0x4, @pix_mp={0x4, 0x9, 0x31303453, 0x5, 0x3, [{0xf0, 0xeaa1}, {0xffffffcc, 0x1f}, {0x100, 0x8}, {0x155, 0x1ff}, {0x7ff, 0x6}, {0x3, 0x4}, {0x4, 0x4}, {0x9, 0x4}], 0x3, 0x80, 0x1, 0x0, 0x7}}) write$P9_RREAD(r1, &(0x7f0000000000)={0xb5, 0x75, 0x2, {0xaa, "61affc1975bf5028905f364cf9001d324f9cfd89557289badf37226db564963695d9ca704608be2c3a52ad783f1568e4a6449fa0149ebe5bed115150d8d1096035c2db85a2c8746f70b299188d3c77d60026a2b2d21d311acbe2d21a4d235abd7e844325609b7b6a19ed4e4d4ca832c5ff7962bc88f6692fa3cc791df78896cc414b4143ae2301dd11fac970a97d9a46d92442694b147624ee3c654c8c710c76c5bf3d8cfb8d7d9779e6"}}, 0xb5) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x184000) write$P9_RREAD(r3, &(0x7f0000000380)={0xb}, 0xb) write$P9_RLCREATE(r3, &(0x7f0000000100)={0x18, 0xf, 0x0, {{0x10, 0x1, 0x3}, 0x5}}, 0x18) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', '[-&t\x00'}, 0xa) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0xde, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x6, 0x6, [@default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) 18:36:23 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa16c73d8e2b95cf3739cb9f9615221266bfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52504c931c50a2fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b7fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e76582cd691500"/190, 0xbe, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:23 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x1, r3, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x400, 0x70, {"3877cfb07ee8c381282f4379d6f18989"}, 0x9, 0x4, 0x8000}}}, 0xa0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x0, @ipv4={[], [], @rand_addr=0x64010101}, 0x22}, r1}}, 0x30) 18:36:23 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{}, {0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f00000001c0)={r1, &(0x7f0000000180)=""/13}) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x2, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x0, @multicast2}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 18:36:23 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="65786563203a5b2dde0ed0c8ee453c59b9255ba51d86be3da328049e62e5c75094a35027f8bf35b1b58b5bafaef5a9c1024e8aeed64e5add83487574"], 0xa) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[], 0x8) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '\'\x00'}, 0x7) 18:36:23 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) socketpair(0x22, 0x5, 0x3ff, &(0x7f00000000c0)={0xffffffffffffffff}) getsockname$l2tp(r2, &(0x7f0000000300)={0x2, 0x0, @multicast1}, &(0x7f0000000340)=0x10) 18:36:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r2, 0x0, 0x0) bind$netrom(r2, &(0x7f0000000040)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)={0x7}, 0x8) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @dev, 0x22}, r1}}, 0x30) 18:36:23 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x800, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x1f}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010102}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x20}, @L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x4) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:23 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r2 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000280)={0x8, 0x3, 0x40, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f0000000240)={r3}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f00000000c0)={r3}) 18:36:23 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563208d002d2600"], 0xa) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f00000003c0)) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x0, {0x7f, 0xa5d, "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", 0xc5, 0x3, 0xc8, 0xbc, 0x81, 0x5, 0x90}, r2}}, 0x128) r3 = syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x1, 0x402) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000200)={0x2e, 0x2, 0xfffffff8, "06fde62624c88f7002e0be4c63851fd83cddcca79030ac74ffcf5bc9285a1c41a324e79696a7ef757001320d242b"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f0000000240)=@raw=[@ldst={0x0, 0x1, 0x0, 0x7, 0x0, 0xc}, @exit, @ldst={0x3, 0x2, 0x1, 0xc30c189770e45d47, 0x9, 0x0, 0xffffffffffffffff}, @generic={0x73, 0x3, 0x7, 0x82, 0x80000001}], &(0x7f0000000280)='syzkaller\x00', 0x42, 0x0, 0x0, 0x40f00, 0x1e, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0xb, 0x3, 0x7}, 0x10}, 0x78) 18:36:23 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x3f40}, 0x8) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:23 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x106, 0x8}}, 0x20) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000002c0)={0x1, &(0x7f0000000180)=[{0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(0xffffffffffffffff, 0x4010641c, &(0x7f00000003c0)={r1, &(0x7f0000000300)=""/176}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000400)={0x34, 0x1f, 0x300, "0fe3d33140e86a91275985455868fa5ce9af14014c44db79f46f9bc06d6aaae3c4f1a130f9880b4e9102dbc66d9e03b96c97b502"}) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) [ 2107.036112] kauditd_printk_skb: 85 callbacks suppressed [ 2107.036118] audit: type=1400 audit(1608921383.902:649): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=28240 comm="syz-executor.3" 18:36:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x80, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x40020}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r1, 0x11}}, 0x10) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x12183) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040), 0x10) 18:36:24 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x20, 0x0, @dev, 0x22}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000140)='0', 0x1) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3, 0xe}}, 0x10) 18:36:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0xfffffffffffffff7, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0}]}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000000280)={r3, 0x2, &(0x7f0000000140)=[0x200, 0x9], &(0x7f0000000180)=[0x7, 0x3f, 0x2], 0x10, 0x3, 0x80, &(0x7f0000000200)=[0x1, 0x40, 0x8], &(0x7f0000000240)=[0xcfb, 0xfffffffd, 0x6, 0x4, 0x3ff, 0x5, 0xfff, 0xe35, 0xffffffe1]}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) [ 2107.120445] audit: type=1400 audit(1608921383.982:650): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=28264 comm="syz-executor.3" 18:36:24 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @reserved}}) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @reserved}}) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c454e08c52333fcad2bffaa4db3f118fca71dfbc2a303237a9d4833d3e54abc8e6d31ffb38c367c8fd6e8f877b13394121051619759c2d0"], 0xa) 18:36:24 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000500)="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", 0x111, 0x0) r2 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="f0c9bb347c678dac80717b9db8f631dd0d57319a446191383c29bc8ad669079ac0aee85103081d725361ac0369dacbe5baf19ce7d8dc133714084cad4c0882614e483bf24b65c0f218a9611e7a79dcb9e979", 0x52, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r2}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) [ 2107.161966] audit: type=1400 audit(1608921384.012:651): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=8D pid=28262 comm="syz-executor.1" [ 2107.182289] audit: type=1400 audit(1608921384.042:652): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=8D pid=28262 comm="syz-executor.1" 18:36:24 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x8002, 0x0) write$vga_arbiter(r2, &(0x7f00000000c0)=@target={'target ', {'PCI:', '7', ':', '2', ':', '2', '.', '1c'}}, 0x14) write$vga_arbiter(r2, &(0x7f0000000480)=@unlock_all='unlock all\x00', 0xb) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r3 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r3}, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r0, 0x0, r3}, &(0x7f0000000300)=""/77, 0x4d, &(0x7f0000000440)={&(0x7f0000000380)={'blake2s-128-x86\x00'}, &(0x7f00000003c0)="67feae8082aa08ca4045b36860fc7235b0e264508b0bf7078fdc657dbb691252ac0848bd1c0b8480800c7792271f404cc07c6815b9cdc167b543976a6ce0da67e3e1a095e652e209efce22e917020360541827565e2390356e5cdee7bea6716caa64dbdce94006551b1fff2662700c", 0x6f}) 18:36:24 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000000)=[0x4, 0xfffffffd, 0x1], &(0x7f0000000040)=[0x9, 0x6, 0x5, 0x1, 0x401, 0x627, 0x20, 0x3ff, 0x200], 0x60, 0x1, 0x1, &(0x7f0000000080)=[0xbee3], &(0x7f00000000c0)=[0x1, 0xf, 0x10000, 0x5]}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x3, r2, 0x30, 0x0, @in6={0xa, 0x4e21, 0xffffff7f, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0xa0) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000001800)=ANY=[@ANYBLOB='ex\x00'], 0xa) 18:36:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f00000002c0)={0xf, 0x8}, 0x10) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$CHAR_RAW_ROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000340)) r2 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000380)={'team0\x00'}) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000240), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000180)={0x2, 0xffffffffffffffc6, 0xfa00, {0x0, {0xa, 0x0, 0xffffffff, @dev={0xfe, 0x80, [], 0x1}, 0x80022}, r3}}, 0x30) 18:36:24 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="65786563203a5b3774e7000000000071e48f894f4c752f284123241bcc89a63171bd9169b8837981992d471fae1c865dd41fd82b4eb6adc293d6fb12440b12585ed6bfd0ff565651320cae9adbc3531b83d2ed84b17eb43b3164a1df6442f64d9eb03d70f6fc9875f4fd32e06f4d9e0c3720e40f628cd8a3c670961ba5a5b7f2e6aa6517cd29634bda955bf20eac6c5b7fc533960f173c2be388667eaa287e00"], 0xa) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r1, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e24}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x1) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '\x00'}, 0x6) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)={0x278, 0x0, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_EEE_MODES_OURS={0x208, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_MASK={0xde, 0x5, "00781a4d5da3e29aaeae207eecf26e08a34c13bab92f6b4f6280f10106cde17686810527096d10e7c8f99b392022ccbdf693cf099de9bfd03d92652db1f55c654654897c051da141af8740729aeec961d35993e778267387a9045e02fdead5fba370ace83a31e47562e3cd411be08ebe9833b96e0c3a55e8a30a04e579f180c610f728f567826276aeddbcc0c7e1a4bdca4fbb81fc5e53b79aa46d1a75a93047822948342a8b233b68a4b3ab3517c0b9efc44d4cd53d8d59967f554d5b8a6912086911fd606ba547f8c2337c9d50d9691726901afd0141c921da"}, @ETHTOOL_A_BITSET_BITS={0x120, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '.\\,{}+\x00'}]}, {0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x20, 0x2, '/proc/thread-self/attr/exec\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x20, 0x2, '/proc/thread-self/attr/exec\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x20, 0x2, '/proc/thread-self/attr/exec\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x20, 0x2, '/proc/thread-self/attr/exec\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x19, 0x2, '/proc/self/attr/exec\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x20, 0x2, '/proc/thread-self/attr/exec\x00'}]}]}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8}, @ETHTOOL_A_EEE_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x278}, 0x1, 0x0, 0x0, 0x800}, 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x33, 0x2}, 0x7) 18:36:24 executing program 0: ioctl$VIDIOC_STREAMON(0xffffffffffffffff, 0x40045612, &(0x7f0000000040)=0xffffffc1) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x6c, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:24 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000040)={@my=0x1}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0xfffd, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:24 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="6578650500a48ad04820ba9c4d95ffd75bccb450fb056af2f0a87b6fca694d812177671491d9177451950366c82e5361ddc35f77eb832deed877b51009eb0e09cd7304c15342f4af382722959dfa49980cbf8e1de46a1e1a49a0b915c45e886167b2a01f62073943c9ef87cbb75ac580b100000000000000009586f24ef331e5d5dea48da663b9e64b148803fd064a1753748f590d68a6994b978b467df6e0e0d4c762783319d7ea79e6527f2d6b3f82"], 0xa) [ 2107.380539] audit: type=1400 audit(1608921384.242:653): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=3A5B3774E7 pid=28317 comm="syz-executor.3" [ 2107.409403] could not allocate digest TFM handle syz+ 18:36:24 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r2, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000040)={0x14, 0x88, 0xfa00, {r2, 0x10, 0x0, @ib={0x1b, 0x6, 0x0, {"d99fb89b4ba877ab205882884aa9f581"}, 0x3, 0xffffffffffffffff, 0x4}}}, 0x90) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000140)={{0x4, 0x6, 0x1, 0x7f}, 'syz0\x00', 0x2e}) write$apparmor_exec(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="6582656349be00002600afddcf296dedb2b47aff1a896dfca57066772924eabea390444cc9831af2d8e4d579eb770ab54d76d2279a516b7295ee5eb14b7b165acd7ecc2ff5fe03a020f9bce205dbd4d5318de2fe665bc1c522b67c20520f4fca601ce59405965226418754c60be5a0a5dab6e7cd888d873c3a3259c7f7fa4a3245ddf968d633c5864fd7fb0deaa0af00377a109ee959dba142b0635f1a00000045c2a9281df8bf4856402930714c6e45cab75713b653b99bdf6792a690d33b85779f968b6f7a"], 0xa) 18:36:24 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r2, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r2}}, 0x30) 18:36:24 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r1}, 0x0, 0x0, 0x0) r2 = add_key$user(&(0x7f0000001500)='user\x00', &(0x7f0000001540)={'syz', 0x0}, &(0x7f0000001580)="51a73fa5913027114b1f8b51268bba21caf162fd60734aeb0127901ee5889f8d51b0406bd5a65f0586a93e881f6277902fd53b5b5412977752ca6513000399deeec7d93aa547ad0d5885e1125c31934a11661c1e262dad3fffaf3ae0ca96b6bee74b9691939ae26dfb185a58bee3cb1feeedbf2ccd694c571489f6a6d6702ab5d9f128cb90a86af67dd5696a91c19e50f7f704a85917a541d5aa39c7ffc992c23ed8612e8c7cd5896569bdf8c364de0af852ebbd4a7e5f4acd32ec552f6cef69e51803a13d5f973d8c31743049e42cbc5186729ac0", 0xd5, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r3 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r3}, 0x0, 0x0, 0x0) r4 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="2460a324b860c9123df1c8476b87f5eed9bcb7e67c2e743dedd6ac13306ff3d24f646f3bebcd0e159de7df8dd5944ab2af67ad1e2858a37d4bfe5e0ed98298e5fb9e31acf3ebed2d63a47adfc2a3bf227aa3acba6685c5de6fbeed1abcfd8eb3e4ed99f9a779f43c853caf82ed8a7a041fe1824fc8013b674ca0ed5147", 0x7d, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r3, r4, r0}, &(0x7f0000000400)=""/101, 0x65, &(0x7f00000014c0)={&(0x7f0000000480)={'digest_null-generic\x00'}, &(0x7f00000004c0)="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", 0x1000}) [ 2107.440568] audit: type=1400 audit(1608921384.272:654): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=3A5B3774E7 pid=28317 comm="syz-executor.3" 18:36:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), 0xffffffffffffffff, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r2}}, 0x30) 18:36:24 executing program 5: ioctl$VIDIOC_G_FBUF(0xffffffffffffffff, 0x8030560a, &(0x7f0000000140)={0x84, 0x40, &(0x7f0000000100)="eb9f8e2d93c86c23269a62a02739925e7bbdc55d15b904065f4f01ec911063f7c4ee3b679ff4e807", {0x8, 0x9, 0x34325241, 0x3, 0x6b54, 0x4fdd, 0x0, 0x7ff}}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0x2, 0x3, 0x3c049cf1, 0x36e, 0xffffffffffffffff, 0x6, [], 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000680)="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", &(0x7f0000000200)=@buf="f5dce19f729bbc6c63092c86544f3caef6ddfafd3221a8086f43d4526f377f4bf6e75fe9e841fd7ae5e700290d4275f7ff332eb58436ce458bc64e57dc723b78440036197eb71153bc47a7606d3ce5ca2521cd64183ba2a08e6ad78b8251640412c80323fb48b671606aea74abe3223247add3f61cfb71ec56fbd68b4f3da5629b62095eb06995cdab584e1ad0d3fd32bfccbf915a703fced4ddc58fa7d9ea8c8244a64f0491bee18a951f3a2a3a5e82f26e2d3919d029eaf07b26b700d7b91317780e8ec807328ff01aa0fd01405ffee310aab79990b9816d7f76a1e8a81f1bee73875a1171d6fa", 0x4}, 0x20) 18:36:24 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000000)=0x4, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @window={0x3, 0xffff, 0x7}, @window={0x3, 0x8001, 0x6}, @timestamp], 0x4) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:24 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x8001, 0x40401) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) [ 2107.543542] could not allocate digest TFM handle syz+ 18:36:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={'rose', 0x0}, 0x9167, 'syz0\x00', @bcast, 0x1000, 0x8, [@null, @null, @null, @default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}) openat$cgroup_freezer_state(r0, &(0x7f0000000040)='freezer.state\x00', 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc26fd"], 0xa) [ 2107.595456] audit: type=1400 audit(1608921384.462:655): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=28374 comm="syz-executor.1" 18:36:24 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:24 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0x1f, 0x12) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="f0ef0000203a00002600"], 0xa) 18:36:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0x0, 0x1, 0xffff, r2, 0x0, &(0x7f0000000080)={0x990a5f, 0x7, [], @p_u32=&(0x7f0000000040)=0x3}}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:24 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2, 0x0, @dev, 0x22}, r1}}, 0x30) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x5, 0x100) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) [ 2107.711869] audit: type=1400 audit(1608921384.572:656): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=28409 comm="syz-executor.1" 18:36:24 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = socket$l2tp(0x2, 0x2, 0x73) bind$l2tp(r1, &(0x7f00000001c0)={0x2, 0x0, @multicast2}, 0x10) connect$l2tp(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$l2tp(0x2, 0x2, 0x73) bind$l2tp(r2, &(0x7f0000000040)={0x2, 0x0, @multicast2, 0x4}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x8}, r3}}, 0x30) 18:36:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={'rose', 0x0}, 0x9167, 'syz0\x00', @bcast, 0x1000, 0x8, [@null, @null, @null, @default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}) openat$cgroup_freezer_state(r0, &(0x7f0000000040)='freezer.state\x00', 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc26fd"], 0xa) 18:36:24 executing program 2: openat$vimc2(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/video2\x00', 0x2, 0x0) r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) ioctl$CHAR_RAW_IOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000640)) socketpair(0xf, 0x1, 0x6, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SOCK_DESTROY(r2, &(0x7f0000000900)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0xd4, 0x15, 0x300, 0x70bd2c, 0x25dfdbfc, {0x25, 0xeb}, [@INET_DIAG_REQ_BYTECODE={0x78, 0x1, "dc5fe3ba20abfd2162905d0c1e18e00c9709eadeaab852acfdba2b338f566ea87095293a70622f82448fabea16dec2ddda58cc4f5255a587b1f13a82da2e45ec9bb6d8f482c9ad7a4fdd7492033d7c1fecf87760c172cdd93ee19c765646fb3bccfa2696dedc9dea1d7244721355fbd5c0e6f17d"}, @INET_DIAG_REQ_BYTECODE={0x48, 0x1, "b29bf165331ce30522c69db618fec75e09534cd740b08e3a117b2dd4b3baf74c4e1171fea81e8d80586107a331918050f6e0a67e46ecf53af4ec3305d21c552e9cab6a0c"}]}, 0xd4}, 0x1, 0x0, 0x0, 0x80}, 0x1c010) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000380)={0x1, &(0x7f0000000340)=[{0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000400)={r3, &(0x7f00000003c0)=""/42}) r4 = syz_open_dev$char_raw(&(0x7f0000000940)='/dev/raw/raw#\x00', 0x1, 0x612000) ioctl$CHAR_RAW_HDIO_GETGEO(r4, 0x301, &(0x7f0000000980)) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000680)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYBLOB="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"], 0x25c}, 0x1, 0x0, 0x0, 0x4000010}, 0x100000c4) 18:36:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={'rose', 0x0}, 0x9167, 'syz0\x00', @bcast, 0x1000, 0x8, [@null, @null, @null, @default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}) openat$cgroup_freezer_state(r0, &(0x7f0000000040)='freezer.state\x00', 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc26fd"], 0xa) 18:36:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000080)='1', 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x2, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x264) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r2, 0xc}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:24 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x3, r1, 0x30, 0x0, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x43}}}}, 0xa0) 18:36:24 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) prctl$PR_MCE_KILL_GET(0x22) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @reserved}}) ioctl$VIDIOC_G_INPUT(r2, 0x80045626, &(0x7f0000000040)) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f0000000080)={0x0, 0x0, 0x103, 0x0, {0x20, 0x5, 0x7, 0x4}}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 18:36:24 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:24 executing program 4: setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000240)=0x8, 0x4) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = getpid() process_vm_readv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/54, 0x36}], 0x1, &(0x7f0000000180)=[{&(0x7f0000000680)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) process_vm_readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/82, 0x52}], 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)=""/25, 0x19}, {&(0x7f0000000180)=""/58, 0x3a}], 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r2}}, 0x30) 18:36:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={'rose', 0x0}, 0x9167, 'syz0\x00', @bcast, 0x1000, 0x8, [@null, @null, @null, @default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}) openat$cgroup_freezer_state(r0, &(0x7f0000000040)='freezer.state\x00', 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc26fd"], 0xa) 18:36:24 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="659d6783cd99db4dfcfc"], 0xa) pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RREAD(r1, &(0x7f0000000380)={0xb}, 0xb) write$P9_RREADLINK(r1, &(0x7f0000000780)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'gretap0\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x8, 0x0, 0x4, 0x2b7b, {{0x1e, 0x4, 0x2, 0xf, 0x78, 0x67, 0x0, 0x80, 0x2f, 0x0, @private=0xa010101, @remote, {[@end, @noop, @timestamp_addr={0x44, 0x4, 0xfb, 0x1, 0x2}, @timestamp={0x44, 0x10, 0x21, 0x0, 0x9, [0x3, 0x7fffffff, 0x1]}, @end, @noop, @lsrr={0x83, 0x1f, 0x40, [@private=0xa010102, @broadcast, @multicast1, @dev={0xac, 0x14, 0x14, 0x21}, @multicast2, @loopback, @loopback]}, @timestamp_addr={0x44, 0x24, 0x13, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}, {@private=0xa010100, 0xf883}, {@multicast2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}]}, @cipso={0x86, 0x6, 0x1}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'tunl0\x00', &(0x7f00000001c0)={'tunl0\x00', 0x0, 0x1, 0xf810, 0x2, 0xfb98, {{0x23, 0x4, 0x1, 0x14, 0x8c, 0x66, 0x0, 0x6, 0x4, 0x0, @empty, @private=0xa010101, {[@timestamp={0x44, 0x28, 0x29, 0x0, 0x9, [0x1, 0x6, 0xec, 0x4, 0xffffff1a, 0xe00, 0x100, 0x8, 0x9]}, @end, @rr={0x7, 0x27, 0x7b, [@private=0xa010101, @dev={0xac, 0x14, 0x14, 0x42}, @dev={0xac, 0x14, 0x14, 0x2e}, @rand_addr=0x64010102, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x16}]}, @cipso={0x86, 0x26, 0x2, [{0x6, 0xe, "6d1e71a1c8d274ca76e72d7a"}, {0x0, 0x12, "fd0f457fed67de7848375bc0bfb72e69"}]}]}}}}}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r5, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r5, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0x9c, r2, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x41}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8}, @ETHTOOL_A_CHANNELS_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x5}, 0x10000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000380)={'ip_vti0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x20, 0x8000, 0x8, 0x5, {{0x19, 0x4, 0x3, 0x6, 0x64, 0x8001, 0x0, 0x0, 0x29, 0x0, @empty, @empty, {[@timestamp_prespec={0x44, 0x44, 0x29, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@multicast2, 0x8}, {@broadcast, 0x81}, {@dev={0xac, 0x14, 0x14, 0x18}}, {@remote, 0x7f}, {@dev={0xac, 0x14, 0x14, 0x3e}, 0x2}, {@local, 0x1ff}, {@broadcast, 0x9}]}, @timestamp_addr={0x44, 0xc, 0x84, 0x1, 0x8, [{@rand_addr=0x64010100, 0x9}]}]}}}}}) sendmsg$ETHTOOL_MSG_RINGS_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xf8, r2, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x4}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xf8}}, 0x400c835) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000700)={'syztnl1\x00', r3, 0x10, 0x8000, 0x1, 0xffff8000, {{0x17, 0x4, 0x1, 0x3, 0x5c, 0x68, 0x0, 0x9, 0x2f, 0x0, @multicast1, @broadcast, {[@timestamp={0x44, 0x1c, 0x7d, 0x0, 0x0, [0x8001, 0xa96, 0x3, 0x7, 0x7f, 0x9]}, @timestamp_prespec={0x44, 0x2c, 0xcd, 0x3, 0xe, [{@empty, 0x7}, {@dev={0xac, 0x14, 0x14, 0x38}, 0x6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xc0}, {@local, 0xabce}, {@remote, 0x3}]}]}}}}}) openat$uinput(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/uinput\x00', 0x802, 0x0) 18:36:24 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000800)="7b1fa12c7315653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf527adecacf5fdac1839faff81d690be0205814897da5d48f23bf51e281d4e05c78d864e8a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f927461f62d02ae6fee71a4c9432e04676162e49a72e2f8595d7c0664aa6c00c856ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc152b11632c588e82886cd65b4af5a387401aa73a65b3620bf97c8053ed30cb6c81d833676b6ccc6f706e0c37000000000400"/233, 0xfe64, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/attr/exec\x00', 0x2, 0x0) getpeername$netrom(0xffffffffffffffff, &(0x7f0000000400)={{0x3, @null}, [@rose, @remote, @netrom, @bcast, @netrom, @rose, @rose, @rose]}, &(0x7f0000000480)=0x48) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000780)="ffe5d4aae77b3c4bce2b5410996e386b2377c6fdb10d20f294bd2525bbde56bd2540d80093196ca4f12ca252a09e88eac90d1fbad38831827d6a1661447fb4654ea2e8f7cb9af045b4209719a125ac258084e520e2e0157d0345c8608e12", 0x5e, 0xfffffffffffffff8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x9, 0xffff8000, {"51f2def39d7d144401fb9863d8249718"}, 0x0, 0x5, 0x7fff}}}, 0x90) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="f0c98b1997fe9d0e0363810c7510051251675e400c24a864937e09df156395db5ac5ca687b2e1a552f559fbf8aaeceba1a4077ae690c724bd5e72a8ddcb931eeac8a6a2d2cf9150dd5454d3ba96794d07771", 0x52, 0x0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000200)='reno\x00', 0x5) socketpair(0x5, 0x800, 0x0, &(0x7f00000001c0)) 18:36:24 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r0}}, 0x30) 18:36:24 executing program 4: r0 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x0, 0x284402) ioctl$CHAR_RAW_FRASET(r0, 0x1264, 0x0) ioctl$CHAR_RAW_IOOPT(r0, 0x1279, &(0x7f0000000080)) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=@target={'target ', {'PCI:', '1e', ':', 'a', ':', '1b', '.', '5'}}, 0x15) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r2}}, 0x30) 18:36:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={'rose', 0x0}, 0x9167, 'syz0\x00', @bcast, 0x1000, 0x8, [@null, @null, @null, @default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}) openat$cgroup_freezer_state(r0, &(0x7f0000000040)='freezer.state\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc26fd"], 0xa) 18:36:24 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000080)={0x3, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000100), 0x0, r4, 0x30, 0x1, @ib={0x1b, 0xff, 0x1, {"b9cb70fbf25188c8027dc91ecc270972"}, 0x1, 0xc02d, 0x7f}}}, 0xa0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r2}}, 0x30) 18:36:24 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) r2 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x6, 0x40) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000080)={0x0, 0x30}) 18:36:24 executing program 3: ioctl$KVM_GET_DEBUGREGS(0xffffffffffffffff, 0x8080aea1, &(0x7f0000000000)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={'rose', 0x0}, 0x9167, 'syz0\x00', @bcast, 0x1000, 0x8, [@null, @null, @null, @default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}) openat$cgroup_freezer_state(r0, &(0x7f0000000040)='freezer.state\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc26fd"], 0xa) 18:36:25 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)="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", 0x1000, 0xffffffffffffffff) r3 = add_key$user(&(0x7f0000001340)='user\x00', &(0x7f0000001380)={'syz', 0x3}, &(0x7f00000013c0)="40ee51b528d8df0ce4dd349a5076ee88d8140a6b426821a0d1de79b97d266d1b832e5aaf403b031a5d258066639e7c0e3f3deee229b14b06c38fe168d285ff5caf81d9c96257d3b4596aee2d5d5652de76903faa3eae5bb72624c244e7ca02db2e6a5b0316e8b8ea6c7ad55fe8f990a7cd1512dadb2aa6635d0786deb2bd871aa83480a79facdde576a1c9184240a0ee57ec278b", 0x94, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000001480)={r1, r2, r3}, &(0x7f00000014c0)=""/26, 0x1a, &(0x7f0000001540)={&(0x7f0000001500)={'crct10dif-pclmul\x00'}}) 18:36:25 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'exec '}, 0xb) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000140)={'exec ', 's\xfd\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00'}, 0x13) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x2}}, 0x20) 18:36:25 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={'rose', 0x0}, 0x9167, 'syz0\x00', @bcast, 0x1000, 0x8, [@null, @null, @null, @default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}) openat$cgroup_freezer_state(r0, &(0x7f0000000040)='freezer.state\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc26fd"], 0xa) 18:36:25 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="d0e71574b873757c2600e6b0e22f4e69d14f0729f9f6a34926592c0728dca462899041585f09187d949848731dd958f00200000000000000cd04545b397a8db6b1e9aa9de384de7cac426999ff7dbc306d51f712ff3e0e60890d0ca933d285d932c47885492696c3a84b35411d1d1d6a85f7380cb1f810963a04dd72374884de2305aa3dbb261d384d1dca4d8580ffd5a33ceedf78d1f2a9980000000000542dbbe1286253ef172f305533716102aa4c6549edc2d5760b1da175b107586dd9b36bf8a09298d4067094ed65c1c217f8000e1660b412ad98c5293f8449b9ca0c0431b494ef7c90d5cd6a1f0400"/246], 0xa) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x4c80, 0x8000) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000140)=0x4, &(0x7f0000000180)=0x4) 18:36:25 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r2 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) write$6lowpan_enable(r2, &(0x7f0000000080)='0', 0x1) write$6lowpan_enable(r2, &(0x7f00000000c0)='0', 0x1) 18:36:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000240)) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x2, @dev, 0x22}, r1}}, 0x30) ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f0000000080)={0x5, @sliced={0x1ff, [0x8001, 0x4, 0x40, 0xd73, 0x8000, 0x3, 0x1000, 0x0, 0xfffe, 0x1f, 0x6d, 0x34bd, 0x3ff, 0x4, 0x5, 0x1f2, 0x5de, 0x9, 0x0, 0x4, 0x5, 0x0, 0x2, 0x8, 0x101, 0x8, 0x80, 0x6, 0x4, 0x640, 0x8, 0x9, 0x6, 0xc4, 0x84c, 0x7, 0x7, 0x3, 0x1, 0x7fff, 0x1, 0xfff, 0x2, 0x2, 0x8, 0x9e6, 0x3, 0x5b2], 0x2}}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getpeername$l2tp(r2, &(0x7f0000000500)={0x2, 0x0, @initdev}, &(0x7f0000000540)=0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000180)=0x8, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='cubic\x00', 0x6) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f00000004c0)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), r1, 0x1}}, 0x18) [ 2108.201085] audit: type=1400 audit(1608921385.062:657): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="exec" pid=28519 comm="syz-executor.3" 18:36:25 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={'rose', 0x0}, 0x9167, 'syz0\x00', @bcast, 0x1000, 0x8, [@null, @null, @null, @default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc26fd"], 0xa) 18:36:25 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x33, 0x2}, 0x7) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r3, 0x2}}, 0x18) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/card0/oss_mixer\x00', 0x220001, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), r3, 0x1}}, 0x18) 18:36:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x0, {0x67a, 0xffff8000, "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", 0xb8, 0x4, 0x6, 0x6, 0x2, 0x80, 0x8, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x100, @private2={0xfc, 0x2, [], 0x1}, 0x40020}, r1}}, 0x30) 18:36:25 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[], 0x8) write$apparmor_exec(r1, &(0x7f0000000040)={'stack '}, 0xffffffffffffff51) 18:36:25 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc26fd"], 0xa) 18:36:25 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, 0x0, 0x0, 0x0, &(0x7f0000000740)={0x2, 0x0, @local}, 0x10) connect$l2tp(r0, &(0x7f0000000800)={0x2, 0x0, @remote, 0x4}, 0x10) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000540)={0x4, 0x8, 0xfa00, {r3, 0x100}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xe, 0x7f, 0x5, 0x8, 0x200, 0xffffffffffffffff, 0x81, [], 0x0, 0xffffffffffffffff, 0x2}, 0x40) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_tracing={0x1a, 0x9, &(0x7f0000000480)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_val={0x18, 0xa, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0xfffffff9}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1004}, @map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x4, 0xb, 0x2, 0x8, 0x10}, @exit], &(0x7f0000000340)='syzkaller\x00', 0x3ff, 0x0, 0x0, 0x40f00, 0x10, [], 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x5, 0x40, 0x7}, 0x10, 0x28f08}, 0x78) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f00000007c0)={0x13, 0x10, 0xfa00, {&(0x7f00000005c0), r3}}, 0x18) 18:36:25 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000080)={{0x1000, 0xce, 0x73c, 0xffff}, 'syz0\x00', 0xb}) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:25 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc26fd"], 0xa) 18:36:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x22881, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) getpid() 18:36:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r2}}, 0x30) 18:36:25 executing program 0: socketpair(0x21, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'tunl0\x00', &(0x7f0000000100)={'tunl0\x00', r1, 0x7, 0x7, 0x81, 0xdf63, {{0x15, 0x4, 0x0, 0x30, 0x54, 0x67, 0x0, 0x81, 0x4, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x1d}, {[@timestamp={0x44, 0x1c, 0x90, 0x0, 0x1, [0x0, 0x6, 0x20, 0x7, 0x7fffffff, 0x6]}, @timestamp={0x44, 0xc, 0x2e, 0x0, 0x8, [0x808000, 0x81]}, @ssrr={0x89, 0x13, 0x6, [@dev={0xac, 0x14, 0x14, 0x20}, @broadcast, @multicast2, @loopback]}, @generic={0x82, 0x3, '7'}]}}}}}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r3}}, 0x30) 18:36:25 executing program 3: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @reserved}}) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="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", 0x1000, 0xfffffffffffffff8) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @reserved}}) write$apparmor_exec(r0, &(0x7f00000010c0)=ANY=[@ANYBLOB="651875f7d5d772a02610", @ANYRES16, @ANYRESHEX=r1], 0xa) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0xfffffff8}, 0x8) 18:36:25 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc26fd"], 0xa) 18:36:25 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)="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", 0xff, 0xfffffffffffffffe) [ 2108.489014] audit: type=1400 audit(1608921385.352:658): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=28570 comm="syz-executor.3" 18:36:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) r2 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x14b000) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000100)={r3}) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x7, 0x40000) 18:36:25 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:25 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc26fd"], 0xa) 18:36:25 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x50, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x24000010}, 0x4010000) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x6, &(0x7f0000000140)=@raw=[@exit, @call={0x85, 0x0, 0x0, 0x90}, @generic={0x9, 0x7, 0xf, 0x5, 0x401}, @exit, @generic={0x8, 0x6, 0x2, 0x40, 0xffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}], &(0x7f00000002c0)='syzkaller\x00', 0x1ff, 0x0, 0x0, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xa, 0x7fffffff, 0x20000}, 0x10}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000100)='afs_call_done\x00', r4}, 0x10) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) 18:36:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x44, 0x0, 0x0, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x47}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x8e}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x20008084}, 0x400c0) 18:36:25 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:25 executing program 5: r0 = syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x2) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000080)={0x80, 0x8, &(0x7f0000000100)="8cf3220b021389b7aa9f1fe9076e99d905cb646e9470701fb0b46f0770a5708a5e920085c5d571474c1fa826078f6a353501959c2e9ea7b921799c22891b36d9fbbbb30886618cb02ba2aeb7116ea3f71af58a7212c341532618ac4ad83ede8d5bf2384132e13acb183ed981002bcd6f9df73ae07c87c9880e12bb21b816dfe64376c002d30f384d2dcbfd10978694de61a1d6103c73e6bde391192b13e77049ceb664a92bed4af559ec4346b9ff5edbf7", {0x40, 0x6, 0x20323159, 0x3, 0x8, 0x3, 0x6, 0x1}}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r2}}, 0x30) r3 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @rose}, [@rose, @netrom, @rose, @null, @remote, @netrom, @rose, @netrom]}, &(0x7f0000000280)=0x48, 0x800) setsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f00000002c0)=0x5e, 0x4) 18:36:25 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r1, 0x0, 0x0, 0x0, &(0x7f0000000740)={0x2, 0x0, @local}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) sendto$l2tp(r1, &(0x7f0000000000)="a9aecea65ad16aee491b49fa6db8201c01feb4bad544430cbef546dba8d9a5b1e8c74f9738d0193d41b6c5fc922299a8c521cc694ea863fcb3acd0c3995171713035e2d410ee0bbee69b1f84cacc9f92c600cc5999", 0x55, 0x20000010, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:25 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc26fd"], 0xa) 18:36:25 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x5, 0x5, 0xdd3e, 0x1082, 0xffffffffffffffff, 0x5, [], 0x0, 0xffffffffffffffff, 0x100, 0x2, 0x1}, 0x40) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000100)="351670f5c9c8d482375353e9cba92509e308d86a388658189da84af896b1f03fd4be580a0261fd8c2c44087b40cd974517be07702b3a12d3dd000b55f7ca0b7e2b9c5a1005d1c0836c2997f1d5f7f0ce457a2a26522f883662b81cafd7f84ab2f429262237d287c37c8dd37269cb5dea9afd390addfb7a09ca49a3a00015edff951eca7ca073d32ea61aa8e303de372464c36bdb8a3f0d660b9d", 0x9a) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), 0xffffffffffffffff, 0x1}}, 0x18) sendto$l2tp(0xffffffffffffffff, &(0x7f0000000440)="b1dbc28254f4a0cdf5250acecce2e1536a6afd1419dc7b1a50eae5568efe913372ae23db19c4f43f7dcff0f976ee63b9600b97a8d78c52eff45c1b157f2cb7dad7180a562a04b023474f58d2c9a2de00a5ce4cceabba4bbb2b41c6b933065f9714e03429ea70534063e2c3fb10e9b9333431fbabd42b4623a77f6b6e902609a2fb75e56ff8a90d56535d8dd08d3ea561fde937fce197046e153ae87e748672f2d0011b276ff3e496593016986f368a148aa0ede17bf2dcbd3d66c5e6fda1660a3ed77f4743f6b9bb6d1f8741212129935cac9e6c67f3cf5391", 0xd9, 0x4000c000, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x4}, 0x22}, r2}}, 0x30) 18:36:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @rose}, [@bcast, @remote, @null, @null, @bcast, @rose, @default, @rose]}, &(0x7f0000000100)=0x48) 18:36:25 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$SOCK_DESTROY(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x128, 0x15, 0x400, 0x70bd25, 0x25dfdbfb, {0x0, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x92, 0x1, "477d3f0133029aebd8435c4e6895e1fd38e9957e0f95f82accb7046a1bebca8831a9292dc50e795ee46238c95f6b1c4a6f3907bf95fe1671ee16131b01ef83e30a23b4877f6127fa273117552b967ec81e4ae997bd9382ea8299d7b60d7fe9d7b55e049a7b4f24447241b255bf476ab3e8b028be1afa6016058646e180b387a6b8fdd8d606012d23dbc0bc12f49e"}, @INET_DIAG_REQ_BYTECODE={0x7f, 0x1, "57c108ac046372863f6f8fd9bc1f01599888f56926cff7e82e01e1d5ff0984987fd97acf3d1a56f538ac361b4956608f66bcdef35c411e45e722a428f4f1f984dbe95f0f024f1a48c6e89c258644dae13e70bc500752fd0cf45810f1d116b41099a4e522c8a4832b0a47bdcaf1932933e19eeffef7b50053427ef3"}]}, 0x128}, 0x1, 0x0, 0x0, 0x24000000}, 0x4) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:25 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc26fd"], 0xa) 18:36:25 executing program 3: syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:25 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r1, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x50, 0x0, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x4800}, 0x41) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:25 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc26fd"], 0xa) 18:36:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x2, r3, 0x10, 0x0, @in={0x2, 0x4e23, @loopback}}}, 0xa0) 18:36:25 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="6cf71260564e0f7c04e384e78810a76392efaa5b6416446db34fac03a4bf8546037bdcadec9cbc6c8a3ec940ef"], 0xa) 18:36:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:25 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc26fd"], 0xa) 18:36:25 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r2 = syz_open_dev$vivid(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x2) r3 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @reserved}}) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000380)={0x9c0000, 0x3f, 0x8, r3, 0x0, &(0x7f0000000340)={0x9b0960, 0x9, [], @string=&(0x7f0000000300)=0x82}}) 18:36:25 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0xa) 18:36:25 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec$:[-&\x00'], 0xa) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '!/}$+\')(&\x00'}, 0xf) 18:36:25 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000004c0)="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", 0x1a0, 0xfffffffffffffff8) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r2}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:25 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0xa) 18:36:26 executing program 3: process_vm_readv(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/52, 0x34}, {&(0x7f0000000040)=""/195, 0xc3}], 0x2, &(0x7f0000000540)=[{&(0x7f0000000180)=""/244, 0xf4}, {&(0x7f0000000280)=""/187, 0xbb}, {&(0x7f0000000340)=""/155, 0x9b}, {&(0x7f0000000400)=""/16, 0x10}, {&(0x7f0000000440)=""/111, 0x6f}, {&(0x7f00000004c0)=""/83, 0x53}], 0x6, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r1, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000005c0)) 18:36:26 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0xa) 18:36:26 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x7b, 0x1}, 0x7) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:26 executing program 2: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r1}, 0x0, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)="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", 0x1000, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000001340)={r1, r2, r0}, &(0x7f0000001380)=""/109, 0x6d, &(0x7f00000014c0)={&(0x7f0000001400)={'crc32\x00'}, &(0x7f0000001440)="65ca615554ca9a1143b1abe44cccf1d91529a5f49a843dd214d2778fdf64673d0c6cc0abfe7e02ce829f834b56855c3b694c9369eb7be57dcb954af5bbc77ad8e72cb758eebb42653e625d32b167045c6a61b642a56c062164868c5651c1b49958abba21054ae89ab6aedf7d455c49019683d18c03eed722fc2c", 0x7a}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001500), &(0x7f0000001540)=0x14) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:26 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[], 0xa) 18:36:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) syz_open_dev$char_raw(&(0x7f0000000040)='/dev/raw/raw#\x00', 0x1, 0x20000) 18:36:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) pipe2$9p(&(0x7f0000000100), 0x184800) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'syztnl2\x00', &(0x7f0000000300)={'tunl0\x00', 0x0, 0x7800, 0x10, 0xffff, 0x9, {{0x24, 0x4, 0x1, 0x1e, 0x90, 0x67, 0x0, 0x1f, 0x2f, 0x0, @local, @empty, {[@timestamp_prespec={0x44, 0x14, 0x9a, 0x3, 0x6, [{@private=0xa010101, 0x100}, {@initdev={0xac, 0x1e, 0x1, 0x0}}]}, @timestamp_prespec={0x44, 0x3c, 0x65, 0x3, 0xf, [{@loopback, 0x7ff}, {@private=0xa010101, 0x7ff}, {@private=0xa010100, 0x6f8}, {@empty, 0x7}, {@local, 0x9b8b}, {@multicast1, 0x226}, {@loopback, 0x81}]}, @cipso={0x86, 0x2c, 0x2, [{0x1, 0x7, "084706ef0d"}, {0x0, 0x2}, {0x6, 0xd, "08f49094946e701a4578a7"}, {0x5, 0x9, "81aa35244e7ebd"}, {0x7, 0x7, "5b29eeb010"}]}]}}}}}) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000880)={&(0x7f0000000700)={0x16c, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x40}, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r8, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r9, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r7, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r9, 0x10001}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x7, @remote, 0x40020}, r1}}, 0x30) 18:36:26 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '3T\xb0\xf5\x009T\xe7\xa6%\xd5\x85\x92\x00\xc0\v\x16\xf0\xc5\xba\xfc\xba-?\xfe\xfd=\x13\xcev|ZT%!%\xda\xcd\xdb\xf0R\x8b^\x0f2\x8eoA\xbe<\xc3\xb4\xb9\xa3\x8c=\x8edL\xf1\x82(\xe1\xa5_\xec2\x80;\x1fJE\x96\x8fvo\x88T\xc5]O>\x14\x12W\xef\a\xe5\xd5\x85\xf9\xcb\x01\xc7q\xcf\xaa\x9c\x11\x02'}, 0x69) 18:36:26 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[], 0xa) 18:36:26 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r2}, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000280)={r2, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'rmd160-generic\x00'}}) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r3, 0x0, 0x0) setsockopt$netrom_NETROM_N2(r3, 0x103, 0x3, &(0x7f0000000140)=0x3, 0x4) 18:36:26 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', 'K[-&\x00'}, 0xa) 18:36:26 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, 0x0, 0x0, 0x0, &(0x7f0000000740)={0x2, 0x0, @local}, 0x10) recvfrom$l2tp(r0, &(0x7f0000000680)=""/4096, 0x1000, 0x10002, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0xd4be309dd5ad0762, 0x4}}, 0x20) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f0000000180)={0x75e, 0x9}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x22}, r3}}, 0x30) 18:36:26 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[], 0xa) 18:36:26 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exes :[-&\x00'], 0xa) 18:36:26 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000200)={'tunl0\x00', 0x0, 0x20, 0x700, 0xfffffff8, 0x5, {{0x39, 0x4, 0x2, 0x8, 0xe4, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010102, @private=0xa010101, {[@rr={0x7, 0x23, 0xfe, [@multicast2, @multicast1, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x25}, @loopback, @private=0xa010101]}, @generic={0x83, 0x5, "1e2feb"}, @ssrr={0x89, 0x17, 0x22, [@multicast1, @rand_addr=0x64010101, @multicast1, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x14, 0x5, 0x0, 0x0, [0x1, 0x1, 0x7, 0x1000]}, @timestamp_prespec={0x44, 0xc, 0x16, 0x3, 0x2, [{@loopback, 0xf4d}]}, @rr={0x7, 0x13, 0x3a, [@broadcast, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}, @cipso={0x86, 0x3a, 0x2, [{0x5, 0x2}, {0x7, 0xd, "97512e5eb1db87db543fe3"}, {0x6, 0x3, "b7"}, {0x1, 0x4, "0d92"}, {0x7, 0xf, "1b74d55ca8854f82ccc8566633"}, {0x4, 0x6, "a3ae08f8"}, {0x5, 0x7, "626f21e0ed"}, {0x0, 0x2}]}, @rr={0x7, 0xb, 0xe1, [@rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x28}]}, @timestamp={0x44, 0x18, 0xd4, 0x0, 0x7, [0x101, 0x7, 0x3, 0x401, 0x1]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'tunl0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x8000, 0x10, 0x8, 0x1224, {{0x10, 0x4, 0x3, 0x3b, 0x40, 0x65, 0x0, 0x0, 0x4, 0x0, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@rr={0x7, 0x13, 0xde, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @rr={0x7, 0xf, 0x47, [@local, @dev={0xac, 0x14, 0x14, 0x41}, @remote]}, @end, @ssrr={0x89, 0x7, 0x26, [@local]}]}}}}}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000080)={'gretap0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000f00)={'syztnl1\x00', &(0x7f0000000e80)={'syztnl1\x00', r2, 0x40, 0x20, 0x40, 0x7, {{0xc, 0x4, 0x1, 0x39, 0x30, 0x66, 0x0, 0x2, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}, @multicast2, {[@lsrr={0x83, 0x1b, 0x8d, [@private=0xa010102, @remote, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @empty]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000480)={'syztnl1\x00', 0x0, 0x20, 0x40, 0x4, 0x3, {{0xf, 0x4, 0x1, 0x3c, 0x3c, 0x68, 0x0, 0x39, 0x0, 0x0, @loopback, @private=0xa010100, {[@timestamp_addr={0x44, 0x24, 0x4e, 0x1, 0xa, [{@local, 0x8}, {@broadcast, 0x1f4}, {@remote, 0x3ff}, {@local, 0x8}]}, @noop, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000640)={'gre0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB="73797a746e6c72000000000000000000508847e08638745cb614979d34e1cd305414a86c52ace32fd60bdbfae0a6ea3eae7e5cfb9a19720f63488bbdc38c0495cb5659ba", @ANYRES32=0x0, @ANYBLOB="0700801700000007000002004c8f00700065000081299078ac1e0001640101014410f8600000000100000005100000008927276401010264010102e0000001000000007f000001ac1e0001ffffffffe0000001e000000107020144043fa188092c42c61d3a2e5494040000890b1aac14144100000000010703dc0000"]}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000e40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000e00)={&(0x7f0000000680)={0x750, 0x0, 0x300, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r3}, {0xcc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r5}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x1f8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r7}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r10}, {0x244, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x4c}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0xd650}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x1a}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0x750}, 0x1, 0x0, 0x0, 0xc0}, 0x4e005) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r0}}, 0x30) 18:36:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) r2 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r2, 0x0, 0x0, 0x0, &(0x7f0000000740)={0x2, 0x0, @local}, 0x10) connect$l2tp(r2, &(0x7f0000000040)={0x2, 0x0, @remote, 0x3}, 0x10) 18:36:26 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), 0xffffffffffffffff, 0x2}}, 0x18) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:26 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB], 0xa) 18:36:26 executing program 3: socketpair(0x28, 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f00000000c0)={r0, 0x3}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="1758ad50cd3e29a026052c63a327feccc9008a017b755052379842b870cafd3632ff48abb68b14b5fa634b43806c641bb2bf57d5609f14b49c7d4fbfe934ebc5"], 0xa) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 18:36:26 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r2 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r2, 0x0, 0x0, 0x0, &(0x7f0000000740)={0x2, 0x0, @local}, 0x10) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x80000001) sendto$l2tp(r2, &(0x7f00000000c0)="08b1eabba29156543673", 0xa, 0x0, &(0x7f0000000300)={0x2, 0x0, @rand_addr=0x64010100, 0x2}, 0x10) 18:36:26 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB], 0xa) 18:36:26 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) bind$netrom(0xffffffffffffffff, &(0x7f0000000740)={{0x3, @bcast, 0x6}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @null]}, 0x48) r4 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x88000) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="860000000180000001000000c92f36847b1b0ec6abd8dcd39f4acf2a04f2314a3f7b2902be5f5c2fc935a56058feba0323106dfa7c9427adceec519a9d641d59118bfecc50bb9f49b10dcfb4718780653c857b1c1a6f30cc116a300812964e9c99961d7b1ed74a7d8b0fdd142643d8903fdc619e0aa40fd7e827cc4909d82b0f167cd82bc10199f393b6a80425a2e07326b2"]) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r3, 0xffffffff}}, 0x10) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000800)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f0000000700)={0x9, 0xbf1b}) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r6, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000005c0)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x1}}, 0x18) 18:36:26 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x5, 0x14102) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '\r.{+\xf8!\x00'}, 0xd) 18:36:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @mcast1, 0x173}}}, 0x30) 18:36:27 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r2, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2, 0x6}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r0}}, 0x30) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10, &(0x7f0000000180)=0x8, 0x4) setsockopt$inet_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000040)="24d66f155b52650537965ba46bddfce8e3531970210bb83b03a8624c74f92f7d3ba6d57e262468bc922ab2aa2228b85203338edb9029ff071f7fa2527b610287a6e2a5fa9c9f6d59d1da33d017b744fced1eef9bebac74ee62ad31fba351b99c617a6df4878ca1d11626b71ecd16", 0x6e) 18:36:27 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0xfffffffffffffdc7, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$CHAR_RAW_RESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000040)={0x8000, 0x1}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x8000022}, r1}}, 0x30) 18:36:27 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB], 0xa) 18:36:27 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r1, 0x0, 0x0) r2 = accept4$netrom(r0, &(0x7f0000000040)={{0x3, @null}, [@default, @rose, @bcast, @default, @netrom, @bcast, @bcast, @null]}, &(0x7f00000001c0)=0x48, 0x80000) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000100)=0x101, 0x4) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x77, 0x2, 0x10001}, 0xb) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x277) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000140)={0xff, 0x6, 0x13c3, 0x9, 0x2}, 0x14) 18:36:27 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000480)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000240)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}, 0x7}, r2}}, 0x30) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_RM_CTX(r3, 0xc0086421, &(0x7f00000005c0)={0x0, 0x3}) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r4, 0x8008af00, &(0x7f0000000580)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r4, 0x4008af60, &(0x7f00000001c0)={@local}) r5 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000300)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a32528d140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecac39faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec125f73df92b11632c000000003fa46896e6193a4a0d9c190b9671716c95c37e143361c4b67ee85a487a345a3c50190a2cb370eb5cdd998d0f44dfdc97d561159211afa83dd54e0755f78e5d72b93eb92118012994f9ab8a20131b926850b5f40c46e1bbcb8d3b342bd8edaa275c3d5251737f3f2cb15d5d5c3c618b59a4471f2a2645cfacbe51cf029a55bcee9f7a5a32c0d872b52c1e3e8228f21ce5ff6bf88bf3eb42665accefefadc376909d17", 0x162, 0xfffffffffffffffd) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000540)={0x12, 0x10, 0xfa00, {&(0x7f0000000500), r2, r1}}, 0x18) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r5, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(0xffffffffffffffff, 0xc0305616, &(0x7f0000000580)={0x0, {0x81, 0x1}}) 18:36:27 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec '], 0xa) 18:36:27 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r2}, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000280)={r2, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={'rmd160-generic\x00'}}) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r3, 0x0, 0x0) setsockopt$netrom_NETROM_N2(r3, 0x103, 0x3, &(0x7f0000000140)=0x3, 0x4) 18:36:27 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec '], 0xa) 18:36:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) pipe2$9p(&(0x7f0000000100), 0x184800) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'syztnl2\x00', &(0x7f0000000300)={'tunl0\x00', 0x0, 0x7800, 0x10, 0xffff, 0x9, {{0x24, 0x4, 0x1, 0x1e, 0x90, 0x67, 0x0, 0x1f, 0x2f, 0x0, @local, @empty, {[@timestamp_prespec={0x44, 0x14, 0x9a, 0x3, 0x6, [{@private=0xa010101, 0x100}, {@initdev={0xac, 0x1e, 0x1, 0x0}}]}, @timestamp_prespec={0x44, 0x3c, 0x65, 0x3, 0xf, [{@loopback, 0x7ff}, {@private=0xa010101, 0x7ff}, {@private=0xa010100, 0x6f8}, {@empty, 0x7}, {@local, 0x9b8b}, {@multicast1, 0x226}, {@loopback, 0x81}]}, @cipso={0x86, 0x2c, 0x2, [{0x1, 0x7, "084706ef0d"}, {0x0, 0x2}, {0x6, 0xd, "08f49094946e701a4578a7"}, {0x5, 0x9, "81aa35244e7ebd"}, {0x7, 0x7, "5b29eeb010"}]}]}}}}}) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000880)={&(0x7f0000000700)={0x16c, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x40}, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r8, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r9, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r7, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r9, 0x10001}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x7, @remote, 0x40020}, r1}}, 0x30) 18:36:27 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec '], 0xa) 18:36:27 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000440)={'syztnl2\x00', &(0x7f0000000340)={'gre0\x00', 0x0, 0x8740, 0x8, 0x9, 0x3, {{0x29, 0x4, 0x1, 0x1, 0xa4, 0x64, 0x0, 0x7, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0xf}, {[@ssrr={0x89, 0x1f, 0xc8, [@broadcast, @loopback, @rand_addr=0x64010101, @rand_addr=0x64010102, @remote, @private=0xa010100, @broadcast]}, @rr={0x7, 0x13, 0xac, [@dev={0xac, 0x14, 0x14, 0x24}, @remote, @remote, @private=0xa010101]}, @ra={0x94, 0x4}, @cipso={0x86, 0xa, 0x1, [{0x7, 0x4, "ad2c"}]}, @ssrr={0x89, 0x7, 0x32, [@remote]}, @timestamp_addr={0x44, 0x14, 0x2e, 0x1, 0x9, [{@loopback, 0x100}, {@rand_addr=0x64010101, 0x10000}]}, @generic={0xa, 0x11, "0acda53c69ff73c09cab7f8743bebf"}, @timestamp={0x44, 0x20, 0x49, 0x0, 0x1, [0x4, 0x8, 0x2d, 0x7fff, 0x10001, 0x0, 0x6]}, @end]}}}}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f00000008c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000480)={0x3d0, r3, 0x800, 0x70bd26, 0x25dfdbff, {}, [{{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x284}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8}, {0x12c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0xef2}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x184, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}]}}]}, 0x3d0}, 0x1, 0x0, 0x0, 0x8010}, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r1, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000080)={0x0, &(0x7f0000000040)=""/24}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r2}}, 0x30) 18:36:27 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x4, {0xa, 0x4e24, 0x8, @empty, 0x40}, r1}}, 0x38) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video2\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000140)={0x10001}, 0x8) 18:36:27 executing program 3: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:27 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc"], 0xa) 18:36:27 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/attr/exec\x00', 0x2, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f00000000c0), 0x4) 18:36:27 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec :'], 0xa) 18:36:27 executing program 5: socketpair(0x4, 0x0, 0x98c, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)={0x164, 0x0, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x81}, 0x4008044) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video1\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r6 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(r6, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000700)={0x1050, 0x13, 0x300, 0x70bd2a, 0x25dfdbfe, {0x2b, 0x0, 0x2e, 0x1f, {0x4e23, 0x4e21, [0x3f, 0x4, 0x7, 0x1], [0x9, 0x7, 0x1f, 0xfffffffe], r1, [0x1, 0x8]}, 0xfffffff0, 0x2d}, [@INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}]}, 0x1050}, 0x1, 0x0, 0x0, 0x20048080}, 0x4008004) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r5, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x8030, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x496b490d}, r5}}, 0x30) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r3}}, 0x30) 18:36:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f0000000180)=0x8, 0x4) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000080)=@gcm_256={{0x304}, "d5d1c4aa9a0dd0b5", "abe749c6467f9b84534a7efb366e980b438175ea607bfc83ee788c3c60f5e4ba", "73f64673", "9792d4521c2e7cc7"}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0xfffd, 0x2, @rand_addr=' \x01\x00', 0x22}, r2}}, 0x30) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f0000000040)) 18:36:27 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) socket$nl_sock_diag(0x10, 0x3, 0x4) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:27 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc"], 0xa) 18:36:27 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec'], 0xa) 18:36:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000200000005000500000000000800090000000000"], 0x24}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000001580)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001540)={&(0x7f0000001500)={0x20, r2, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x4e}]}, 0x20}, 0x1, 0x0, 0x0, 0x20040001}, 0x0) r3 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f00000000c0)="00000000aa05857fc5", 0x9, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(r5, 0x4028af11, &(0x7f0000001480)={0x1, 0x1, &(0x7f0000000300)=""/208, &(0x7f0000000400)=""/4096, &(0x7f0000001400)=""/77, 0x10000}) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000001600)={0x1, 0x10, 0xfa00, {&(0x7f00000015c0)}}, 0x18) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r4, r3}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x2, {0xa, 0x4e23, 0x8, @loopback, 0x10}, r1}}, 0x38) 18:36:27 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec'], 0xa) 18:36:27 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc"], 0xa) 18:36:27 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0xf8, 0x128401) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x4, &(0x7f0000000080)=[{}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000000280)={r3, 0x3, &(0x7f0000000140)=[0x2, 0xfffffdc7, 0x7fffffff], &(0x7f0000000180)=[0xffffffef, 0x2, 0x800, 0x4, 0x1], 0x12, 0x7, 0xc84, &(0x7f0000000200)=[0x5dc, 0x7fff, 0xffff, 0x2, 0xff, 0x800, 0x4], &(0x7f0000000240)=[0x1f, 0xfc4, 0x0, 0x3, 0x4, 0x9, 0xb7]}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:27 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/attr/exec\x00', 0x2, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f00000000c0), 0x4) 18:36:27 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec'], 0xa) 18:36:27 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc"], 0xa) 18:36:27 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec '], 0xa) 18:36:27 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) prctl$PR_MCE_KILL_GET(0x22) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000001b80)={0x0, 0x0, [], {0x0, @reserved}}) ioctl$VIDIOC_G_INPUT(r2, 0x80045626, &(0x7f0000000040)) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f0000000080)={0x0, 0x0, 0x103, 0x0, {0x20, 0x5, 0x7, 0x4}}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 18:36:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xb, 0x77, 0x2, 0x4}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r4, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x1, r4, 0x30, 0x0, @in={0x2, 0x4e24, @remote}}}, 0xa0) 18:36:27 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xa}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:27 executing program 3: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc"], 0xa) 18:36:27 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec '], 0xa) 18:36:27 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x800, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x1f}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010102}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x20}, @L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x4) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) socketpair(0x2b, 0x800, 0x800, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000040)="6c891430607f137322898cee0ec1311bb385b8beaf606bd6265bda62fa5f91f748de6ce3e203f5d64a1f61de2132f6f7f228c6b5d086cde3ada475939b3d2e91b07daf6748ec5dc868c61fb0c4dd1fe8a826ccac911f14e2f21dffaa0e8840e226babf49a9697ddbacb8b18b2b6acc7fb85fd07f48b34bc8e3fd4de727534b", &(0x7f0000000140)=@udp6=r2, 0x2}, 0x20) 18:36:27 executing program 3: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc"], 0xa) 18:36:28 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec '], 0xa) 18:36:28 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) socketpair(0x22, 0x5, 0x3ff, &(0x7f00000000c0)={0xffffffffffffffff}) getsockname$l2tp(r2, &(0x7f0000000300)={0x2, 0x0, @multicast1}, &(0x7f0000000340)=0x10) 18:36:28 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563163a5b2d2600"], 0xa) socket$l2tp(0x2, 0x2, 0x73) 18:36:28 executing program 3: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc"], 0xa) 18:36:28 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exqn :[-&w'], 0xa) 18:36:28 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r0}}, 0x30) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f00000001c0)={0xf, 0x8, 0xfa00, {r0, 0x9}}, 0x10) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x10100, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r0, 0x4}}, 0x10) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)={0x40000}, 0x8) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x400500, 0x0) syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x400, 0x200800) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x802, 0x0) 18:36:28 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mm_shrink_slab_end\x00'}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1, 0x22}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000700)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r6, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r7, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f0000000780)={0x13, 0x15c0cab989dd5529, 0xfa00, {&(0x7f0000000940), r7, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000400)={0x4, 0x8, 0xfa00, {r3, 0xf5ea}}, 0x10) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)={0x8f, 0x75, 0x2, {0x84, "99815e6fdc9816b9dc5a849581ebe951aec0f459347d23801f98212692167cde9670b21840298eb21deda5aba39d7774cb3d0feab228bc0efae3bc453eca066991328e35ac7367e083985d9898000d58d316cd234dd0d10084a1cf40d0f937ccf8a2cd3435ea15dd6995ecec24b1adfa0f6abef12cc38911513a7d10d522f9b812800f9d"}}, 0x8f) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r8, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4240000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xc4, 0x13, 0x2, 0x70bd26, 0x25dfdbfc, {0x1e, 0x7, 0x9b, 0x0, {0x4e22, 0x4e21, [0xffff, 0x3, 0x80000000, 0xffffffff], [0x6b, 0x79, 0x5, 0x4], 0x0, [0x7, 0xffffffff]}, 0x8}, [@INET_DIAG_REQ_BYTECODE={0x32, 0x1, "13d365c319a6e316e83e753926008ba8773d58b2367c41c5c6f3a3be7b897d8a081ef9a270e5b0ee28adc57dceb9"}, @INET_DIAG_REQ_BYTECODE={0x44, 0x1, "5e0af2d686298cbff60edb36f03724ceec7e07c517da207f543663014e2a80ac2c8d522f080bf37f7c93c9850a6e9461f649b0794d2b818c8977dfa424943dce"}]}, 0xc4}, 0x1, 0x0, 0x0, 0xd998d08d7a5449de}, 0x4008810) 18:36:28 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f00000000c0)) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x4, 0x80000) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000080)={0x0, &(0x7f0000000040)=""/23}) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:28 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000140)={0x3, 0x180000, [{0x4, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x7, 0x0, 0x96}]}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f0000000100)={0x0, 0x7, &(0x7f0000000000)=[0x4ae1, 0x7, 0x800, 0x81, 0x3, 0x5, 0x8], &(0x7f0000000040)=[0x0, 0x5, 0x8, 0xd5, 0x0, 0x81], 0x11, 0x8, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x8, 0xfffffffe, 0x8, 0x43, 0x3, 0x9], &(0x7f00000000c0)=[0x6, 0x5]}) 18:36:28 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc"], 0xa) 18:36:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000200)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r3, r0}}, 0x18) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x7fff, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x419, 0x3, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) 18:36:28 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc"], 0xa) 18:36:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x1, 0x0, @remote, 0x40420}, r1}}, 0x30) 18:36:28 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000000)="b719c92b993cdf89d08839806b93d9e5a59d", 0x12) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000040)=0x5) 18:36:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) bind$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @empty, 0x2}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:28 executing program 2: setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) 18:36:28 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc"], 0xa) 18:36:28 executing program 2: setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r1, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00') socketpair(0x4, 0x1, 0x400, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r4, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000380)={'team0\x00'}) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, r5, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x2b8d}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @loopback}]}, 0x50}, 0x1, 0x0, 0x0, 0x4080}, 0x40d0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000229bd7000fddbdf250300000016000d0001000000147a33f541b3623489c056ae2e13462500080069703665727370616e30000000001c00060002008100000005000500010000000500070002000000"], 0x48}, 0x1, 0x0, 0x0, 0x48080}, 0x40) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:28 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r4, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000080)={0x5, 0x10, 0xfa00, {&(0x7f0000000400), r4, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r1, 0x2}}, 0x18) 18:36:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x1, 0x0, @remote, 0x40420}, r1}}, 0x30) 18:36:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}, r1}}, 0x30) 18:36:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_S_OUTPUT(r2, 0xc004562f, &(0x7f0000000080)=0x1) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:28 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc"], 0xa) 18:36:28 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000000c0)={'team0\x00'}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2, 0x6, @ipv4={[], [], @multicast2}, 0x22}, r1}}, 0x30) 18:36:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x2, @remote, 0x5}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4000, 0x4000001f, @dev={0xfe, 0x80, [], 0xc}, 0x7}, r2}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r4, 0x5}}, 0x10) 18:36:28 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc"], 0xa) 18:36:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {r2, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r2}}, 0x30) 18:36:28 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000000c0)={'team0\x00'}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2, 0x6, @ipv4={[], [], @multicast2}, 0x22}, r1}}, 0x30) 18:36:28 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000001800)=ANY=[@ANYBLOB="65786563203a00fc"], 0xa) 18:36:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) socketpair(0x1d, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r2, 0x0, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r4 = accept$netrom(r3, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r5, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x24, r6, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01002bbd7000fddbdf250200000005000700000008001a00000000130000020000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x46154cf47c860e43) getsockname$netrom(r4, &(0x7f0000000040)={{0x3, @bcast}, [@null, @default, @remote, @null, @rose, @netrom, @netrom, @rose]}, &(0x7f0000000140)=0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:28 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0xa) 18:36:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}, r1}}, 0x30) 18:36:28 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[], 0x5) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x3, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x13ee, 0x24002) r2 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000280)={0x8, 0x3, 0x40, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f0000000240)={r3}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r1, 0xc01064b3, &(0x7f00000000c0)={r3}) 18:36:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}, r1}}, 0x30) 18:36:28 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x2764}}, 0x10) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x2, {0x3, 0x0, "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", 0x1, 0x0, 0x8, 0x1, 0x20, 0x8, 0xbd, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r6, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r7, 0x2}}, 0x18) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r8, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r4, &(0x7f0000000340)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r7, r8}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r5, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r5, 0x10, 0x0, @in={0x2, 0x4e22, @multicast2}}}, 0x90) 18:36:28 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0xa) 18:36:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x2, 0x4}}, 0x2) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f00000000c0)=0x6, 0x4) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r3, 0x2}}, 0x18) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000180)='1', 0x1) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x104024}, r3}}, 0x30) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x400, 0x4100) [ 2111.867623] can: request_module (can-proto-0) failed. 18:36:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}, r1}}, 0x30) 18:36:28 executing program 2: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="65786563202f6465762f696e66696e6962616e642f72646d615f636d00504de782150ec1614138cfc33b77b511ac6086da66cc6e1e7c3271e36576c266881570f63eb6f9ff1f3fffb1e3574631a6171d2c5e709436016279a06261dc87da487687cc53f3a47a94fc9b32e55f44bebf4c9b2bf40cf7abfc6391cf9ee5f572f2f66a6e58a47864841ac5c7e811cbd5fc2e2aa993be107100444aaa847e7f008054"], 0x1d) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000b80)=ANY=[@ANYBLOB="00000000a632000000000000c2fcbebd5b6424509ed9883b76ee2821aedcbe35b2ddd9b66d54985f2e8a2825d0edbe8fd84f65b8551c5294693b5576a06506a21a2b82f677ccda0a9c511ec148f891cac75a6a8ecffd927d580a20071f9d430f2140e6d72aaddf27032fecef8c52d3abb7596f3206ce206e67d10b060000000000000000000000000091ae81368d31f7b5fef2633868c2457c596f8f3dc0596aed45e7f309a8a9bc17bd44c8444898ec287849dece1147125e"]) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e23, 0x4, @empty, 0x10000}}}, 0xa0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000c40)={&(0x7f00000002c0)={0x30, r5, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x7}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r6, 0x2}}, 0x18) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'erspan0\x00', &(0x7f0000000780)={'syztnl1\x00', 0x0, 0x80, 0x40, 0xc9, 0x0, {{0x2e, 0x4, 0x3, 0x7, 0xb8, 0x64, 0x0, 0x62, 0x2b, 0x0, @dev={0xac, 0x14, 0x14, 0x34}, @multicast2, {[@rr={0x7, 0xb, 0x74, [@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0xb, 0xbd, [@remote, @remote]}, @ssrr={0x89, 0x27, 0x5a, [@multicast2, @rand_addr=0x64010101, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @private=0xa0100ff, @empty, @empty, @remote]}, @timestamp_prespec={0x44, 0x24, 0x13, 0x3, 0xd, [{@remote}, {@local, 0xfff}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x7f}, {@local}]}, @timestamp_addr={0x44, 0x34, 0x1f, 0x1, 0x6, [{@multicast1, 0x9538}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@rand_addr=0x64010100, 0x7fff}, {@loopback, 0x6723}]}, @timestamp_prespec={0x44, 0xc, 0x2f, 0x3, 0x6, [{@local, 0x6}]}]}}}}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r8, &(0x7f0000000b40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000880)=ANY=[@ANYBLOB="6c020000", @ANYRES16=r9, @ANYBLOB="10002cbd7000ffdbdf250300000008000100", @ANYRES32=r10, @ANYBLOB="7c0002803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r11, @ANYBLOB="080009000000000000000001", @ANYRES32=0x0, @ANYBLOB="4801028038000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300030000000800040003000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000700000008000600", @ANYRES32=0x0, @ANYBLOB="4c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e6700000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000800000008000600", @ANYRES32=0x0, @ANYBLOB="400001002400010071756575655f6964000000000000000000000000000000000000000000000000050003000300000008000400ffffff7f08000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="7c00028038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000005000300030000000800040061000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000000000008000600", @ANYRES32=0x0, @ANYBLOB], 0x26c}, 0x1, 0x0, 0x0, 0x84}, 0x4004001) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x2, r6, 0x30, 0x0, @in6={0xa, 0x4e23, 0x40006, @remote, 0x6}}}, 0xa0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r2}}, 0x30) 18:36:28 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0xa) [ 2111.943426] can: request_module (can-proto-0) failed. 18:36:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 18:36:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}}}, 0x30) 18:36:28 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[], 0xa) 18:36:28 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[], 0xa) 18:36:28 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[], 0xa) 18:36:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}}}, 0x30) 18:36:29 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000080)) 18:36:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {r1, 0x3}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000080)={'gretap0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000100)={'gre0\x00', r5, 0x10, 0x700, 0x7, 0xfb, {{0x1e, 0x4, 0x3, 0x6, 0x78, 0x68, 0x0, 0x1, 0x0, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0xe}, {[@timestamp={0x44, 0x28, 0x55, 0x0, 0x2, [0x80000000, 0x7fff, 0x9, 0xd23, 0xfffffff9, 0x4, 0x0, 0x6e59, 0x8001]}, @timestamp_addr={0x44, 0x3c, 0xcc, 0x1, 0x9, [{@private=0xa010102, 0x1ca}, {@local, 0xb288}, {@empty, 0x3}, {@private=0xa010100, 0x96}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfe2d}]}]}}}}}) 18:36:29 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r2, 0x2}}, 0x18) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f00000000c0)={0x0, 0x4, 0x11b0, [], &(0x7f0000000080)=0x8}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @dev, 0x2}, r2}}, 0x30) 18:36:29 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8c8080802c78f4e0c79fde2e9d057d43aea4c849703c997e153152f0d7b79a1236c2fd69a17df725b74757a5bf1f18ecf8e44006bfcf3f7acc5af001f40fcbbabc8cd6dc2af849249dbc5945b74536a53b8c5510d9db0a0f8f85040000000000000004ff4ed7b26ab8b67bd99523ba100f2d2327a295b9f43066647e832c5b982a5c05be0b0e7437ca4c2d14adb980b69e5e3c47dbe9c00645e466378133803daaa8925f4139a994f489dd07d72c498f7badeb092bed6f836dae316f9613323105"], 0xa) 18:36:29 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB], 0xa) 18:36:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}}}, 0x30) 18:36:29 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[], 0xa) 18:36:29 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB], 0xa) 18:36:29 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x80100) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, r1}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x22}, r2}}, 0x88) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000200)={0x7, 0x8, 0xfa00, {r4, 0x3}}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000100)=0x4, 0x4) 18:36:29 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}, r0}}, 0x30) 18:36:29 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB], 0xa) 18:36:29 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}, r0}}, 0x30) 18:36:29 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x13f}}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r3, 0x8008af00, &(0x7f0000000580)) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f0000000240)={0x3, 0x2}) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, [], 0x1}, 0x321d}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r4}}, 0x30) 18:36:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0xfffffffffffffffd, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) connect$l2tp(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @rand_addr=0x64010100, 0x3}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') 18:36:29 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec'], 0xa) 18:36:29 executing program 2: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000040)="01", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="7b1fa12c73d8e2b95cfe77e4cc30cd2b0115653a3252ab140a000094c51c63c4f749e2194af1b3cbd943dcf52fadecacf5fdac1839faff81d6156a90be0205814897da5d48f23bf51e281d4e05c78d86468a4c7682b781c6fe229600d41bb34e024739ce5054a2b66acf3e8f04676162e49a72e2f8595d7c0664aa6ce1c756ab6c4c36fdf97389e898d2c447833c64d991ca4892a11a995e54d38d1e3a42cdb0e7653bcc4cc786d73302dc1582cd6915e041b29938277ec1259a3df92b11632c", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={'crc32c-generic\x00'}}) r2 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r2}, 0x0, 0x0, 0x0) add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000680)={'syz', 0x1}, &(0x7f00000006c0)="7f4d7483c429940c8e9b66717817be2278e29f915fc8e318f57620e86a9da80bfdb414bc9553a02304ecf3bce792e199f6d650968f9058f4c65d2886ee65682c388c5763fda21e4f37af4b8da27ad73d3845de193e9cc2a568f2fc6c1abd96116884d10a9180a3ac6a975a75a4fd8e492cd49727a7228d3e7352cf7f983e02269e50a9494104aeeb73532d0ae99667f5c65e0e89ae6a20e6be1eaf0321a6619201fc97108ccf76df4726b68945f27cd16f40240b1bc7eb1d2d581a936b63718246b8b888c767939f956f9027924ee3d7200b957dff833bc118a8cb055a738372a98466b7eefd5947ba4a47baa467", 0xee, 0xfffffffffffffff9) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)="ed5c06829362b20b13424cc10dd7a1d89ab7bb2b9a15e9d0b1fdb4a0b0e601c05462676f02ae00470b9003b8e787fdb86a5ce69af3c71a1f147894702d2de09853b2ca96c338596dd60ea26f2dc59747694b87c888c65d1b6802b2a8fccfb7ed915ff1bacf74d6fe0e2756f5c69194cda34f56c45dc090c39ab1", 0x7a, 0xfffffffffffffffc) r4 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={0x0, r4}, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r2, r3, r4}, &(0x7f0000000400)=""/215, 0xd7, &(0x7f0000000600)={&(0x7f0000000500)={'ghash-ce\x00'}, &(0x7f0000000540)="0d382adee95aeabc3dfedfa225ac7274a14677b36e5f19fefddb08e67790d88fe1c14484f146920f014bbe7da10779606dac8a512c96f6004f2c65ba7643b87e2d35a3a289d67ebf9762f0176faa1b7d4f4295d1d3cecb0ddc079a16746cc27c7affbf11cfee851ae44b3760568ee05fbdd4a0024ea3122aad45776e94641368f97c7e88581ddd957d431830d693e20dfb53f41bd6986c4a46e3f5308a5710f833a88f5049b1be1de0ebc8d32336c28adf76", 0xb2}) 18:36:29 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000006c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r4, 0x2}}, 0x18) ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f00000002c0)={0xb, @win={{0x1f, 0x80, 0x1, 0x400}, 0x8, 0x185342d6, &(0x7f0000000180)={{0x3, 0x6, 0x0, 0x5}, &(0x7f0000000140)={{0x1f, 0x0, 0x0, 0x4}, &(0x7f0000000100)={{0x3, 0x1, 0x3f, 0x1}}}}, 0x80000001, &(0x7f0000000200)="7f43ba231f7ad21389285ce625f48edacc237bedc15ef23315f111cc8e03eca93bf3cc3c916632678f497f16367c481f39748a56b9bc058ef08be7c5cf0859eb4586ef078f303887fbd01c695a50aa733bfee594077c41a55a57427786eeaa7d55e9682da7368af94024465d99aad4e54fafae43db87000ea2a6c8251a6e640a5093ff64bb9accdf466462d6e2bbae25ee4c82ddfdfb640a7db6e194c9f9dd", 0x4}}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000880)={0x1, &(0x7f0000000840)=[{0x0}]}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f00000009c0)={r5, 0x1, &(0x7f00000008c0)=[0x9], &(0x7f0000000900)=[0x27, 0x7], 0x9, 0xa, 0x3, &(0x7f0000000940)=[0xfffffffe, 0x8000, 0x2, 0x278, 0x4, 0x8001, 0xe0, 0x3ff, 0x100003, 0x10000], &(0x7f0000000980)=[0x1, 0xffff, 0x7fff]}) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r6, &(0x7f00000007c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000780), 0x1, {0xa, 0x4e21, 0x4, @mcast2, 0x4efe}, r1}}, 0x38) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r4, 0x6}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) r7 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r7, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_UNLOCK(r7, 0x4008642b, &(0x7f0000000800)={0x0, 0x8}) 18:36:29 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}, r0}}, 0x30) 18:36:29 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) 18:36:29 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec'], 0xa) 18:36:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}, r1}}, 0x30) 18:36:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x2, @remote, 0x4}, r1}}, 0x30) 18:36:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}, r1}}, 0x30) 18:36:29 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$CHAR_RAW_RESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000040)={0x2, 0x9}) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) [ 2112.588919] kauditd_printk_skb: 20 callbacks suppressed [ 2112.588926] audit: type=1400 audit(1608921389.453:679): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=29360 comm="syz-executor.2" 18:36:29 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec'], 0xa) 18:36:29 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r2, 0x0, 0x0, 0x0, &(0x7f0000000740)={0x2, 0x0, @local}, 0x10) sendto$l2tp(r2, &(0x7f0000000440)="13942a37f1787112a18391b81b1f1194eee21e4199aec6e9e3df291e35280f2d70bdb356d8aedf82471d1926365c909a742c2c0858ec68958fa633fb2429c6056369420bcc88043d3551b94468b4d83a58aab65a101f78a1aaa73d2d98da17cc2f2aec07f2c3f83453ca43d4ef65be068c8e08de71dc128bfeceaf625b364a3515f9e3508345926b7ccc63b6f84d60b91630578ed86f7649c6667f6aab61613ff6", 0xa1, 0x4000800, &(0x7f0000000500)={0x2, 0x0, @private=0xa010102, 0x1}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x14, r1, 0x400, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x81, @mcast1, 0x22}, r3}}, 0x30) r4 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r4, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_SWITCH_CTX(r4, 0x40086424, &(0x7f0000000040)={0x0, 0x2}) r5 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r5, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f00000002c0)={0x4, &(0x7f0000000280)=[{}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r5, 0xc010641d, &(0x7f0000000400)={r6, &(0x7f0000000300)=""/204}) 18:36:29 executing program 2: sendto$netrom(0xffffffffffffffff, &(0x7f0000000200)="800b1cf01016e5af7c6c37ce8d8793ee8e6e45d38db57f11b5d480f88f30da96e96bf8640cea1ef7db1f07859504cefcb046cba6af80d29af1f71a96e16a9e70ea268db11d03e09071463646fff25f8666a6a34c3db9e8ccf3b2208eb13938ab4430dc6babc0b30617291bc871563429a1914eac204ce51651f2508c03e0f7ca8d90eb477b953514cc1379bee3d0513f15d0acb5ad7a48861d1ec76fd01033faaefdcd899aa2cae1db944c4d60d96048bd26d17ed4ee974b89b16997296c927ed8d9c8ed07425026d1e5bc4c3e85ce31fd575e7b0749ae6fc9b46652e99f293d0afca99a70a07f54", 0xe8, 0x5, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x3, 0x0, @dev={0xfe, 0x80, [], 0x29}, 0x22}, r1}}, 0x30) [ 2112.647722] audit: type=1400 audit(1608921389.513:680): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=29383 comm="syz-executor.2" 18:36:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) socket$l2tp(0x2, 0x2, 0x73) 18:36:29 executing program 4: prctl$PR_CAPBSET_DROP(0x18, 0xa) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x40, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x8, 0x10000) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000100)={0x9c, 0x0, 0x5, "2149feedf286bba769fea8c86839244627326b0aa2a7835286c073b5e5af0c38014444bf9405addbfd5c48f4689cb49aa9a069ed7c239463730c19df95aa4f05f269fde2ea4569c170d92666b51f68e672c421665f4c9300b42ac71a60b0b97ec48633a4a543fbb3588ba9fb41af154cc4c4f5a51b5f75577ba253b49d02b0f78263e4cf959ac130258dae8e7453f7e2b7a3e2895ab46de5854cc8f5"}) 18:36:29 executing program 2: setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x501, 0x4) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="657839790461723d80656320966c86473e2761dc"], 0xa) 18:36:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}, r1}}, 0x30) 18:36:29 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec :'], 0xa) 18:36:29 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$char_raw(&(0x7f0000000140)='/dev/raw/raw#\x00', 0x1, 0x430140) ioctl$CHAR_RAW_REPORTZONE(r1, 0xc0101282, &(0x7f0000000200)=ANY=[@ANYBLOB="0000bd45306a8c966435b65e343e4d5942a89343230000e5ba0000000000000000000000081b08040000b5d42dd16f00"/77]) r2 = getpid() process_vm_readv(r2, &(0x7f0000000140)=[{&(0x7f0000000040)=""/54, 0x36}], 0x1, &(0x7f0000000180)=[{&(0x7f0000000680)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)='\':!*#$\'\x00'}, 0x30) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, r4, 0x30, 0x1, @in6={0xa, 0x4e24, 0xffffffff, @private0={0xfc, 0x0, [], 0x1}, 0x101}}}, 0xa0) getpeername$netrom(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @null}, [@netrom, @remote, @rose, @rose, @null, @bcast, @netrom, @netrom]}, &(0x7f00000000c0)=0x48) 18:36:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) prctl$PR_MCE_KILL_GET(0x22) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) 18:36:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}, r1}}, 0x30) 18:36:29 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec'], 0xa) 18:36:29 executing program 2: ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000100)={0x0, 0x2}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000040)={0x0, 0x0}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @dev, 0x22}, r1}}, 0x30) r3 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/video1\x00', 0x2, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000000200)={0x0, 0x0, [], {0x0, @reserved}}) ioctl$VIDIOC_S_OUTPUT(r3, 0xc004562f, &(0x7f0000000140)=0x345c) r4 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r4, 0xc01064b3, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f00000002c0)={r2}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x20000, 0x0) 18:36:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}, r1}}, 0x30) 18:36:29 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec'], 0xa) 18:36:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x4) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000280)={0x14, 0x5e, 0xfa00, {r3, 0x30, 0x0, @in6={0xa, 0x4e21, 0x3, @loopback, 0xe740}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x5, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r4}}, 0x30) r5 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x400, 0x120000) ioctl$SG_GET_LOW_DMA(r5, 0x227a, &(0x7f0000000140)) 18:36:29 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RREAD(r3, &(0x7f0000000380)={0xb}, 0xb) write$P9_RLINK(r3, &(0x7f0000000200)={0x7, 0x47, 0x1}, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r4, r0}}, 0x18) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:29 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = accept$netrom(r1, 0x0, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000000)=0x30d, 0x4) setsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000080)=0xdb, 0x4) 18:36:29 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec'], 0xa) 18:36:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}, r1}}, 0x30) 18:36:29 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000300)={'syztnl0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0x4, 0xa, {{0x22, 0x4, 0x0, 0x2f, 0x88, 0x68, 0x0, 0xfe, 0x2d, 0x0, @private=0xa010101, @empty, {[@end, @lsrr={0x83, 0x17, 0xa2, [@loopback, @empty, @multicast1, @multicast2, @rand_addr=0x64010102]}, @timestamp_addr={0x44, 0x24, 0x45, 0x1, 0x7, [{@loopback, 0x2c}, {@loopback, 0x200}, {@remote, 0x5}, {@multicast2, 0xa37}]}, @timestamp_prespec={0x44, 0x34, 0x31, 0x3, 0x9, [{@rand_addr=0x64010101}, {@empty, 0x8}, {@broadcast, 0x4}, {@multicast1, 0x3}, {@broadcast, 0x1ff}, {@local, 0xfa600000}]}, @end]}}}}}) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0x5, &(0x7f00000003c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}], &(0x7f0000000400)='syzkaller\x00', 0x7, 0x3f, &(0x7f0000000440)=""/63, 0x40f00, 0x0, [], 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x4, 0x1, 0x5, 0x8}, 0x10, 0x163cd}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_tracing={0x1a, 0x2, &(0x7f0000000140)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000180)='syzkaller\x00', 0x5, 0x21, &(0x7f0000000200)=""/33, 0x41000, 0x0, [], r3, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x5, 0x800, 0x5}, 0x10, 0x18587, r4}, 0x78) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r2, 0xe1}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:29 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec '], 0xa) 18:36:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}}}, 0x30) 18:36:30 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)={'exec ', ':[-&\x00'}, 0xa) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = accept$netrom(r1, 0x0, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000000)=0x30d, 0x4) setsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000080)=0xdb, 0x4) 18:36:30 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec '], 0xa) 18:36:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}}}, 0x30) 18:36:30 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x75, 0x2, {0x5, "d44057f669"}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) 18:36:30 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b201859f0260024f941d192b31f7a87cef47dea1585b189f003eda5ea4e1925b512943d387e676500000000"], 0xffffffffffffff52) 18:36:30 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec '], 0xa) 18:36:30 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r2, 0x4, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8400}, 0x1) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000001c0)='THAWED\x00', 0x7) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', ':[-c\x04'}, 0xa) [ 2113.218717] audit: type=1400 audit(1608921390.083:681): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":[-&" pid=29503 comm="syz-executor.2" 18:36:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x0) ioctl$UI_SET_MSCBIT(r2, 0x40045568, 0x25) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40020}, r1}}, 0x30) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000100)="c71e14544442c00d837c532126c8a2b02193c245134791fa0c555c31730c95fd4717f6ba71c3a39cb4ffdea7f963a5018c28d9969d647d6637b29b3a660465c63285437e3beddc176e559909a9e422b6df922be59a647bba165c78", 0x5b) 18:36:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}}}, 0x30) 18:36:30 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b201859f0260024f941d192b31f7a87cef47dea1585b189f003eda5ea4e1925b512943d387e676500000000"], 0xffffffffffffff52) 18:36:30 executing program 3 (fault-call:1 fault-nth:0): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec :'], 0xa) 18:36:30 executing program 0 (fault-call:1 fault-nth:0): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec :'], 0xa) [ 2113.334611] audit: type=1400 audit(1608921390.203:682): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=3A5B2D6304 pid=29527 comm="syz-executor.0" 18:36:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}}}, 0x30) 18:36:30 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r1}}, 0x30) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{0x3, 0xfc00, 0x8, 0x1ff}, 'syz0\x00', 0x28}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2113.406412] FAULT_INJECTION: forcing a failure. [ 2113.406412] name failslab, interval 1, probability 0, space 0, times 0 [ 2113.418022] FAULT_INJECTION: forcing a failure. [ 2113.418022] name failslab, interval 1, probability 0, space 0, times 0 [ 2113.448451] CPU: 0 PID: 29553 Comm: syz-executor.3 Not tainted 4.14.212-syzkaller #0 [ 2113.456357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2113.465709] Call Trace: [ 2113.468295] dump_stack+0x1b2/0x283 [ 2113.471934] should_fail.cold+0x10a/0x154 [ 2113.476098] should_failslab+0xd6/0x130 [ 2113.480078] __kmalloc_track_caller+0x2bc/0x400 [ 2113.484743] ? proc_pid_attr_write+0xfe/0x280 [ 2113.489236] memdup_user+0x22/0xa0 [ 2113.492777] proc_pid_attr_write+0xfe/0x280 [ 2113.497101] __vfs_write+0xe4/0x630 [ 2113.500724] ? proc_pid_wchan+0xf0/0xf0 [ 2113.504696] ? debug_check_no_obj_freed+0x2c0/0x674 [ 2113.509711] ? kernel_read+0x110/0x110 [ 2113.513610] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2113.519060] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2113.524078] vfs_write+0x17f/0x4d0 [ 2113.527615] SyS_write+0xf2/0x210 [ 2113.531067] ? SyS_read+0x210/0x210 [ 2113.534700] ? SyS_clock_settime+0x1a0/0x1a0 [ 2113.539109] ? do_syscall_64+0x4c/0x640 [ 2113.543078] ? SyS_read+0x210/0x210 [ 2113.546702] do_syscall_64+0x1d5/0x640 [ 2113.548780] FAULT_INJECTION: forcing a failure. [ 2113.548780] name failslab, interval 1, probability 0, space 0, times 0 [ 2113.550590] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2113.550599] RIP: 0033:0x45e149 [ 2113.550604] RSP: 002b:00007f1404b95c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2113.550616] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e149 [ 2113.550621] RDX: 000000000000000a RSI: 0000000020001800 RDI: 0000000000000003 18:36:30 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, 0x15, 0x1, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 18:36:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="5c58f0d5", @ANYRES16=0x0, @ANYBLOB="000226bd7000ffdbdf250200000006000200010000000600010004000000050006009600000014001f00fe88000000000000000000000000000105001400050000000c00100000800000000000000500140081000000"], 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x48000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x22}, r2}}, 0x30) 18:36:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}}}, 0x30) [ 2113.550632] RBP: 00007f1404b95ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2113.599602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2113.606860] R13: 00007ffddf8265df R14: 00007f1404b969c0 R15: 000000000119bf8c [ 2113.626689] CPU: 0 PID: 29555 Comm: syz-executor.0 Not tainted 4.14.212-syzkaller #0 [ 2113.634589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2113.643938] Call Trace: [ 2113.646529] dump_stack+0x1b2/0x283 [ 2113.650150] should_fail.cold+0x10a/0x154 [ 2113.654289] should_failslab+0xd6/0x130 [ 2113.658262] __kmalloc_track_caller+0x2bc/0x400 [ 2113.662930] ? proc_pid_attr_write+0xfe/0x280 [ 2113.667424] memdup_user+0x22/0xa0 [ 2113.670963] proc_pid_attr_write+0xfe/0x280 [ 2113.675285] __vfs_write+0xe4/0x630 [ 2113.678906] ? proc_pid_wchan+0xf0/0xf0 [ 2113.682876] ? debug_check_no_obj_freed+0x2c0/0x674 [ 2113.687886] ? kernel_read+0x110/0x110 [ 2113.692817] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2113.698260] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2113.703384] vfs_write+0x17f/0x4d0 [ 2113.706927] SyS_write+0xf2/0x210 [ 2113.710378] ? SyS_read+0x210/0x210 [ 2113.714002] ? SyS_clock_settime+0x1a0/0x1a0 [ 2113.718409] ? do_syscall_64+0x4c/0x640 [ 2113.722381] ? SyS_read+0x210/0x210 [ 2113.726006] do_syscall_64+0x1d5/0x640 [ 2113.729897] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2113.735081] RIP: 0033:0x45e149 [ 2113.738268] RSP: 002b:00007f9628334c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 18:36:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xf73e, @ipv4={[], [], @multicast1}, 0x40020}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000280)={0x5, 0x10, 0xfa00, {&(0x7f0000001940), r3, 0x2416d5db56af4fc7}}, 0x18) sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="a41100001500040028bd7000ffdbdf2507fac5000100dca6f637abbeb74b5285b7df75ec578066b741f822a01384b73b0df543368f0589cda2d9a2c1a83789d2f974640de394837628da8c4e34beb9ca26af4906bab6c7e862a65d10d60e4bea217dea3248371c0785cf569e9f988c8d00fee4b28c2ea6c6ea3f98f289bc3ae12e4db461e7d1934c7d42d6e36da54b9ec4a9f4eb694fe3fe05f380dbb191376e7ffd720631e375ef2c803425f74353d7bb3869ae991d96c31ad7276352b407a65796a9773e0552e24ce3eb6993286bd8b3ad527ec9b22b000000400001002bcd1196809f1dec02a065ecd41abcc568263e4e9eaa25e426a1e8696616072a7d1be916d2645951c017135124f2e42f85f700653306de9bebe5e68504100100de8b98eb42d978da1b4f47a3877bad5ef490e040386055144cf46f4acb05894aeb375f70b97ba1f221c2ef3b4ec9a4a592e28c28ae49a34cd16c8ecf488104023e5daa681610ab261bceba1db798909af116e9760c68876538cacb19f636e41e2091f440550e80fb3002cf8af991ae0b96c5e3ef3e26a71c94a2fbf5344fc8b1f397c3361c331ecf0d3c3f6b755199c014e9a192bd251a320e82a6acb5020106d9b9cb1d31ab2f800274172277f697b6e13926f5b4d0cb27b3ba6db365e4a4cdf15c066784f69109ea4becf3cecf947efe8f38822dd77a08b908bdd271e522bf83bfc71f378340e48a089f500c1e0762f0d90feebd2f378b63457ef21dbf2cff2043c8cb4ac6c0446dea3b23653b8724eb9b11d88c209a366e90d8f072b932c9c8d8fef9878d063430e28cff71045469a818b9e12fb8d836e74e9c88983a663ef189cc595031f765287762c57b07384f54c4148add03682b8dd310b24058ab15512c23dfb943f78cee066ca5bcb8df1ba8f38b68a463f2157fa62aaa1748c66cc560eb933945e15ee47d05a2534526d7fdddb841204f7b55ec14c10fc113f1324da1e9a07670b248d8d56de644a78bbd40bbe818d2939200134ff25af95b643c027ffdd0e99f3a1b0ab1c061344095360560dc03da8a27757eda786c27f3c7d7d2d64b71ecdb71989e7d2394fad538d7c72a165dc8aec145376c54823b76b130cdc98dbd403cf9e9b7ec30379847fb58cd31da486b67b3c2e5d2d70f3d2100ef4b2aeaaf82b205c1d856f93f077ae4afe4b1eed05de0dec64c4433b1f15533da61a87eece80d54c41cced33068370dc228d0146444920b6f3f44c7a98be7ea7d8ef226bcababb52aa0f876982eeeb7a0a5316d5c400f5744815e5038aa4603ca53076344e3465613d86ee27973bbed594f52899adcdc91b2ca724d4d2357476434a746cf51cb769624a63279a752ade2483617f508fed6eb13a3ee641d29c5ac4f34fb3e26538ec203e2daececa767fa02e66f3cf791bccfbe05a7f5b1fdf188cec996f836f95a35b1be45edbec0b4dbc174680897060d7f1b4529d896fcdb129092484808f82ec4ba4e8fcc79d32d9369f4be418d0c63aca424a0951b3d15edb5d3995e3ffc719e0ed2c6a6dfd1a0ff7f84ac1787fdbabfca95296a242a3a686fabd025539ec469ceeb9540cff9b824b370963b1c1f99b8099ac1f1ef95372e06f09c5f2b04d7785a7a672de5130bd6189fcab3dc45e123ba78e9e85260b77f79a42bf4ea464488260e5dc23dffafabe30ce892fdbc7c3e6174f77bb4dafadfe21babd9ccd342b92a2c38c8545ca79c29493124d2baf70369345872d15367ff0f6b16d139008bc5f18049ab1dfc456e9fda9da0a119680d692d8df134b2132c5bed79a881d8efa04cc3a7fa3ad7d4ee66870ab648b24f464a73cd0701aff3027caa14df79494fe655892c6e8022ba1ccd79ab1adb9af94114ada98827de10301367c5a7e1c8286e5d6485d5d6b0731a4d91d774e96772ef78863eed9aa6a972d5caf599f3f996593ced2923405c010292860999d415e3fbd6236ed1b7812986ed412dd778150850a439d15938ebed0460e03807c6dec7bd4b3289a54fe6025701034f4d65e207ba7ab4b7f06336109b31677488d4c90d90cd5abf4f1771d9105361f9d1a05280980c35a45fb3c29d22aff680f06cd74381fef1d6c4b03fd9368e5005ddcf88e498fbdfcc866189f30d317cc856e090450c2342b8f3f120c79876031f81e6f72c407c4ba600ad220b627ee5885585138bba139911cb52813b0996ac565c82be4873ed7dec7459af923b3994a01ddd4f34628a43ed499745cf0951c8b7d26d6a5dfc24ee9995308ed9121682a4bd389d98e673055936d2c83842e3e48a0e6d449c23adbd74fdae4f826ae63ed38ca00179b19e66c6bf201b6e9194dacf119103da9e4a66efe8a4e514937aac82bbe4dcc2ac7544cfec964ed8a3d8f93f7804377cd58f11d86976efe682dbad1ad74b20a2d14fa31fdc1a9d9f7f47028dc8279933dc7c629b8e49d0958d81e99d16f03a0a8933cd2794f5eaf0a3134b55abf5434f9dfc661ebcd7bb16f2d65803e223b1ac9f11e4c81ee618096db25c70b39d24196c1a8104f5f3a1cbaaa55f961c3d63368eb573c75adba701ed7e2abe5429c7ccb5e74b626528fa1d6552c8d029167ac1b2a845f0bec7c1aea1a74f66d91e681426e2d3ef0a46dcb46ee3ee6958ebd677c629b2e0ce4743bb34008f2a2695283ee4a91b00930da7b79ec9ee9ad2c0bd8be7967bc476aca151ff15fb1e4cd6efe7ce3acad446e1da373b0b40f5aaac8a45ee4bf4ee17c6b51527fa405364830c4a2011fa19a59d0a692634af6d29df7627f45ccdff720f2062bc4dd0470dd0e179debf78c75f391b9f3105509b62de0a9409ffea33530f735683ceafc0152cf98aaec304275f7fe3ef50844b521c89bc009bcf860b6da2da1317f625a668c52a6b2653c9d42b55f7b33ad526e5457caab5e6c7d9d11c67ccb11e0c9e30366ebefb42c45ad27a1c78c9b0e3fe1a2b2c6d49cba6bd0f12a50230acb557a59fb1fb12bd9275cc5148bbcfdf1d70a6466a637537689bc7e02a0d742a72037050501817f312d0b28df053a6391a89e5af3921e2527ebae7521549b04d4b1f4a1d910831786483ef1e253edd8a93b518fb9b0a52711228146c8cb0e38804c21263150a876adce5891ea69fc72ba99efd8c021bf2be256a31ec6dd64c4d0abebedb6d7b99d5b2d1caadc1918b48fa205de70f499317458538e87ba8ad340cd5622d65b8a9df6fefd3d8382406d12f516aa5f2eea500f392f1beae5886c74ac3c45654069290ada7ef825d885ceec511fcf18867fcbaca72a5efc9f476fa3c63ef0cdeaf86314862681aecfd593307a9b5207179482e10ebeec8640d1cddfc39a90f6e7b0a4531c579e7cebbf50605b839c9505d9a23a25a93b3695128813b8e23436b83d08fb96d91ba81f6b81a89081faeb386a7cc66d92a8e34f2402563d9de0e7606d6c99ee0200f4d32af02161b49609753bbd9bd5442b7e0d3e084dafa8e3764af30354401335a48401fc7776e1bfd398cd1b01cbcb3d16261d4c8bad3c593b440009cd925fe3f932575163ba4917e98f86330507647774f1291a044186d33d6f617cee21acc1ac2b2e4b874027f0fb7aba6f4d35e07998d4e4c011283b5eeb13c0eb6fa0d388fc9177eba77b8eca3cd7cfaee5dac1affa2bf44a9bf0c1ecdd20146bb3392d1df0a69267c4bd7c5cd177339861c7cb6788d438028e2c8bfe219fb270b33384b6eab535da0294f5633cb6f17dacc3d321cc1e1d3eb2cab21fef3bb84eeec7786e9aa1d8bfda820d39fed216997688a8af8873314c5b9b93f8e6cafc96b2639534706fea324237e040a7bc0d17c87adf3c6117ede645abbbbfa5baa104d4e8aa58a72b0b3fdf48041f99bd9e799d10be15e68bd6b91cbe8bf6b165080e380cf49a424099bee519f83feb496927f57c07813894372c03585c22287ca70c7b440956cb62c9d24555d14083e296729f6f68658cba63be97a876595193e1583da5c7dad385579f5a00f0fb70aa4fb34212cf9a6651664887935945a1f6651adbf2859db912e083fca1df32e1665198b416b7a4c87b79d3351ad052b85c0522876ef54ef9c9414b0794c6eb2d1bffc1b9e25f7f9c6311ba864eda6aa395dffc482bcbf8fa41dcf98fc299caa66ef764f60926650dd2018c760972db14f7452b2fad1a577f5e1661c6e6edab007b5deda571501b85423db9f5ecd8d7386860603410095c1820685e31d93850b58f6ceb2a8e23d0fdb9b32ee8c17c3ac7c6b69a00762c6625421d7f49aea9672f2bd1ce7bdab5d7e97652effc82faef9058b60316078d0c546384689db7ee65a7642a32e1cf6f7763f96b1771fe49479b86f5eac2a2a51cf99ea6eb35795859e22eaef313f8d2edf0e0d1d34c965a3c4f80b41d4591f6b8dcbda2c9f2d0bb42c528297a22307a0a9ee22ce4c583751ca242e34fba60d853dff6b701236d1bcbcd62cb425877d89e13de89526342e3b1fefe076f628d7b4c01144ec936050907326344c5d709cbb624fe8c78fa41bf66fabacaba9e1327171b9049d639f2665442408fa6f2eb04933ba760949e52e51f4ac2fc11213a284ad0cb2c304eeb40159e39d61d240741c56a255f2b18f3e9278c7dde4ba2a2ecbe72d6699da0f5fb7b0cde603d22b915b4d9668e690aed9790322bc29432111f3647d3a89527dcc392abad607e7df533ee144249ca04596794204868ff2b8c2806a26f394a5f860dd2f53a0082fb80c89b98d047c399b16019befa2ce7000893252e9a9fb6ed44c64585a8b8a9895d233f5d03e9a6225ef2e3bf6c34a4be2b97357d58c4724a96d408ff38c582bf22c6650e43b55ea999b66d6fbecaf8e81042ac237b7de353643e645c4ea149723227d1ad776cc65c8f4aaafda78e10c86ca784c90572892ac98490dd5c538ec145c7ff9285638ee11a451eb047731705f829fe5c7cf27829653e022b3a84b60370a9c4ade275a27f1955f3bb7e361e38e0004c17472edefda2ce8f9683e2c454d907fa908462efa723c1107242098fda3d008512efc8555ff888981b80097805922ca478759d9e71f0a40bfb1c0da49e77414c0e8c908ba34caa2d238d23938d4f5d15c0658e120bdbb0d5a9bbc410f927e6fddda65f816243289f3580c8a8c1c5e08cab817a8c39e834669e3bbbcea116598792d17c776e10c49a47e9af26642da2fb3ee860466093de6f8fe5139835543fcff3b52eeac801e3a88c0eb1def1cb0e439cf54eba89ada08de5005bf6eb78faf49f40416f9707d21fd32711a05132773676f5fa380c9fd636e3b09c1def99a997f6598696ec0ce612817b99cb8eee864ddce5cf55bb1d172cf02299f7337eccbae8fcababb788208866f0341d2804a6353aa3c01920ad19b94a513e80e77bf0138ada5a9ce20d88136101f90c7aeec04c3c838466a83507d35b17a13aa22decfd6f94b5dc89c2063235d12931bbe04cab716db7b98f8c6426aaf1d8d63679fddffc39f32f180756cdb409e8e6ca1edcc0546c0f6a7f09e35acb08150ab9d0fc2850441692690d8ae0140eba29b3e5047dc9ecab70c0d5a4e4d2a0e8caa28c24455a6832cfcc6e76d3a980781f18fdefc8903b78c8ac381b92a2b8e5b1e794f03cde3cac3c0f5fe326369db9e5440ea8480878f663be99fb818c17cbdfdbf877f49f3b6844ced098c56fa9334b30a5fea7ebaba83020a27a45d14c7471ebc19ab9b94ad922c9f981637ba16c1c296b506a3245c3083af2331e2fe5110c89cf997f3aad2cead2a54de7059ddfffc6af6b82a8fe694bb7372c385ad4290f04a4ed2cb92efbbdcbd647330defcda4ab4bf28aefe54734f5dfb5c1a06bff6211bc3c53e2903ca55c4e0bfaba9db62daf4e648e645f299a52e927d91fcd99c313daa3ffa01cb16f5307920eead4701aace68564adede298930d0985fc11a358a0f531130a5a784ebd7b02d8720644661a0fa1f4aae88a4eab7d34109f6d9171370febcd7eefcceb1bc4d751236b51b777c8119bbe48c8e62443c67161e26c5afbad964b2974f064847324336b3b3e2ffd7ee3b6dcff71c8d8ad4028ba833178af7065e25d0a967032145af644832b664cea0527af080562c06a777673c7985785246fefba73a56a000d1216354195724ef106006534e5297aa8dc2197a1bbbf99704761dc3f8545589d482000100d9ae2ba028884b6cad3034755a7d701237806db878b90fecd26681cb1e4791766c7e176f7a2b95d5275f7465bf91ead999f61ef68cefc0ba7dafc88db08ca04b1d416d073247369946adafd168c0f124889e3e50953ca6c6aa94f3f5725436f38ed90a270c213f7cb2191bdca4adc8ad007ef9e2eae079245f23ae81a88500000000"], 0x11a4}, 0x1, 0x0, 0x0, 0x3}, 0x1) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f00000002c0)={0x9, 0xb89}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x1, {0x8903, 0x24, "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", 0x80, 0xff, 0x1, 0xff, 0x0, 0xff, 0x7}, r1}}, 0x128) [ 2113.745974] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e149 [ 2113.753236] RDX: 000000000000000a RSI: 0000000020001800 RDI: 0000000000000003 [ 2113.760612] RBP: 00007f9628334ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2113.767876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2113.775144] R13: 00007ffd4df62e3f R14: 00007f96283359c0 R15: 000000000119bf8c [ 2113.782416] CPU: 1 PID: 29571 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2113.790304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2113.799655] Call Trace: [ 2113.802244] dump_stack+0x1b2/0x283 [ 2113.805874] should_fail.cold+0x10a/0x154 [ 2113.810026] should_failslab+0xd6/0x130 [ 2113.814006] kmem_cache_alloc_node+0x263/0x410 [ 2113.818586] __alloc_skb+0x5c/0x510 [ 2113.822214] netlink_sendmsg+0x901/0xb80 [ 2113.826267] ? nlmsg_notify+0x170/0x170 [ 2113.830217] ? kernel_recvmsg+0x210/0x210 [ 2113.834344] ? security_socket_sendmsg+0x83/0xb0 [ 2113.839079] ? nlmsg_notify+0x170/0x170 [ 2113.843034] sock_sendmsg+0xb5/0x100 [ 2113.846729] ___sys_sendmsg+0x6c8/0x800 [ 2113.850685] ? get_pid_task+0x91/0x130 [ 2113.854550] ? copy_msghdr_from_user+0x3b0/0x3b0 [ 2113.859289] ? lock_downgrade+0x740/0x740 [ 2113.863415] ? __fget+0x1fe/0x360 [ 2113.866845] ? lock_acquire+0x170/0x3f0 [ 2113.870797] ? lock_downgrade+0x740/0x740 [ 2113.874922] ? __fget+0x225/0x360 [ 2113.878351] ? __fdget+0x196/0x1f0 [ 2113.881868] ? sockfd_lookup_light+0xb2/0x160 [ 2113.886340] __sys_sendmsg+0xa3/0x120 [ 2113.890120] ? SyS_shutdown+0x160/0x160 [ 2113.894075] ? wait_for_completion_io+0x10/0x10 [ 2113.898727] ? SyS_read+0x210/0x210 [ 2113.902337] ? SyS_clock_settime+0x1a0/0x1a0 [ 2113.906732] SyS_sendmsg+0x27/0x40 [ 2113.910248] ? __sys_sendmsg+0x120/0x120 [ 2113.914293] do_syscall_64+0x1d5/0x640 [ 2113.918169] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2113.923334] RIP: 0033:0x45e149 [ 2113.926500] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2113.934183] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e149 [ 2113.941433] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 18:36:30 executing program 0 (fault-call:1 fault-nth:1): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec :'], 0xa) 18:36:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0xb3f5eefaf27818b9, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x40021}, r1}}, 0x30) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r2, 0x0, 0x0) sendto$netrom(r2, &(0x7f0000000400)="d83b8dd178e96123a57e7b454d50c910a1c165f09b7f436b0756cdd027a3444457f4c537555879b82e3c7b0adba44465716130cc3d15ac0c42f1557dc74f44be1f01877bf4d2a1c07d4a570f6829ee7f407ab6eb721b985445b4f1cb916120923b371a6e5a3c30c7b7cfcdd4d936ae30036aed072514aa3f77ac2aba28625aebffb5b57d44a9319b3728260bce1b613abb4302415fc90bdc0cfc31b7d98774fb988804767029bb19eba6ae9b62653621bcacfa95af4d05b994ef725523f6b7326a4847b7187cf7d9a054824bea3957", 0xcf, 0x40080c5, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}, 0x48) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r4 = accept$netrom(r3, 0x0, 0x0) accept4$netrom(r4, &(0x7f0000000300)={{0x3, @default}, [@default, @remote, @netrom, @default, @netrom, @rose, @netrom, @default]}, &(0x7f0000000000)=0x48, 0x80000) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getpeername$netrom(r5, &(0x7f0000000100)={{}, [@netrom, @rose, @remote, @rose, @remote, @remote, @remote, @rose]}, &(0x7f0000000180)=0x48) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r7 = accept$netrom(r6, 0x0, 0x0) accept4$netrom(r7, &(0x7f0000000380)={{0x3, @null}, [@null, @rose, @netrom, @remote, @default, @remote, @netrom, @netrom]}, &(0x7f0000000500)=0x48, 0x0) [ 2113.948683] RBP: 00007ff23c854ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2113.955932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2113.963202] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c 18:36:30 executing program 2 (fault-call:1 fault-nth:1): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, 0x15, 0x1, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 18:36:30 executing program 3 (fault-call:1 fault-nth:1): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000001800)=ANY=[@ANYBLOB='exec :'], 0xa) 18:36:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback, 0x22}}}, 0x30) 18:36:30 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00', 0x22}, r1}}, 0x30) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r6, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x1, 0xffffffffffffffff, 0x1c, 0x1, @in6={0xa, 0x4e20, 0x3c58, @loopback, 0x80}}}, 0xa0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r7, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x24, r8, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r5, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r8, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x5}, @L2TP_ATTR_MRU={0x6}]}, 0x30}, 0x1, 0x0, 0x0, 0x48001}, 0x4000000) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1, 0x12}}, 0x10) [ 2114.060320] FAULT_INJECTION: forcing a failure. [ 2114.060320] name failslab, interval 1, probability 0, space 0, times 0 [ 2114.070512] FAULT_INJECTION: forcing a failure. [ 2114.070512] name failslab, interval 1, probability 0, space 0, times 0 [ 2114.087664] FAULT_INJECTION: forcing a failure. [ 2114.087664] name failslab, interval 1, probability 0, space 0, times 0 [ 2114.089223] CPU: 1 PID: 29608 Comm: syz-executor.3 Not tainted 4.14.212-syzkaller #0 [ 2114.107208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2114.116584] Call Trace: [ 2114.119169] dump_stack+0x1b2/0x283 [ 2114.122790] should_fail.cold+0x10a/0x154 [ 2114.126937] should_failslab+0xd6/0x130 [ 2114.130912] kmem_cache_alloc+0x28e/0x3c0 [ 2114.135055] prepare_creds+0x39/0x490 [ 2114.138850] aa_set_current_onexec+0x1e/0x200 [ 2114.143347] aa_change_profile+0x1201/0x2420 [ 2114.147757] ? aa_change_hat+0xf40/0xf40 [ 2114.151810] ? depot_save_stack+0x10d/0x3e3 [ 2114.156129] ? __lock_acquire+0x5fc/0x3f20 [ 2114.160358] ? do_syscall_64+0x1d5/0x640 [ 2114.164415] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2114.169771] ? __lock_acquire+0x5fc/0x3f20 [ 2114.174015] apparmor_setprocattr+0x972/0xa80 [ 2114.178506] ? apparmor_cred_free+0x70/0x70 [ 2114.182820] ? proc_pid_attr_write+0x152/0x280 [ 2114.187396] ? __might_fault+0x177/0x1b0 [ 2114.191444] security_setprocattr+0x74/0xb0 [ 2114.195756] proc_pid_attr_write+0x1bd/0x280 [ 2114.200159] __vfs_write+0xe4/0x630 [ 2114.203780] ? proc_pid_wchan+0xf0/0xf0 [ 2114.207740] ? debug_check_no_obj_freed+0x2c0/0x674 [ 2114.212748] ? kernel_read+0x110/0x110 [ 2114.216643] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2114.222093] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2114.227104] vfs_write+0x17f/0x4d0 [ 2114.230632] SyS_write+0xf2/0x210 [ 2114.234069] ? SyS_read+0x210/0x210 [ 2114.237768] ? SyS_clock_settime+0x1a0/0x1a0 [ 2114.242158] ? do_syscall_64+0x4c/0x640 [ 2114.246121] ? SyS_read+0x210/0x210 [ 2114.249741] do_syscall_64+0x1d5/0x640 [ 2114.253623] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2114.258799] RIP: 0033:0x45e149 [ 2114.261971] RSP: 002b:00007f1404b95c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2114.269661] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e149 [ 2114.276933] RDX: 000000000000000a RSI: 0000000020001800 RDI: 0000000000000003 [ 2114.284185] RBP: 00007f1404b95ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2114.291435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2114.298686] R13: 00007ffddf8265df R14: 00007f1404b969c0 R15: 000000000119bf8c [ 2114.305950] CPU: 0 PID: 29607 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 [ 2114.313858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2114.323206] Call Trace: [ 2114.324248] AppArmor WARN aa_audit_file: ((!((&sa)->apparmor_audit_data)->request)): [ 2114.325791] dump_stack+0x1b2/0x283 [ 2114.325807] should_fail.cold+0x10a/0x154 [ 2114.325821] should_failslab+0xd6/0x130 [ 2114.325833] kmem_cache_alloc_node_trace+0x25a/0x400 [ 2114.325846] __kmalloc_node_track_caller+0x38/0x70 [ 2114.334116] ------------[ cut here ]------------ [ 2114.337407] __alloc_skb+0x96/0x510 [ 2114.341532] WARNING: CPU: 1 PID: 29608 at security/apparmor/file.c:136 aa_audit_file.cold+0x18/0x4f [ 2114.345482] netlink_sendmsg+0x901/0xb80 [ 2114.350555] Kernel panic - not syncing: panic_on_warn set ... [ 2114.350555] [ 2114.355477] ? nlmsg_notify+0x170/0x170 [ 2114.388272] ? kernel_recvmsg+0x210/0x210 [ 2114.392404] ? security_socket_sendmsg+0x83/0xb0 [ 2114.397141] ? nlmsg_notify+0x170/0x170 [ 2114.401115] sock_sendmsg+0xb5/0x100 [ 2114.404810] ___sys_sendmsg+0x6c8/0x800 [ 2114.408764] ? get_pid_task+0x91/0x130 [ 2114.412630] ? copy_msghdr_from_user+0x3b0/0x3b0 [ 2114.417367] ? lock_downgrade+0x740/0x740 [ 2114.421515] ? __fget+0x1fe/0x360 [ 2114.424949] ? lock_acquire+0x170/0x3f0 [ 2114.428900] ? lock_downgrade+0x740/0x740 [ 2114.433031] ? __fget+0x225/0x360 [ 2114.436464] ? __fdget+0x196/0x1f0 [ 2114.439985] ? sockfd_lookup_light+0xb2/0x160 [ 2114.444459] __sys_sendmsg+0xa3/0x120 [ 2114.448239] ? SyS_shutdown+0x160/0x160 [ 2114.452193] ? wait_for_completion_io+0x10/0x10 [ 2114.456844] ? SyS_read+0x210/0x210 [ 2114.460452] ? SyS_clock_settime+0x1a0/0x1a0 [ 2114.464839] SyS_sendmsg+0x27/0x40 [ 2114.468359] ? __sys_sendmsg+0x120/0x120 [ 2114.472396] do_syscall_64+0x1d5/0x640 [ 2114.476267] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2114.481436] RIP: 0033:0x45e149 [ 2114.484608] RSP: 002b:00007ff23c854c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2114.492297] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e149 [ 2114.499564] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 2114.506825] RBP: 00007ff23c854ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2114.514083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2114.521336] R13: 00007ffc9e557d1f R14: 00007ff23c8559c0 R15: 000000000119bf8c [ 2114.528605] CPU: 1 PID: 29608 Comm: syz-executor.3 Not tainted 4.14.212-syzkaller #0 [ 2114.536487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2114.545833] Call Trace: [ 2114.548414] dump_stack+0x1b2/0x283 [ 2114.552034] panic+0x1f9/0x42d [ 2114.555219] ? add_taint.cold+0x16/0x16 [ 2114.559187] ? aa_audit_file.cold+0x18/0x4f [ 2114.563492] ? __warn.cold+0x5/0x4b [ 2114.567105] ? aa_audit_file.cold+0x18/0x4f [ 2114.571410] __warn.cold+0x20/0x4b [ 2114.574939] ? ist_end_non_atomic+0x10/0x10 [ 2114.579256] ? aa_audit_file.cold+0x18/0x4f [ 2114.583573] report_bug+0x208/0x249 [ 2114.587201] do_error_trap+0x195/0x2d0 [ 2114.591073] ? math_error+0x2d0/0x2d0 [ 2114.594862] ? ___preempt_schedule+0x16/0x18 [ 2114.599260] ? vprintk_emit+0x247/0x620 [ 2114.603215] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2114.608044] invalid_op+0x1b/0x40 [ 2114.611481] RIP: 0010:aa_audit_file.cold+0x18/0x4f [ 2114.616388] RSP: 0018:ffff8880b4bf77d0 EFLAGS: 00010282 [ 2114.621731] RAX: 0000000000000049 RBX: 1ffff1101697eefd RCX: 0000000000000000 [ 2114.628980] RDX: 0000000000040000 RSI: ffffffff8145db00 RDI: ffffed101697eef0 [ 2114.636230] RBP: ffff8880b4bf79f8 R08: 0000000000000049 R09: 0000000000000000 [ 2114.643485] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000fffffff4 [ 2114.650736] R13: ffff88823f8b8d80 R14: ffff8880b4bf7848 R15: 0000000000000000 [ 2114.657997] ? vprintk_func+0x60/0x152 [ 2114.661868] ? file_audit_cb+0x640/0x640 [ 2114.665915] ? prepare_creds+0x39/0x490 [ 2114.669869] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2114.675304] ? prepare_creds+0x3c9/0x490 [ 2114.679376] aa_change_profile+0xcc9/0x2420 [ 2114.683685] ? aa_change_hat+0xf40/0xf40 [ 2114.687725] ? depot_save_stack+0x10d/0x3e3 [ 2114.692033] ? __lock_acquire+0x5fc/0x3f20 [ 2114.696248] ? do_syscall_64+0x1d5/0x640 [ 2114.700292] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2114.705661] ? __lock_acquire+0x5fc/0x3f20 [ 2114.709886] apparmor_setprocattr+0x972/0xa80 [ 2114.714363] ? apparmor_cred_free+0x70/0x70 [ 2114.718669] ? proc_pid_attr_write+0x152/0x280 [ 2114.723239] ? __might_fault+0x177/0x1b0 [ 2114.727281] security_setprocattr+0x74/0xb0 [ 2114.731583] proc_pid_attr_write+0x1bd/0x280 [ 2114.735974] __vfs_write+0xe4/0x630 [ 2114.739581] ? proc_pid_wchan+0xf0/0xf0 [ 2114.743535] ? debug_check_no_obj_freed+0x2c0/0x674 [ 2114.748531] ? kernel_read+0x110/0x110 [ 2114.752405] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2114.757834] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2114.762829] vfs_write+0x17f/0x4d0 [ 2114.766350] SyS_write+0xf2/0x210 [ 2114.769782] ? SyS_read+0x210/0x210 [ 2114.773389] ? SyS_clock_settime+0x1a0/0x1a0 [ 2114.777777] ? do_syscall_64+0x4c/0x640 [ 2114.781731] ? SyS_read+0x210/0x210 [ 2114.785347] do_syscall_64+0x1d5/0x640 [ 2114.789218] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2114.794388] RIP: 0033:0x45e149 [ 2114.797554] RSP: 002b:00007f1404b95c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2114.805242] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e149 [ 2114.812491] RDX: 000000000000000a RSI: 0000000020001800 RDI: 0000000000000003 [ 2114.819739] RBP: 00007f1404b95ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2114.826989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2114.834239] R13: 00007ffddf8265df R14: 00007f1404b969c0 R15: 000000000119bf8c [ 2114.841501] CPU: 0 PID: 29603 Comm: syz-executor.0 Not tainted 4.14.212-syzkaller #0 [ 2114.849383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2114.858719] Call Trace: [ 2114.861292] dump_stack+0x1b2/0x283 [ 2114.864907] should_fail.cold+0x10a/0x154 [ 2114.869040] should_failslab+0xd6/0x130 [ 2114.873000] kmem_cache_alloc+0x28e/0x3c0 [ 2114.877153] prepare_creds+0x39/0x490 [ 2114.880938] aa_set_current_onexec+0x1e/0x200 [ 2114.885420] aa_change_profile+0x1201/0x2420 [ 2114.889820] ? aa_change_hat+0xf40/0xf40 [ 2114.893880] ? depot_save_stack+0x10d/0x3e3 [ 2114.898190] ? __lock_acquire+0x5fc/0x3f20 [ 2114.902408] ? do_syscall_64+0x1d5/0x640 [ 2114.906454] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2114.911798] ? __lock_acquire+0x5fc/0x3f20 [ 2114.916026] apparmor_setprocattr+0x972/0xa80 [ 2114.920508] ? apparmor_cred_free+0x70/0x70 [ 2114.924815] ? proc_pid_attr_write+0x152/0x280 [ 2114.929393] ? __might_fault+0x177/0x1b0 [ 2114.933439] security_setprocattr+0x74/0xb0 [ 2114.937745] proc_pid_attr_write+0x1bd/0x280 [ 2114.942139] __vfs_write+0xe4/0x630 [ 2114.945749] ? proc_pid_wchan+0xf0/0xf0 [ 2114.949706] ? debug_check_no_obj_freed+0x2c0/0x674 [ 2114.954722] ? kernel_read+0x110/0x110 [ 2114.958601] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2114.964033] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2114.969034] vfs_write+0x17f/0x4d0 [ 2114.972560] SyS_write+0xf2/0x210 [ 2114.975998] ? SyS_read+0x210/0x210 [ 2114.979626] ? SyS_clock_settime+0x1a0/0x1a0 [ 2114.984017] ? do_syscall_64+0x4c/0x640 [ 2114.987972] ? SyS_read+0x210/0x210 [ 2114.991598] do_syscall_64+0x1d5/0x640 [ 2114.995497] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2115.000670] RIP: 0033:0x45e149 [ 2115.003839] RSP: 002b:00007f9628334c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2115.011530] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e149 [ 2115.018783] RDX: 000000000000000a RSI: 0000000020001800 RDI: 0000000000000003 [ 2115.026033] RBP: 00007f9628334ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2115.033284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2115.040554] R13: 00007ffd4df62e3f R14: 00007f96283359c0 R15: 000000000119bf8c [ 2115.048467] Kernel Offset: disabled [ 2115.052169] Rebooting in 86400 seconds..