0x7f0000000100)=""/17) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000180)) socket$inet6(0xa, 0x803, 0x100000003) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0xf73ca05) r5 = socket(0x400000000010, 0x3, 0x0) write(r5, &(0x7f0000000200)="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", 0x19c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000004c0)=""/183) r6 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r6, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) write$binfmt_script(r6, 0x0, 0x0) 17:48:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x42, 0x0) connect$pppoe(r2, &(0x7f0000000080)={0x18, 0x0, {0x0, @local, 'bond_slave_0\x00'}}, 0x1e) connect$l2tp(r1, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x6000000) [ 324.615508] hrtimer: interrupt took 33836 ns 17:48:16 executing program 0: 17:48:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xdd) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000180)={0x0, 0x7530}, 0x10) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = dup(r0) ioctl$TIOCOUTQ(r2, 0x5411, 0x0) 17:48:16 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)="de", 0x1}], 0x1}, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x5) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_tos={0x0}}, 0x34000) write$sndseq(r1, &(0x7f0000000000)=[{0x6, 0xffffffffffffffff, 0xa3, 0x40, @time={0x77359400}, {0x3f}, {0x8, 0x3}, @note={0x3, 0x0, 0x5, 0x80, 0x5}}, {0xfe, 0x7a3, 0x80000000, 0x6, @tick=0x7f, {0xfffffffffffffff8, 0x9}, {0x0, 0x101}, @queue={0x101, {0x10000000000, 0x4}}}], 0x60) 17:48:16 executing program 0: ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)=ANY=[@ANYRES32]) r0 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="81260b660ed455e2cead2455ff1d1c80b36da1d6ece10effb167dba430f92e0a87ca27158f2c1f6884fe6881d93c4422d68ed9c8699616fa32bb43d749b0da7f9fd4493e60c1779e07696abd630f0f4a0afdea0e5d179b1152651127fbeb48635d3f04", 0x63, 0xfffffffffffffffa) keyctl$setperm(0x5, r0, 0x2) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000008, r1) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)='2', 0x1}], 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00') writev(r2, &(0x7f00000000c0), 0x20000000000003fa) 17:48:16 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000), 0x4) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, 0x0, 0x0) 17:48:16 executing program 0: r0 = socket(0x5, 0x3, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = dup2(r0, r0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@deltaction={0x14, 0x31, 0x303, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x8844}, 0x44000) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000000)={0x6, 0x100}) getsockname(r2, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f00000001c0)=0x80) ioprio_get$uid(0x1, r1) 17:48:16 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000040000001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f00000002c0)="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") ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000280)={0x2, 0x0, 0xa1, 0x740000, 0xf7ffffff7ff0bdbe}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000080)=""/223) [ 325.992347] usb usb5: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 325.999303] vhci_hcd: default hub control req: e408 v0000 i0000 l0 17:48:17 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) clock_settime(0xfeffffffffffffff, &(0x7f0000000180)) r1 = dup3(r0, r0, 0x80000) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000040)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback={0xfc00000000000000}, 0x0, 0x0, 0x1, 0x1}, 0x20) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x8400, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x201008}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="d0000000", @ANYRES16=r2, @ANYBLOB="040f26bd7000fbdbdf25090000005c0007000800020001040000080002000500000008000200120000000c00030058b40000000000000c0003005a3194630000000008000100020000000c000300c90000000000000008000200060000000c0003000900000000000000300007000800020000000000080002000300000008000100060000000c0004000000010000000000080001000fd1e6e4ac59000000300001002c0004001400010002004e22ac1414bb00000000000000001400020002004e23e00000020000000000000000537c4025dc7f742dd136fce2701c47b487d296dabc898f8b4d91323d27a117f777b79da97151fa8859"], 0xd0}, 0x1, 0x0, 0x0, 0x20000000}, 0x85) 17:48:17 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000300), 0x10) io_setup(0xb, &(0x7f00000001c0)=0x0) r2 = accept(r0, 0x0, &(0x7f0000000000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2010}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0xe4, r3, 0x708, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffffffffffe}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7fffffff}]}, @TIPC_NLA_NODE={0x44, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffffe}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc000000000000000}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x4000080}, 0x40) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x3700}]) 17:48:17 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = getuid() lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() r6 = geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {}, [{0x2, 0x0, r1}, {0x2, 0x3, r2}, {0x2, 0x2, r3}, {0x2, 0x0, r4}, {0x2, 0x2, r5}, {0x2, 0x7, r6}, {0x2, 0x7, r7}], {0x4, 0x3}, [{0x8, 0x0, r8}, {0x8, 0x2, r9}, {0x8, 0x4, r11}], {0x10, 0x6}, {0x20, 0x7}}, 0x74, 0x1) get_mempolicy(&(0x7f0000000640), &(0x7f0000000680), 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x1) r12 = socket$isdn(0x22, 0x3, 0x11) r13 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x101080, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r13, 0xc04064a0, &(0x7f0000000800)={&(0x7f0000000700)=[0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0], 0x3, 0x2, 0x5, 0x3}) ioctl$DRM_IOCTL_GET_UNIQUE(r13, 0xc0106401, &(0x7f00000008c0)={0x5f, &(0x7f0000000840)=""/95}) getsockopt$inet_tcp_int(r13, 0x6, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x4) mkdirat(r13, &(0x7f0000000980)='./file0\x00', 0x102) ioctl$ASHMEM_SET_SIZE(r13, 0x40087703, 0x524) getsockopt$SO_COOKIE(r13, 0x1, 0x39, &(0x7f00000009c0), &(0x7f0000000a00)=0x8) ioctl$KVM_REGISTER_COALESCED_MMIO(r13, 0x4010ae67, &(0x7f0000000a40)={0x6000}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r13, 0x3) r14 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000ac0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r13, &(0x7f0000000c00)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b00)={0xa8, r14, 0x4, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xf15d390}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bridge\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lapb0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbb2e}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}]}, 0xa8}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) ioctl$FS_IOC_FSGETXATTR(r12, 0x801c581f, &(0x7f0000000c40)={0x1000, 0x3, 0x2, 0x7, 0x7}) sync_file_range(r0, 0x1, 0x2, 0x4) ioctl$TUNSETOWNER(r13, 0x400454cc, r10) r15 = syz_genetlink_get_family_id$tipc(&(0x7f0000000cc0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r13, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x1c, r15, 0x0, 0x70bd2a, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4) 17:48:17 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x2, 0x10) ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0044306, &(0x7f0000000080)=0xfff) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000100)=r1) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000140)={0x0, 0x1, [0x7, 0x2, 0x80, 0x0, 0x3, 0x2, 0xffffffffffff1ab7, 0x40]}) ioctl$EVIOCGMTSLOTS(r0, 0x40044591, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x41) close(r0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x8b08, 0xfffffffffffffe01) 17:48:17 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000100)='blacklist\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="523f8d14d77916f92944552ad069eb08eca5056ff7ab5e516ab63a025bc3f02d928e9d99a493e2d66834588e08c77b683cffdd1ab9be6d9fad87b7cd79797e8ec990e80621cccd5adcad71af6efef0346dbca3201604374eab0b2e52ae77cadb94888fa2f058510b0f66cae9c132bb582232de71f22d4c54694ab165042157d85d9f66ad0dc465eef21c0c3153aa7f1bea6b562a99f37f727c97ff6d1ee30c0b2e1ff655c83ad044d6ceae11d2743c65ad70df31d4441ed5874af64b8b92be5d2352f9a97417bad6d5b8b29d985dd1dbacfccbdd46eba94b593843c40e220e2f6e6033440d8a469084d0ea1c758c4343ea04b167bce3eafba191580912e176436b39ce5063353d7e6b31a6ae84c0e3b19f3dc9f10d9230522b058a7e2da78448373732da7e7d13e84776826beec0f36b7d2b524e6bc34505280a254646581dadc01bc1a3aa09cd274a637e083484c56e99676e8ed45efc9b78bc2d7ca4b8dab46b6f5cdf8819c74e0ed2d67a8772bfaacce1fbae001d6c444d810e3ee7e949deb6c9bfcba996f863eeef0fa212fc102c37d335e4e93563ebbe8993936aea6fcb6c10fa01f4bd0a6791fe5e938c0afa4b50f30cb336b30149814747e6bd061ab9816d49d209fd30797ad4e4f4a05aedaa0b2d5e6129e94d5e66e41b602b88afb96b6fef6765537d56df0f4dad3bcd184914a9275689e0d66ec9b590de525992fa31975a44bd37e4d74acf2457e9b28316ae040e8ca1cc260bde93c8002b76ab7de07ce7035ecbf8ec46eecd1d2e027ab43e63ce80c1af20a9e69fe1874a02f69bac39b84ff03fb2984c7ec79701aaad99e348a12f06de4be01bc638c87b5b7417ad277b4607ea5825e0cee6fde590c0c65970de538be66b320548d4313e789f51386a7ba041e3f4d578a6101605625286de93e3788a1636a6eba6bc891b908ad9bd1fd957b0b7904098303801925a1edd88103011052c0bb572bf510c0b56e58fd4e095fd0c87be11af4b300818795e3dec5fdf3cff555199c42b39e816f7324a4a71db6b258fd7407a72156e0baba39a24c299885be4c6f9edde7d6c9047d846690affef915925ad3d78c763538ebf406b11c92f88dc0c6b21411bb0eaa710a669a8ae82a45ba2fbc49131615efd52587aab592eee0716522589b3dc403d32e91472a8dc0b083fa479d0bc57148e45e1a05ea07432da3b5429a487d97977ed19d2b2980464445cb711c174bd885e0d1455761888d9373c832a6a4d14a56ad9f8fd8b4a5cd19fcfb2a887b4c3f231e41c7d8ab8e66387e91cdf9eec566f230f13a1a0378d82573e800a69aff10de0ff24412baeaeb6ac5308fcc5acddba6c0f894ce4f0b92bcd7b1988493ad87fca00b170d08e961b78cb0c92be8a18f161581506ab2a88d3f7b94088d3cd4be426236a1d8056c5a1897a96ca0e0680597b7610aa1fc38e45654b58f84c7209768b93293975bd35a292a3a6f4845e84696e4840adb5e3d22db956873f0535bb0ad7521bd4c809d76bf2b908dfdff25dea0db6bec76912bf826b5df6617336eeaa588646923cc931bde27609590aaf0eb1a6887778fba25eac16b286234efb718cfc8e9c1ee03e39d08a503b4adac1a03434dbed903c7a7654d2248372f8887b171f1e175bcc0c0c0cf148b5528a0fffc6e8cd915535daa9251520359ba735ed001dbcf35b43cf3e6ccd38594742312a4c82f8ad4bbc72b5980ed233d6e3c2916e7a3368f92a387b9f97ff80625c7b78501f1c391ceb70d07a0f4e44b2a3d58f7b44e836a9ea24b59e099ea4e7455de9dc6f00e08af6d7067c31c912c6030f98db7758fe21db31c9ba511bbe1749597d605b1a670acf72cabc61a352f2258c76fdc8ac34a08df1e3287f531ab278ee4cb23d219d8db0332f674332347bf54efe088ea7db8061f16ea348654bd5dedfc736839ef051922c5a8be28fb382206e029d70e7f388412a2b3ab982d4c73fffe5199ca3f844cc62e295738614cc7c3b209d868c5598ea6a697e6b24490d26d5c8b94909338a04a817144c95c1860fe1248d0cc96deff6aa0d84616a49d92381ae65ed368fa5f4483382c885491bbb00ba8859964d2364454cecd592fd9e23f868fc477330f34487091a6f4aa70817206daa343c99c4d4d1d358632c2ee39ef944b38b5789d6e078a60cdc8aa80d96366ac9db93410c38a48db3d03ac6d773e0c904ea00a4e311945c96356ba3075221d947610d8a3899658d42886d36107c3e7ed856deb3dfca15c5dbe1c0dcee80c4d272d6a83e1de375d4b8e1d9fc428175a7797f9e52fa44ef36d3efa05d9847e85652caadd8650fc7cfec2e888437e0a5d871e6b195a86c1458e59040c1d9fdfa0abd6cb877c04ea4ced44e7b65f3bfd9252d544454bfaba9edd4dc6185bc44147f2040909c70533565f98b55efcc351e92cb158342689254572436e78e98d5940dabf489556fe32e18bed204d024dd5b34ee6447278a9edb991e115905f6269f10881b5fcffdff5093fa62259c311816e65677c591cf9e7df7e97899c7d5188cfa616f7eb3cda61ee4744436d1eb3fc183edc288dffd7eed3d9c850311aa9a044f443752facf1b8c34f395b6cd0083ca72f8639a2976a86adf9d91cd1fd9e50bb9c2c08c879d037fb4ce7985a7214b69a04173b63235f4eaf20682f3a0ff521a501ed17ebf2e2b0daa88efaeb8a6f2c448b26d32b7a8d8d984308f817aaac457a3a01d1a51229a4f3cd739aaf33ac849ad48de094627f47d0b110783f75a41bde2b3d52fc5b5b01a4d363a2736649c0b4b03bf30e22e9caec148883ed7103a38bc03b2090c8493be8e10a60aafcd97bbadaa4eecce22d2c6c38b44e6d04c5ffdf9bb7abae012f5075904425a662bcbef5959914ee9d3a51665e09024acac133ca3f21fe5b5887aab025853c272ea56c7f1e798fe23a715daa1adf98e518decf949dc840fac4343cbda132e83a235a2020096b768453e5624a6a43d3dbee520f075a734fd5efe477bc243c9bfb1bed22abe441a4a636816aa8c915921933e58b6337cd5b4c36bda829dc24148cb13e01b1e3a1f7661d0c288a3e0f392b60ac8cb0ba9c0f86a500d651c0d9dc692f7e84230f97fd0fa1c375f2a1d97159974ff9abc83f01d262a9cc936eceb03c679cfe9366152272a09a5e7ed3dd698c07d4cf25e15b09895f1f56c9af0d00d76b8b512a9a2b447b27898eba41f5168e4acc7a1781963c5ad1cc6a09b1207aada8f26852b4d00cf798cbce2dc3566c816aa404b1099ea2ebf3d090b0ff1357ff0e1caa507b976624e48dcd1cf3840e15a487e6472e571ee6e07d52e9873b1cab22ee920e8ae24ab994b1fdde9eb6d3479c8d5b28a1bf58665458fea1f08cada6ed7fb0646ec6dc6ccfc7b3f653bdc9094ca4acc8b2ec2ce180987fa1ed1c72b0dd2ffdba3f505b5b24258181f23c652f266182f60568c19457c5cf77c3996c19239d53bc36f44ea6e12bbed03addabd9f7702a105f186066efe9bec2ea3a23f37e4dda0dc2f3a22521b148fcfb8e08c031893200707df125556164f6fddeb8f3fb24295a5cb4767406dcb799c2a714bb73b1059b3c7bc05694dc7d5c3ddca44a2adf674e95623aaeca19ad2b2a295ff051c4c0839007dc58429a60918175d9c2db2b68b4ed0c9cc5c5bebca5398300d8f2a1a86a8bac282e6e1076be17543efaef2032c0fc0d2401040cd98badd5a8116122be2dc636804be8e5278e22c46d35f44b82e0c1c6ade590b5bf5caaf2d768782139ef966d1224e46a87d97b8fd4f7beb913cb4242de6752de428a7186019b9f9cc49b82704b2f9f50d332b4da66887956919c517bfd2589ca1039cba7655a6b2294ae2f76da2e8b68e7d30cc6d8c7b71a2c1e6203cea6e84a8287d88c5367d8f9a111cb2e3fd8d2d9db1511001ac9fe333b25a277e41e318dfba2f626fa199087d4d3e65c4b2b84ed3e7863af003429f7e40523297b721a1acf1f25af263b8a148b2f8da7349d4896ad0bf9ea65b78d50583698b28a8ce29119347efaf1d1a79a514a1ff685fbe52c886ba24a5a6c6453dc3285d0174fb7fcdab8a33de289c76947b4672867f5cd7e169abc18835113d985630dc32e1907a702fad48f55c7e9f90c8c7f64a291c63176be6002e1d5751271b586fc81f6b2a1877b6d79a5897fa4f042226129bed4b5b7d9c59e21348a21ab5f7dcd39efe18d2f71f98821f315c48f435ba9e2517e887c00c6695e52ca2b970374fbd399f64f5f3b90d5d0156c63e2ef0a9ee54f4f57fc7fa45b3d2087d6b3d0622679540e645bcd41763f412b7139409e740c4be40105bf3c52402da6f4340bd824f32c4733cd79561f88f7b45418331d83906b5bd8edb95959a2947964224e233fdc664e8193a899f2aaa730bf50d8b499e7dfee5788170327eeed05c0e4ae0e967a9cd8acc64b12c705ce2d69ef08ae5626bc2c2549088547780d592eb7ed1691d7321f7a9940c40c08d515e45d157aea1b70b368489460be5220f342adf9891c3a785082d6a04160ebe4872d8d0d51af2ae017295f9edfac7494b9b275fc4f46622dcbae4155bf7dbf9257485f6185fe1912d5090b423656ce164e98a5410a099f73073de517039dc1c674040b2d609720c8048e28dacb65cd9ede702f2521e8f6381d81e27df5a5f6ccbd4c624640bd5608b4d1a710a7b7fea8a7cd1d8abc8ba99605f43ac15691bcab504ba25382a2538e952f16da402ed74011d0727a36dc3a88a5ee60b635bcc18b9e2a85ed7c5318bf302996a4b8b4cc98da7be5034098b8196dd9fa8e4e0d418f64daa4db0a49b1ff7a172539fa12fb3fc6016f123229d830c6eb447eb7bb830221d44e35845b3f1fc8bc86832b39c396257e2af5d7f5670e01ccacb78f529ff9cb448cbde00f082fa4e8fe88faabdd4048535012ed78fed2dcf1e202ccb2263bfdf166dd24a74c3f9bd248fd7e32cec36bdcab6d24b41710b9d7f3efd18c1ea80f4b1524b5bcab65a47dfc4529e56346e8f5c99229e29de3698c09865460ff4d33deb241964ba7cafdd55ba80c16da70fe589bd0037aad3795d44390a8c9ab047d270069349edd182e8204f12ab4e476c6e75f174f664c59cde46aa7a0104433a3f4bf8d092c2b79e0a25e051172dd495241fae813f5b717239bf6e82ae7f5f81a13bc73775cd49c1a639926d08e3af883a8e68d000d75f93337807b59731abf93de448ca5d2853419a4a4add86a500c764422716550c18d916c651085c5d104558656df9fbfd5555599d3bfdf6e4f95cabff29b445aabd0cc6b2401500069faba276c0e7904251af8160a775a44cf8f5aa5de8d7efbd95baa35230d098707e4b7b8f226474024ca89026c54ae23ad01eabd349e30f034fbf88b2e4db605d9fa6466031b3144d2b51cc92ad922c8f5a8ffa9cb0197f87963793f2b0b25bba931b94dca21de1c9d7240a12689e766eff99d22780a62d411e45603a9088eec7b588ad214bfae702e50d7e6bf261d7dbf12b3d329e165ff6438fbc31053bb184f9a95c4884ba57a0e6bf8caacae901990adb527ae790f10f2ea905524ffc88d298b3425fc692f538c0b285a01c0aa30c33c8016487b68d05b3b127a6ada5a99e5fe26fc319ed47e1001a728012dd5526eab803a89a76847d9332f401811cd20fdb4706f8afce5065a15f7e1a52e245b30300c1939ae384144fc064c94c232dd56f163a8eb62e8be0ba21830c84e36cd1d3d52d2beca1bae5e369725b9fbb73e2d6856777b24ad491fd9e4e71418e99356125dc488e0843017afa", 0x1000, 0xfffffffffffffffc) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="36a841bc8dfda2d4ee524656bd72bb63557b36", 0x13, r0) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, [0x2]}, 0x2c) [ 326.678588] IPVS: ftp: loaded support on port[0] = 21 [ 326.904144] chnl_net:caif_netlink_parms(): no params data found 17:48:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x200000004e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000380)='illinois\x00', 0x9) sendto$inet(r0, 0x0, 0xa3074e44ed5994f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}, 0xffffff0b) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8408) syz_genetlink_get_family_id$SEG6(&(0x7f0000000640)='SEG6\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/audio\x00', 0x10000, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000600)={0x401, 0xc0f, 0xcb7, 0x2, 0x5}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000001c0)=0x8000000) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000000)=0x4, 0xfd55) write$P9_RMKDIR(r2, &(0x7f0000000680)={0x14, 0x49, 0x2, {0x92, 0x0, 0x2}}, 0x14) r3 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7fff, 0x400) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000240)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f00000003c0)=r4) openat$cgroup_procs(r3, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000480)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r3, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r5, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x6]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7f}]}, 0x4c}, 0x1, 0x0, 0x0, 0x844}, 0x800) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000400)={{0x2b, @dev={0xac, 0x14, 0x14, 0x14}, 0x4e21, 0x2, 'fo\x00', 0x22, 0xb1, 0xf}, {@loopback, 0xfffffffffffffeff, 0x2, 0x4, 0x5, 0x603}}, 0x44) [ 326.980612] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.987833] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.996224] device bridge_slave_0 entered promiscuous mode [ 327.036810] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.043344] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.052409] device bridge_slave_1 entered promiscuous mode [ 327.100254] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 327.113131] bond0: Enslaving bond_slave_1 as an active interface with an up link 17:48:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="7dc3"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000001000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0xa0) [ 327.149750] team0: Port device team_slave_0 added [ 327.158742] team0: Port device team_slave_1 added [ 327.239543] device hsr_slave_0 entered promiscuous mode [ 327.258370] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 327.287388] device hsr_slave_1 entered promiscuous mode [ 327.405593] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.412271] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.419427] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.426016] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.539899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 327.589926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 327.600430] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.621392] bridge0: port 2(bridge_slave_1) entered disabled state 17:48:18 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000080)=""/53) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0xc0205647, &(0x7f00000000c0)={0x8001005, 0x6}) [ 327.647603] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 327.693239] 8021q: adding VLAN 0 to HW filter on device team0 [ 327.728130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 327.736389] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.742890] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.803822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 327.812196] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.818771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.828629] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 327.837726] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 327.846455] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 17:48:18 executing program 0: mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x40) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x0, 0x7f, 0x0, 0x6, 0x479, 0x3, 0x1, 0x6, 0x20000, 0xa4d}, 0xb) write$P9_RXATTRWALK(r0, &(0x7f0000000180)={0x6, 0x1f, 0x1, 0x22}, 0xfffffffffffffe09) [ 327.865931] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 327.877557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 327.934423] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 327.945779] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 327.953770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 17:48:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r2 = dup2(r0, r1) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r3, &(0x7f0000000380)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000080012000200020000000000000000003000000003030000ff3f567b0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) 17:48:19 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = accept$unix(r0, &(0x7f0000000080), &(0x7f0000000100)=0x6e) fcntl$setstatus(r2, 0x4, 0x44800) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x123}) [ 328.461542] vhci_hcd: invalid port number 0 17:48:19 executing program 1: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x6, 0x40200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000200)={0xffffffffffffffff}) 17:48:20 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000), 0x2400000088, 0x2, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000200)=@v3={0x3000000, [{0xfff, 0x6}, {0x0, 0x6}], r0}, 0x18, 0x1) 17:48:20 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = dup2(r0, r0) write$tun(r1, &(0x7f00000010c0)={@val, @val, @llc={@snap={0x1, 0xaa, "72b9", "da38c6", 0x0, "19c6b09a90d0fc6dc273dda699f1d2fbdf4e9d008be325be970b94fdd44a2cbac4cabc9ae2d28d67760677c65174dc09eb86ecddc1ae0dd736a315e3d2cd17fb4437d35a1e476a5dd539b7c5a7611da06e92c1d3fe732f5326ccca2571d389903b2143d87132a0589994171a927cee1c573c14f8362d042d62052aa0fd08a4e31963130b3dc610b9f5f7cb41d1ab54ff7dd07faa08bdfc447c26fa473dc4257f311cb3261d343c759034228a6784d5fc40201be83e2d7d2afbba0c1f52574d0b0974d0027883f8a7b987c99c0281590216405371ebb67678465931"}}}, 0xfffffffffffffd3e) 17:48:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x74, &(0x7f0000000100)=[@in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x52, 0x0}}, @in6={0xa, 0x4e24, 0x400, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, @in6={0xa, 0x4e23, 0x3b6, @dev={0xfe, 0x80, [], 0xe}, 0x2}, @in6={0xa, 0x4e21, 0x3, @dev={0xfe, 0x80, [], 0x16}, 0x3}]}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000001c0)={r1, @in6={{0xa, 0x4e22, 0x3f, @loopback, 0x6}}}, 0x84) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB='#'], 0x1) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000700)=ANY=[@ANYBLOB], 0x1}}, 0x4000055) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000f80)="c04825a289b8409bac6d82480b59ec21ed18ef5d2026f285d43ebd9e76036a237be1531d65b9fca8287e235122efd386dddcac4d3ea33c8fadb96ee15138d515fc447fca6e1b6a48fe681cfd4cea5154b580fc1b7a8ec3b2c4bcb6a54f3039fb52ca50420083b27449", 0xfffffffffffffffe}], 0x1000000000000275) 17:48:21 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x2, 0x10000) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000140)={0x3, 0xe2cc}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) r4 = dup2(r1, r3) accept4(r1, &(0x7f0000000000)=@can={0x1d, 0x0}, &(0x7f0000000080)=0x80, 0x80800) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@mcast1, 0x6d, r5}) 17:48:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x80) write(r1, &(0x7f0000000040)="2400000032001f0014f9f407000904000a00071008000100040000000800000000000000", 0x24) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x0, 0x80000001, 0x2}}, 0x30) sendmsg$nl_xfrm(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=@flushsa={0x250, 0x1c, 0x210, 0x70bd28, 0x25dfdbfe, {0x2b}, [@algo_auth={0x74, 0x1, {{'tgr128-generic\x00'}, 0x148, "dd45074f41e6d0101d6f5b51e92249a41854dd74cd901f061b9142199910dd5b1020a159818e3085a4"}}, @algo_crypt={0x80, 0x2, {{'ecb(aes)\x00'}, 0x1a8, "dd545f4039f5294b6ea779a4a6d4935427612d2fb652bfaafe435880c1adc01b9b14ccebd65ca7acf41f0e67c374819833b07af780"}}, @algo_comp={0x90, 0x3, {{'deflate\x00'}, 0x230, "b2831261de814ef4c26549f3bf0e7a396e9287733d884d3dbfa61cc41106f526a9a8f12efea6f7682b1211a7eb6dcf69ed75b419cf17e612f06845e7a6987d744b2bc46c2577"}}, @tmpl={0x84, 0x5, [{{@in=@loopback, 0x4d3, 0x3c}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3500, 0x5, 0x3, 0x10000, 0xffffffffffffffe0, 0x3f}, {{@in6=@mcast1, 0x4d5, 0x6c}, 0x2, @in=@broadcast, 0x0, 0x3, 0x1, 0x1, 0x0, 0xf0, 0x3ff}]}, @replay_esn_val={0x2c, 0x17, {0x4, 0x70bd27, 0x70bd25, 0x70bd2d, 0x70bd29, 0xffff, [0x400000008000000, 0xb07, 0x5, 0x5]}}, @etimer_thresh={0x8, 0xc, 0x1}]}, 0x250}, 0x1, 0x0, 0x0, 0x1}, 0x40010) 17:48:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x31, 0x0, &(0x7f0000000200)="35d3a58f650509229022b7deb17aa8995de0f0e1ee40978aadf91e711d57aafe49af5d08cc8f72c74806e859e2fd881f5f", 0x0}, 0x28) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fde000/0x18000)=nil, 0x0, 0xfffffffffffffeef, 0x0, 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000800)=0x3001) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x410000) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000040)={0x80}, 0x1) 17:48:21 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x1) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x100) r2 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, r2) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x1c, r1, 0x100, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x40) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='tracefs\x10r\r\xf7\xd2a\xf1:\x7f\xa1Lj9\x13iN\fQ\x14H\xd7\r+Kr\x9b\xf5rJ7\"\x8fs\xa6#\x06\x89+eJK\xd4*\f\x9aw\x00\x95-\xf7N\x10\x8e\x8f\xdb\x12w\x14\n\xa8Q\xbc[\xea9\xe1\x86\x9a\xc8\xea6\x9f\x92\xc1\xe7=\xba8$\xf8\xbe\x11U\x83\xa2e\xba\xfa\xc6)?\xb09\x9f-F\xb8\x7fv\xe5\xab+!\x01\x00\x00\x00\x00\x00\x02\x00\xed`\x19\x9e\xe7,?L\x11,\x8c\x03\x9e\t\xbf\x97\x17,ex\x10\x17\x96|\xf5\"\xc3\xb7\x12\x11\xfa\xef\xff\x12\xed!\xd0\xc3@ah\xcfu\xa2\t.d\x95\xfed\xc4\xdb\x9e\xeb)g\xec\x81\xb5\xb1%\x17\xb9n\x93M\a\xf8\xf5\xc78X\xbb \xc7\x0e`\xd5\xffDp\x93`\xe2>n\xc40\xd4Pw^\xa8\xbe4\'\xa0\xe3<\xe7z\xf3Re\xd3E\x8cfvzZ\xbd-\xf3]\x98\xbf\t\xce[\x97\xc3\xbdci)\xab\xde\x83^\x15\xecED\xe5U\xa6\x92Y\a\xbf\xe6\x87\x82\xe9\xd3\x14\xeebz\x19u\xb67\x0eq\xf3z\x9f\xac\x9e@\xf5\x8fs\xc1\xba\x19\xcc\xac\xe8L{\\@\xa5\xf3\x84;', 0x0, 0x0) r3 = pkey_alloc(0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000300)={0x87, @local, 0x4e21, 0x3, 'rr\x00', 0xd, 0x9, 0x17}, 0x2c) pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, r3) 17:48:21 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x40000002, 0x0) ioctl$int_in(r0, 0x800000800c5012, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000080)={{0x10000, 0x5}, 0x1, 0xffff, 0x3, {0x8, 0x100000001}, 0x3ff, 0x3}) 17:48:21 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)={0x0, 0x0}) get_robust_list(r0, 0x0, 0x0) 17:48:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000500)={r0}) sendmsg$alg(r3, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000300)="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", 0x158}, {&(0x7f0000000400)="2cba1cec0adc4a7191fc1282110492612f1c7c4571e4bba6b7b80ff706e25c257fa205874241e89863cf21561caff63869325bed07a4fd8455ae72534db504de1a5eb4c03160c5a710559eb12388627cc4f38ecf55ea5b6b2be6982e65d5c815a78e81424f7c1f8c224a5b945574c6df2d8b21669a848e1d598c382112526c2fdf9845a00e02598d5cbef844956349e6f2914dff5d0a1cf562fee871e235bb7a95be1faeede6410f00d78ef5dd03d751889c85589363364048e83d29938f38e875ab97f00becf578b6f0b5783aee8d2a95942454", 0xd4}, {&(0x7f0000000140)="b387422840731324b45da6923aeeab7bf45d3f73d38dc3dcb00c251714e19e9113b11e0f5f52f0a720945d4ad590e92d97340836b57945b61da2ab82852dad5a4bd7638278b81c7aaee31d4ff958e18307000000dd51410afe979cbf4499a34df69b834999b62320c50ffbe344c671c5b39b99e0492e247415002218fe2c86c553a73bd0fbb822d0670d380c6d256d3748cc690ad377a4771ff010f8018ac314d5755155c30624f4c2f7e7fd380230f639e98855efbfcdaa691af62201f252fc", 0xc0}, {&(0x7f0000000580)="40df4e76d231fd2f446c059ba75949c76e35817a240a4829788566849ce54b161d913adde382e2c6df1e8a224ea1df8f513e8cfc02ef62f2754699d5f44499969017aa7391e10ea784a91aae14b794d032082a95605533c0213ae0bb92326ca4fc96903035839e9c13d5731b462488a63e2d2e9214febbc25d60024c799124a76749cd81dbc03c5b1637b802fda3a68216154e74fdad5c4c0458b5474b09863267f270cf3b32f60841e3a450ca4d2d42ae5ee76ea5f81f251f6495e25f463adf74f4efb7f9a1d01c0e23db76f85750b9bee1004b8300848a7e7e51e113ef", 0xde}, {&(0x7f0000001780)="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", 0x1000}], 0x5}, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xfffffffffffffe88) ioctl$KVM_RUN(r2, 0xae80, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000080)={0x8}, 0x8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x440000, 0x0) 17:48:22 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7fffffff, 0x102) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x113, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0xffffffff, 0x6, "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", 0xee, 0x80000000, 0x1, 0x1ff, 0x10001, 0x1f, 0x6, 0x1}, r1}}, 0x120) r2 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f00000000c0)={0x0, 0x0, 0x0, [], 0x0}) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc0585604, &(0x7f0000000280)={0x1, 0x0, {0xfff, 0x2, 0x3010, 0xc, 0x7, 0x6, 0x3, 0x7}}) 17:48:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f0000000700)=[{&(0x7f0000000040)=""/50, 0x32}, {&(0x7f0000000340)=""/134, 0x86}, {&(0x7f0000000480)=""/215, 0xd7}, {&(0x7f0000000240)=""/106, 0x6a}, {&(0x7f0000000580)=""/179, 0xb3}, {&(0x7f0000000640)=""/167, 0xa7}], 0x6) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ptype\x00') openat(r1, &(0x7f0000000140)='./file0\x00', 0x105000, 0x2) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000780)=""/65) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 17:48:22 executing program 1: r0 = socket$packet(0x11, 0x40000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x31d429a8, 0x5, 0x8000}, 0x4) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000180)={0x6, {{0xa, 0x4e23, 0x5, @mcast1, 0x1f}}}, 0x88) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x40000000000020f, 0x0) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x0) [ 331.945633] protocol 88fb is buggy, dev hsr_slave_0 [ 331.951464] protocol 88fb is buggy, dev hsr_slave_1 17:48:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)='\x1dNL\xc0\x00', 0x20000, 0x436, &(0x7f00001a7f05)=""/251}, 0x48) 17:48:23 executing program 1: setrlimit(0x2, &(0x7f0000000040)={0x0, 0x2000000}) mlock(&(0x7f0000005000/0x3000)=nil, 0x3000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x32, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r1, 0x50, &(0x7f0000000080)}, 0x10) 17:48:23 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x400000000007, 0x32, 0xffffffffffffffff, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x80044dff, &(0x7f0000000080)) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 332.256804] mmap: syz-executor.1 (10687): VmData 35180544 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. 17:48:23 executing program 1: unshare(0x8000400) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e21, 0x81, @rand_addr="0598759c01abd9fd2d1ba381d9c800a3", 0xff}, {0xa, 0x4e20, 0x3f, @rand_addr="f31974e84a072146904c3be586ab8775", 0x8}, 0x80000000, [0x26, 0x7fff, 0x1, 0x0, 0x9, 0x10001, 0x5, 0xffffffffffffffcf]}, 0x5c) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000400)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) socket$can_raw(0x1d, 0x3, 0x1) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 17:48:23 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video35\x00', 0x2, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000040)=0x6a) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000001c0)={0x0, 0xa, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1d8ee2e1"}, 0x0, 0x0, @planes=0x0, 0x4}) [ 332.385702] syz-executor.1 (10694) used obsolete PPPIOCDETACH ioctl 17:48:23 executing program 0: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20000, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000700)='ramfs\x00', 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='.'], 0x1) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = dup(0xffffffffffffffff) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='fuseblk\x00', 0x1, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '-'}}, {@obj_role={'obj_role', 0x3d, 'sysfs\x00'}}, {@hash='hash'}]}}) 17:48:23 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f000046c000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '&\x00'}, &(0x7f0000000080)='vmnet1keyringvmnet1\x00', 0x14, 0x1) 17:48:23 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000040)={0xc, 0x2, 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000080)=[{0x8, 0x0, [0x8, 0xd000000000000000, 0x6, 0x9, 0x3, 0x1000, 0x7, 0x8, 0x8000000000000, 0x5, 0x3, 0x20000000000, 0x20, 0x101, 0x3, 0x5]}, {0x10, 0x0, [0xebb, 0x3, 0x5, 0x400, 0x0, 0xffff, 0x1, 0x8000, 0x1, 0x1, 0x1, 0x101, 0x5, 0x8533, 0x6, 0x71ce291]}, {0x1b, 0x0, [0x8, 0x0, 0x3, 0x0, 0x1, 0xf1f, 0x8, 0x1, 0x2, 0x400, 0x27, 0x7ff, 0x6, 0x1ff, 0x7, 0x1]}, {0x0, 0x0, [0x55b, 0x401, 0x10001, 0x0, 0x1000, 0xff, 0x1, 0x3, 0x0, 0x3f, 0x100, 0x10001, 0x1, 0x6, 0x7, 0x20]}, {0x1c, 0x0, [0x9, 0x31be4000000000, 0x2, 0x3, 0x41, 0xe1, 0x3ff, 0x7, 0xfff, 0x4, 0xfffffffffffffffc, 0x3, 0x0, 0x7f, 0xb268, 0x17]}, {0x4, 0x0, [0x101, 0x101, 0x8, 0x5, 0x9, 0xfff, 0xbecf, 0x6, 0xe1bb, 0x7, 0x6, 0x84, 0x80, 0x4fc6, 0x7f, 0x1]}, {0x3d, 0x0, [0xbe, 0xfff, 0x1, 0x80000000, 0x8b4, 0x9, 0x6, 0x1, 0x10000, 0x85, 0xbbc, 0x8, 0x10001, 0xffff, 0x4, 0xfffffffffffffffb]}], r1, 0x1, 0x1, 0x1f8}}, 0x20) munlockall() getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340)={0x0, 0x3}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000003c0)={r2, 0xe97}, 0x8) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000400)=0x5) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000440)={r2, 0x7, 0x101}, 0x8) r3 = syz_open_dev$dspn(&(0x7f0000000480)='/dev/dsp#\x00', 0x8, 0x101c00) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@security={'security\x00', 0xe, 0x4, 0x670, 0x228, 0x498, 0x0, 0x228, 0x0, 0x5a0, 0x5a0, 0x5a0, 0x5a0, 0x5a0, 0x4, &(0x7f00000004c0), {[{{@ipv6={@rand_addr="f675172084b28f53ba7f62e7eb48b2a4", @initdev={0xfe, 0x88, [], 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xff], [0x0, 0xffffff00, 0xffffff00, 0xff], 'vxcan1\x00', 'bridge_slave_0\x00', {}, {0xff}, 0x3e, 0x3a0, 0x2}, 0x0, 0x200, 0x228, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x8, 0x6, 0xffffffff, 0x8000, 0x1, 0x2, [@local, @rand_addr="f10d0a550c38bc8ac1850542f48a37a2", @empty, @rand_addr="d080154971b427541b4cf5a9e27721f2", @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, @empty, @loopback, @mcast2, @mcast2, @ipv4={[], [], @local}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @empty, @local, @loopback, @rand_addr="91eb28f8d9b122f1decc809b252e494a"], 0xb}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x3, 0x5}}}, {{@uncond, 0x0, 0x248, 0x270, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x4d96, 0x6, 0x1, [0x200, 0x89, 0x7, 0x5, 0xf3, 0xffffffffffff8862, 0x4, 0xa07, 0x1, 0x1000, 0x3f, 0x1000, 0x2, 0x6, 0x3c, 0x4]}}, @common=@rt={0x138, 'rt\x00', 0x0, {0x2, 0x3, 0x5, 0x9, 0x4, 0x1, [@remote, @mcast1, @dev={0xfe, 0x80, [], 0x14}, @loopback, @dev={0xfe, 0x80, [], 0x2a}, @dev={0xfe, 0x80, [], 0x21}, @mcast1, @loopback, @mcast2, @remote, @loopback, @local, @loopback, @rand_addr="d9b62fadc079515b03d006d93093b294", @loopback, @mcast1], 0xd}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x3}}}, {{@ipv6={@ipv4={[], [], @multicast1}, @dev={0xfe, 0x80, [], 0x22}, [0xffffff00, 0xffffffff, 0x0, 0xff], [0xff0000ff, 0xff0000ff, 0xffffff00, 0xff], 'syzkaller0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x1d, 0x100, 0x1, 0x10}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x6, 0x2, 0x80000001, 0x800, 0x2f, 0x100, 0x1ff, 0x1]}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6d0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000c00)) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000e40)={0x13, 0x10, 0xfa00, {&(0x7f0000000c40), r1, 0x2}}, 0x18) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000e80)={r2, 0x7ff}, 0x8) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000ec0), &(0x7f0000000f00)=0x4) lsetxattr$trusted_overlay_redirect(&(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='trusted.overlay.redirect\x00', &(0x7f0000000fc0)='./file0\x00', 0x8, 0x2) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000001000)={0x1, r0}) ioctl$BLKBSZSET(r3, 0x40081271, &(0x7f0000001040)=0x4) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x2f) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000001080), &(0x7f00000010c0)=0xb) r4 = syz_open_dev$adsp(&(0x7f0000001100)='/dev/adsp#\x00', 0x40, 0x40000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000001140)={r2, 0x75, "8b500926e434bf46351649e40cd4c57ed9fea09770bd53191a37ac64b45769bf4a3957495c7efe8feae018a925a77cf99fd85029bf1efcb5b7becbb6f5e610ebd0a8469c92c191a310e87859022568083da73a55b17616fbd23efa8325037e7f5caad0a3d77df1d9fd0c692711f6d440b04053276e"}, &(0x7f00000011c0)=0x7d) connect$l2tp(r3, &(0x7f0000001200)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e23, @remote}, 0x0, 0x0, 0x0, 0x3}}, 0x26) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000001240)) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000001280)={[], 0x8815, 0x7, 0x1, 0x0, 0x80000001, 0x0, 0x104006, [], 0x100000001}) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000014c0)={r0, &(0x7f0000001440)="e65d52d511b5b97ebbc3832a03edc5503934b445cde7d211cc650639d4a4ad", &(0x7f0000001480)="e750bd3d6777135c736449515869cd496e3e4fc4bc98e2d34eaabf97c243d7a8f8fa98c8b533363385f835c6949c01e745a0fb785229370cd2", 0x2}, 0x20) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000001500)={r5, 0x8000, 0x4}, 0x8) shutdown(r4, 0x1) [ 332.651089] mmap: syz-executor.1 (10706) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 17:48:23 executing program 1: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000180)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='.\xf9\xfd\x17\xc2e\xb1O\x8a', 0x200002, 0x0) fchdir(r1) ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x4) open_by_handle_at(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="00000009d8456b4749c93bac00000000"], 0x311080) mkdir(&(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 17:48:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendto(r1, &(0x7f0000000140)="d296fe058ab17b4479a7c632a5bb0dae", 0x10, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/7, 0x7}, {&(0x7f0000000180)=""/105, 0x69}], 0x2}}], 0x1, 0x0, 0x0) 17:48:24 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x40, 0x121000) ioctl$NBD_CLEAR_QUE(r0, 0xab05) unshare(0x0) r1 = syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x40001) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000140)) 17:48:24 executing program 0: arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/30, 0x1e}, {&(0x7f00000000c0)=""/231, 0xe7}, {&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000280)=""/8, 0x8}, {&(0x7f00000002c0)=""/225, 0xe1}, {&(0x7f00000003c0)=""/194, 0xc2}], 0x7, &(0x7f0000000540)}, 0x3) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000005c0), &(0x7f0000000600)=0x4) 17:48:24 executing program 0: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) r2 = openat(r1, &(0x7f00006e9ff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f000001fff7)='./file0/file0\x00', r2, &(0x7f000001fff8)='./file0\x00') renameat2(r2, &(0x7f00000001c0)='./file0/file0/file0/file0\x00', r2, &(0x7f0000284000)='./file0/file0/file0/file0\x00', 0x0) r3 = getpgid(0xffffffffffffffff) wait4(r3, &(0x7f0000000000), 0x80000000, &(0x7f00000000c0)) 17:48:24 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = dup3(r0, r0, 0x80000) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f0000000000)={0x401}) sendmsg$inet_sctp(r0, &(0x7f00000007c0)={&(0x7f0000000180)=@in={0x2, 0x0, @loopback}, 0x10, &(0x7f0000000640), 0x80, &(0x7f0000000200)=ANY=[@ANYBLOB="8335fdd9481aefd9e952dac90f2499321a72105da1c8b6fbd75500000000157b6aca160a03739afbecc54dc1caeca7e8e2f0e57f2cdde7700db6bc41f52f8f3eea69a4fcec1e956e65a8ec849b6687880f54712852499dc5a998c02654ba9b45b43039d730204926ae712c4229c99ae926f20349e46b5acb93ddfd05f32559f8996d268a18ba1d9f8ba625d340b0d6546dfa32fee165b74b38c7fdf524ddbdec73bc4b5143315eb8c901acb34b26231a06af79d09018d284ab164a279e7919c80078be1104e1ad7509c868308d29c6584d271082c5bc20b0953f3ecb22e11b9db78cbe23c3a8806977a9d58cff913805ef915d5339752f6ed4a4081b38764b10ffc525fdb6258dd11cef0ed4d04c1173d235b899cfb2407741ea9ee735122ae3234feb5dd401c93b7c1379ab9491ccaa6bc000698ddae892cac934520c9b5c1995d839f23d0f3a327848110a22a2715eb6d084103bea"], 0x18}, 0x0) 17:48:24 executing program 1: syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x101001) syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x6, 0x4000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)='vboxnet0,selinux\x00'}, 0x30) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='vlan0\x00', 0xffffffffffffff9c}, 0x10) getpgid(0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) openat$vcs(0xffffffffffffff9c, &(0x7f0000004140)='/dev/vcs\x00', 0x0, 0x0) mq_open(&(0x7f0000005280)='vlan0\x00', 0x40, 0x30, &(0x7f00000052c0)={0x9, 0x9, 0x1ff000, 0x5, 0x7fff, 0x5, 0x2, 0x4}) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005300), &(0x7f0000005340)=0xc) lstat(&(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)) pipe2(&(0x7f0000005440), 0x80000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1000000802}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @broadcast}}) fsetxattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.opaque\x00', &(0x7f0000000300)='vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', 0x10, 0x1) dup3(r1, r2, 0x0) 17:48:24 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="99d8b98c1124e259e36617026941a1108904000f11633c20a28100e4e15dbdd8278c2e7634bdd069e15ba402062000009f7205e94609f60114"], 0x39) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 333.551739] IPVS: ftp: loaded support on port[0] = 21 17:48:24 executing program 1: syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x101001) syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x6, 0x4000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)='vboxnet0,selinux\x00'}, 0x30) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='vlan0\x00', 0xffffffffffffff9c}, 0x10) getpgid(0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) openat$vcs(0xffffffffffffff9c, &(0x7f0000004140)='/dev/vcs\x00', 0x0, 0x0) mq_open(&(0x7f0000005280)='vlan0\x00', 0x40, 0x30, &(0x7f00000052c0)={0x9, 0x9, 0x1ff000, 0x5, 0x7fff, 0x5, 0x2, 0x4}) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005300), &(0x7f0000005340)=0xc) lstat(&(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)) pipe2(&(0x7f0000005440), 0x80000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1000000802}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @broadcast}}) fsetxattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.opaque\x00', &(0x7f0000000300)='vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', 0x10, 0x1) dup3(r1, r2, 0x0) 17:48:24 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"3575dffd4be930a2c209c417aa48dac8"}}}}, 0xa0) [ 333.857464] chnl_net:caif_netlink_parms(): no params data found 17:48:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@mcast1, 0x0, 0xff}, 0x0, @in6=@local, 0x0, 0x1}}, 0xe8) r2 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="021200009e665f0910a25186cc7e4473"], 0x10}}, 0x0) recvmmsg(r2, &(0x7f0000000f00), 0x400000000000308, 0x10000, &(0x7f0000001000)={0x77359400}) [ 333.987462] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.994079] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.002477] device bridge_slave_0 entered promiscuous mode [ 334.035950] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.042523] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.051022] device bridge_slave_1 entered promiscuous mode [ 334.100951] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 334.120202] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 334.156515] team0: Port device team_slave_0 added [ 334.165454] team0: Port device team_slave_1 added [ 334.261826] device hsr_slave_0 entered promiscuous mode [ 334.307972] device hsr_slave_1 entered promiscuous mode [ 334.397130] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.403705] bridge0: port 2(bridge_slave_1) entered forwarding state [ 334.410954] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.417550] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.498069] 8021q: adding VLAN 0 to HW filter on device bond0 [ 334.523419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 334.532925] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.543672] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.569187] 8021q: adding VLAN 0 to HW filter on device team0 [ 334.592153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 334.600799] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.607426] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.657112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 334.665708] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 334.673835] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.680387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 334.689259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 334.698503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 334.707604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 334.716532] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 334.725229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 334.734013] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 334.742621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 334.750905] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 334.765013] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 334.773039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 334.781507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 334.794102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 334.850178] 8021q: adding VLAN 0 to HW filter on device batadv0 17:48:26 executing program 2: mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ff8000/0x4000)=nil) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x90000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020427bd7000fcdbdf2506000400180007000c00030004000000000000000800020003000000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040011) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r1, 0x0, 0x9, 0x3, 0x8}) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') sendfile(r0, r3, 0x0, 0x800000bd) 17:48:26 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000100)=0xd9d, 0x4) r1 = socket$rds(0x2, 0x2, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0xfffffffffffffffc, 0x0) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f00000000c0)) socket$rds(0x15, 0x5, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x9) sendmsg$rds(r1, &(0x7f0000000080)={&(0x7f0000003000)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f0000008000), 0x0, &(0x7f0000001000)=[@cswp={0x58, 0x114, 0x7, {{}, &(0x7f0000001000)=0x24, &(0x7f0000000ff8), 0x14, 0x200000000}}], 0x42}, 0x0) 17:48:26 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup2(r0, r0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x2000000) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) ioctl$VT_WAITACTIVE(r1, 0x5607) write$vnet(r0, &(0x7f00000004c0)={0x1, {&(0x7f0000000740)=""/24, 0xfffffffffffffed9, &(0x7f0000000780)=""/101, 0x0, 0x2}}, 0x68) 17:48:26 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}], 0x10) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/172) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xb) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) 17:48:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) unshare(0x20400) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc1, &(0x7f0000000180), &(0x7f0000000100)=0x7a) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x20000, 0x0) 17:48:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f00000000c0)={r2}) getsockopt$inet_int(r0, 0x0, 0x16, 0x0, &(0x7f0000000040)) 17:48:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000a000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0xffffffffffffffd3) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000040)=0x8, 0x4) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x1f000}) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000000)=ANY=[@ANYBLOB="010000402576c191e98de4365100000000000000eede"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") 17:48:26 executing program 0: r0 = gettid() process_vm_writev(r0, &(0x7f0000001640)=[{&(0x7f0000000340)=""/212, 0xd4}, {&(0x7f00000002c0)=""/12, 0xc}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/206, 0xce}, {&(0x7f0000000440)=""/44, 0x2c}, {&(0x7f0000000480)}, {&(0x7f00000004c0)=""/9, 0x9}], 0x7, &(0x7f0000002800)=[{&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/68, 0x44}, {&(0x7f0000002740)=""/121, 0x79}, {&(0x7f00000027c0)=""/10, 0xa}], 0x4, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{r1, r2+10000000}, {0x77359400}}, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x0, 0x0) r4 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCINQ(r4, 0x541b, &(0x7f0000000040)) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6, 0xe0e, 0xacc2}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000140)={r7, 0xfffffffffffffffc, 0x7f, 0x4, 0xffff, 0xf56}, &(0x7f0000000180)=0x14) ioctl$UI_DEV_CREATE(r5, 0x5501) readv(r3, &(0x7f0000000500)=[{&(0x7f00000001c0)=""/143, 0x8f}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x8000000003, 0x400000000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1b) 17:48:26 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x4c81, &(0x7f0000000300)=""/153) rt_sigsuspend(&(0x7f0000000000)={0x1f}, 0x8) write$binfmt_misc(r0, &(0x7f0000000080)={'syz0', "373ff4"}, 0x7) 17:48:26 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x100000000, 0x8040) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000080)) write$UHID_CREATE(r0, &(0x7f00000002c0)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000001c0)=""/14, 0xe, 0x8, 0x5, 0x7, 0x3, 0x9}, 0x120) mq_open(&(0x7f0000000180)='/\x00', 0x0, 0x4, &(0x7f0000000280)={0x40000000008a95, 0x0, 0xebe3, 0x5db7, 0x7fffffff, 0x0, 0x6, 0x1}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x240000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0), 0x13f}}, 0x20) unshare(0x3fc) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x3, 0x2}) 17:48:27 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_ifreq(r2, 0x893f, &(0x7f0000000040)={'batadv0\x00', @ifru_flags=0x9002}) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000000)={0x2, 0x3, 0xf0f, 0x0, '\x00', 0x20000000001130}) 17:48:27 executing program 0: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000140)={'TPROXY\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}, &(0x7f0000000180)=0x1e) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f00000000c0)={0x4, 0x40, 0x5b3edd54, 0x66}, 0x10) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000100)) syz_emit_ethernet(0x11, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x0) 17:48:27 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet6_group_source_req(r2, 0x29, 0x4a, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @rand_addr="88992b198bd4eca6c26023b303207c45"}}}, 0x108) close(r2) close(r1) 17:48:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'wp256\x00'}, 0xfffffffffffffe8a) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) write$FUSE_POLL(r2, &(0x7f0000000240)={0x18}, 0x18) r3 = getuid() fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = geteuid() r10 = getgid() lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getuid() getgroups(0x5, &(0x7f0000000600)=[0x0, 0xffffffffffffffff, 0xee01, 0xee00, 0xffffffffffffffff]) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000016c0)={{{@in6, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@empty}}, &(0x7f0000000640)=0xe8) r16 = getgid() ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f00000020c0)="453106d3137ad3b1f7b8fe215e384ff33c318a295ed209ce5ab5f426bc4f4675e9de0970516f37d1eed74c9831bac5c416d7be5728b3ddc5bf51991ef39c0c8b8cc53df1cc627e25408ad7625110deea056d47e01e86dd61f6ff34ee41402eb6fa65750bb75445febf478a8e2c5e59743f874ae2d448f3aef3afafc8492a49f4817956f6c716f9376060d493166d965dbf0c6248df01d4149fd47fc1bb9b45dea007c18010a7abc619956bf562ab13166c8153a5ab01deebaab26336") fstat(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x9, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0x0, 0xee01, 0x0, 0xffffffffffffffff, 0xffffffffffffffff]) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001840)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000001940)=0xe8) fstat(r1, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000002080)={0x1, 0x18}, 0x2) setsockopt$inet_buf(r2, 0x0, 0x2f, &(0x7f0000002000)="a8acf4942e19c99e26a7229fff75c60111a1cb492a6ea4cc6d5bbb69f46663241d4f8adee92a440771a5c4602657ff966351b2c9ad0f39ac183f9dee85b0947709f16d40ed", 0x45) write$FUSE_DIRENTPLUS(r2, &(0x7f0000002180)=ANY=[@ANYBLOB="f00500000000000007000000000000000200000000000000000000000000000007000000000000000000000000000000030000000100000005020000000000000100000000000000ff030000000000004860000000000000401d00000000000004000000000000004c0000000f00000009000000ffffffff01000100", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0700000033b51b1500000000060000000000000004000000000000002b0000000600000076626f786e657430706f7369785f61636c5f61636365737373656c696e75787573657273656c696e75783a0000000000010000000000000003000000000000000400000000000000000000800000000006000000140400000400000000000000d5000000000000000100000001000000f205000000000000060000000000000002000000000000000600000007000000460a0000ffffffff06000000", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="0300000083320000000000000600000000000000010000000000000005000000010100006861736800000000000000000000000002000000000000001a01000000000000090000000000000004000000ff03000005000000000000000104000000000000000000000100000007000000000000006d000000000000000600000000000000ef0000000002000038000000ff07000032000000", @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="ff7f0000080000000000000000000000000000006f08000000000000000000000000000003000000000000000100000000000000ff01000000000000060000000000000079fe00000000000009000000000000000000000000000000e10000000000000004000000000000004400000000000000018000000000000078409d6fff7f0000000000000000000000000000", @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="00080000010000000000000003000000000000007f00000000000000000000000000000005000000000000000200000000000000030000000000000029faffffffffffff8732000000000080060000000000000020000000000000000200000000000000ffffffff0000000004000000000000002800000000000000000000002a0b0000050000000400000009000000", @ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="0700000000000000000000000300000000000000030000000000000006000000ff0100007770323536000000010000000000000000000000000000000100010000000000040000000000000006000000010001000000000000000000a600000000000000bc0000000000000001000000000000000000000000080000fdffffffffffffff04000000010000003300000006000000fbffffff", @ANYRES32=r13, @ANYRES32=r14, @ANYBLOB="070000000300000000000000050000000000000002000000000000002d00000008000000706f7369785f61636c5f616363657373237b706f7369785f61636c5f6163636573737d7b6d696d655f747970650000000000000000000000010000000000000000080000000000001f00000000000000530a0000000000000100000000000000030000000000000002000000000000000300000000000000ffff0000000000000100000000000000ff7fffff00000000a7000000ff2c000005000000", @ANYRES32=r15, @ANYRES32=r16, @ANYBLOB="01000100080000000000000004000000000000007f00000000000000060000004a00000077703235360000000400000000000000010000000000000000100000000000000000000000000000a90c00002000000001000000000000000010000000000000ffffff7f000000000100000000000000fefffffffffffffff9ffffffffffffff0100000006000000000000000300000000000000", @ANYRES32=r17, @ANYRES32=r18, @ANYBLOB="0300000006000000000000000100000000000000010000000000000006000000000000007770323536000000040000000000000000000000000000000500000000000000060000000000000008000000000000000000000000000000980000000000000006000000000000000100000000000000010001000000000005000000000000005e0800006b000000730000000500000001000000", @ANYRES32=r19, @ANYRES32=r20, @ANYBLOB="1800000020000000000000000610000000000000010000000000000006000000ff0700007770323536000000e264bb5243f67849dc2f4fe949420612a4fa984034bfbf8e17f73e096ce54a5a8aa0b3c42be87b8c627a1b07000a25592057890a8ef6c0a0af7cb593dbd4bc9d6c56fed75e04117989c295a2c4450ef448fec8d779ad244505884f2fa4244cc0bf282c820fc181388d54d21a09df70a02aecaad323e6ff0b545a7957dfabb1caf10e363fd081333f82ec52cf4c2ce5da44a663dec014036382c0d3f7ac127ed0bc0814db5a210b0a8f653c97f8278a72b0d89f71232881b5f66bd19d5e5725"], 0x5f0) read$FUSE(r2, &(0x7f00000006c0), 0x1000) 17:48:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpid() r1 = getpid() fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x0, r1}) setpriority(0x1, r1, 0x3) 17:48:27 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7fffffff, 0x40001) ioctl$VT_WAITACTIVE(r1, 0x5607) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x400) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1}, 0x20) 17:48:27 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}, 0x4, 0x4}}, 0x26) r3 = syz_open_dev$mice(&(0x7f0000001340)='/dev/input/mice\x00', 0x0, 0x44080) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000001380)={0x0, 0x8}, &(0x7f00000013c0)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000001400)={0x0, 0xbc, 0x0, 0x100000000, 0x6}, &(0x7f0000001440)=0x18) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000001480)={r4, 0x2, 0x5, 0x4, 0x3, 0x6, 0x1000, 0x2, {r5, @in6={{0xa, 0x4e22, 0x2, @rand_addr="3f286d8567bfd6de9f2756027997be73"}}, 0xfffffffffffffffe, 0x8, 0x7, 0x5, 0x6}}, &(0x7f0000001540)=0xb0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) flock(r6, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000001240)='/dev/input/mouse#\x00', 0xb8a9, 0x7f) ioctl$KVM_SET_VAPIC_ADDR(r7, 0x4008ae93, &(0x7f0000001200)=0x1) r8 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl(r8, 0x6, &(0x7f0000000100)="0af51f023c123f3188a070") getsockopt$packet_buf(r2, 0x111, 0x4000000001, 0x0, &(0x7f0000000100)=0xffffff08) sendto$inet6(r0, &(0x7f0000001280)="943c85980d84d0d6f96fe6d99babba29fd2c71c824bd647b3e1256c5b1ae00e406074abba3cc9f05b0fabb1d8a03150a9a19f2fc88aa23197200de13539ef7d6ea7b563bb06e3e0eb27859560491fadb7b740aec178d9421b971918c838761f7a133d510bb1451abe8d76e4951b2f71c43bc26573c0f3ba2ea4681bf0301788a019c12e5bbe064eac3b44f2f6d613bc2d2019d0ff0fac20308ced943", 0x9c, 0x4, &(0x7f00000011c0)={0xa, 0x4e21, 0x7, @loopback, 0x7fffffff}, 0x1c) recvfrom$rxrpc(r6, &(0x7f00000001c0)=""/4096, 0x1000, 0x40000000, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e22, 0x0, @rand_addr="8c2ce9d3603370d00968a9157f9cee6f", 0xfffffffffffffffb}}, 0x24) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:48:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="080002007f000001"], 0x20}}, 0x0) 17:48:27 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500)={0x0, 0x0}, &(0x7f0000001540)=0xc) stat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001640)=0x0) fstat(r0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001700)={0x0, 0x0, 0x0}, &(0x7f0000001740)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001780)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0)={0x0, 0x0}, &(0x7f0000001800)=0xc) r10 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001b80)={0x0}, &(0x7f0000001bc0)=0xc) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000001cc0), &(0x7f0000001d00), &(0x7f0000001d40)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001d80)='./cgroup.cpu\x00', 0xffffffffffffffff}, 0x30) r15 = getuid() getgroups(0x0, &(0x7f0000001e00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001e40)=0x0) r17 = getuid() fstat(r0, &(0x7f0000001e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r19 = getpgid(0x0) stat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000002200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r22 = getpid() lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000002340)=[0x0, 0x0, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) r25 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002380)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000002480)=0xe8) lstat(&(0x7f00000024c0)='./file0\x00', &(0x7f0000002500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002740)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780)={0x0, 0x0}, &(0x7f00000027c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002800)={0x0, 0x0, 0x0}, &(0x7f0000002840)=0xc) r31 = getpgrp(r28) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002880)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f0000002980)=0xe8) lstat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000002a80)=0x0) getresuid(&(0x7f0000002ac0), &(0x7f0000002b00), &(0x7f0000002b40)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002b80)={0x0, 0x0, 0x0}, &(0x7f0000002bc0)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000002c00)={0x0, 0x0}) r38 = geteuid() stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r40 = getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002d00)={0x0, 0x0}, &(0x7f0000002d40)=0xc) lstat(&(0x7f0000002d80)='./file0\x00', &(0x7f0000002dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r43 = getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002e40)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000002f40)=0xe8) stat(&(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003040)=0x0) lstat(&(0x7f0000003080)='./file0\x00', &(0x7f00000030c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000003140)=[0x0, 0xffffffffffffffff, 0x0, 0xee01, 0x0, 0xffffffffffffffff]) r49 = gettid() fstat(r0, &(0x7f0000004f80)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000005000)={0x0, 0x0, 0x0}, &(0x7f0000005040)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005080)={0x0}, &(0x7f00000050c0)=0xc) stat(&(0x7f0000005100)='./file0\x00', &(0x7f0000005140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000051c0)='./file0\x00', &(0x7f0000005200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r55 = getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000005280)={0x0, 0x0}, &(0x7f00000052c0)=0xc) getgroups(0x1, &(0x7f0000005300)=[0xffffffffffffffff]) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000005340)=0x0) lstat(&(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r60 = getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000058c0)=0x0) lstat(&(0x7f0000005900)='./file0\x00', &(0x7f0000005940)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000059c0)='./file0\x00', &(0x7f0000005a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r64 = gettid() r65 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80)={0x0, 0x0, 0x0}, &(0x7f0000005ac0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005b00)=0x0) getresuid(&(0x7f0000005b40), &(0x7f0000005b80)=0x0, &(0x7f0000005bc0)) lstat(&(0x7f0000005c00)='./file0\x00', &(0x7f0000005c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r70 = getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005cc0)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000005dc0)=0xe8) lstat(&(0x7f0000005e00)='./file0\x00', &(0x7f0000005e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000005ec0)={0x0}, &(0x7f0000005f00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000005f40)={{{@in=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000006040)=0xe8) r75 = getgid() sendmmsg$unix(r1, &(0x7f00000061c0)=[{&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000100)="052e5f17f6b727fb02d243133cb7b0becaec424937cb4f6e0ad7dbf68d40ba8c3f7c045c6c6c8a95460cdffdc0774881fb74f36a07c0fc9e40588d0c2799cdbb10f0bfc85d530dfd1ee0b5dc357cef8deeef1cad0c8e26e7148245cf71447d184689e6f6c2c58d21d6ae123c9273dac1e8d1294f1882ffea729e5fb4e5a9e5038e554a439c7e44d7e2f4418658edb213921ab95b5a3d898e96bf74ba43807a075b7cfdb15ed0998aa93ca5d3cfa0c879a22d907aadd6151c35ad0ef69ca1a8fc36ab2576259e72fdf7777a89451afc6d058998ac29510e5b10469eee9071b7", 0xdf}, {&(0x7f0000000200)="ab41fdac75c1a69691baafe93d12b10138a080660507194079df7106ffa8fb4199d773e1f607ac3e1652cb4a0778d5907b02c098c48dc6b4c919493470f75ccf513e479aa24a5de537c6dffa80ac0785e976d20b2a6d506626a41fd5a9291db63e677f479582fd4de2", 0x69}, {&(0x7f0000000340)="8222b66a9069cfa082c4fb9d71a708eead8205e22afda33e1070d48ab4471b312d911141559932a5b602cc39369c7b5111dc64cb72799ae51b21567189fdebdabbb76aa46d42a2c6106b2a3f238b1c371cf335c2f9ef991406b3ddfd6ba250da9b3300a9a13be8664f91d4f87a2d546f5a05c069a605ed34863c64438c60bf7c0ae62793e951e5ebccaec0c30be31155bf51d628af20efea", 0x98}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="5f63b18aecf981ccc3abf51a1f083c75e75844c0fc85947d6f4dce38b48736991ab7869422ed5e4a1f1d0b618a867e4fbd626784561b51df575044df68fa6f6710b82c263e228a5275f1e6e9d55671679927b54914184be7a1205bfa85551969b02f15a3b12e2c4570c5d728d9f8911e8a9d8f7b5c4698919bb38bb0b8935e3535b82b92868367e287a48e551a426198ecae936da23856ff8fdbc0d469c86170433f221283a4c040ab2db888d93578571d66c7a26239c77c87af5074f5cadbf645c99e5c124f85728aaaa7c0fc8c628ed9e3045bf1dcdf055eeceb9bec2590f808", 0xe1}], 0x5, &(0x7f0000001840)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="20e261f771cae8a6b9e867af01000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00'], 0xa0, 0x55}, {&(0x7f0000001900)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001b40)=[{&(0x7f0000001980)="2b120ceab4498afa336b26e477584237c34df8444684fe493ab27b6c2469dca15700750d72f368e5757642588e0b322d252963bd2fd9ee9dbe23fb3ca402af92d1edbcc32f7fb0d1b865d587022507a6c4e9a2f816ed40fa280a883bf4a84c6ecee3c48a9c200ce4a03d3caf586caaf76b7eb77d2c7063bc0f916ec9e47086c2178cf56116cd156acbb9d39d5a52d849eb48bea48ab1abdf7e", 0x99}, {&(0x7f0000001a40)="18c1544b66b33559a6f4de95e29aaaafda74d08a79c861ae934832ee86d0a99c3485ae91c980389b07d5ecafdde699a69e22d72932d57994249c30ee0be88144973d56ec9282563a95acc80d9322ece4e5c21de7080265896e0043cc50f27ebffcfb0c4dcd8fe3806b8cbd9e0d0a247c3e86fe3d1fc0907b3782823e816a05409bfeed65242198186152e588d0b80138ce8ced33bda9e0cd5db7d3d0dfe4de5211bb32714fb07cd9af16c3c4f3308a9563594cc4ab1cd45ee38a7a3526d1ce86b717c9b9d4f02f12bded1519f3ba2812d98423a8b46774603d27d0c577ff73726784ff317bd2613f22bbc57eff70295b7878de", 0xf3}], 0x2, &(0x7f0000001f00)=[@cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15}, @cred={0x20, 0x1, 0x2, r16, r17, r18}], 0x60, 0x8000}, {&(0x7f0000001f80)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000002100)=[{&(0x7f0000002000)="7129e827a6730b0c0bea1481490374b04dbe171a563c241218ea07b8832bc2466809138164fb40646e3c325e4bd3fe9badaeb9d6c8b456bc28068fe5636498a1b2de85460e916d3f7d27d4728e41880c70127b2e1b91728816ccd3a4f378d6b70688a86d84ada14cb646dffa4e8c06cd347596bb37", 0x75}, {&(0x7f0000002080)="264d7bb6257ba92a74e753a60d463bba58017e9ab1255ade909119115984a1fbaccd5e280aaf16b831ba05eda75ae408b52c3ce423294590a3a057123c62909d33f843a64e329b49b8cbdd15db09119c6ee95d23713c61927c675cbcf818bfe9b342f306fbf82b630a9b649d5c3d", 0x6e}], 0x2, &(0x7f0000002580)=ANY=[@ANYBLOB=' \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r19, @ANYRES32=r20, @ANYRES32=r21, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r22, @ANYRES32=r23, @ANYRES32=r24, @ANYBLOB="0000000001000000000000000000000000000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r25, @ANYRES32=r26, @ANYRES32=r27, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x8001}, {&(0x7f0000002640)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002700)=[{&(0x7f00000026c0)="3867333e0b2aab0617a68d5244cc5f73ad9e", 0x12}], 0x1, &(0x7f0000003180)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r28, r29, r30}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r31, r32, r33}, @cred={0x20, 0x1, 0x2, r34, r35, r36}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r37, r38, r39}, @cred={0x20, 0x1, 0x2, r40, r41, r42}, @cred={0x20, 0x1, 0x2, r43, r44, r45}, @cred={0x20, 0x1, 0x2, r46, r47, r48}], 0x158}, {&(0x7f0000003300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003a00)=[{&(0x7f0000003380)="4bf2930d46e8346dc36e48d5caf964b41a23c36ed173bf83ca2dc41ae2f96e669392a3c54de9391cc5bdf89e43062cc3a2e3f92d0df7fd9c00f3170d60868d701e81aecb9e55eab17ca6dcf236b7a353c58146ae9872ee36196102981feafbccd9828b08fec0dd641e604124a26fbb48e571938bf26cd2c33724c4c33b8c9b4d4794af446e37053938940879c9e42b3073488de3c6a5a771a3427048ae3b54b57f80c55911b6108790177ca90c39b8d5342bb687cd78c7b73b950fd310b7dea633350ee705dc992d5db17fd214cf46d60d7f69e15973bda7c02898af", 0xdc}, {&(0x7f0000003480)="ebf08bfedf332f168a2fe10aad128b5c49fc6ef5b2e59ea7224fea07dd653f9de2a9a93480aff646462a0b3cd12b2265c39ca8c4ff9922866d39eb0adfd91f4b36962c5c2aa1107fe92fd0456ba8343d3bc5074042abe3b0b560cdc6c74439e095ad86078325df962412ed1e311aca433e7c1f588483ddfdc786c95a098346de4e407b4c30c5adb86e59e68db5", 0x8d}, {&(0x7f0000003540)="0169d29bffab5f4e4a904e7dfad4afec2398e80ba335e860809e8b2d49d111f9f7a133a272160e5a27742f1df2bd", 0x2e}, {&(0x7f0000003580)="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", 0xfd}, {&(0x7f0000003680)="7950ff41c801c0d7cd512254a96149647fa61846b8bb4530", 0x18}, {&(0x7f00000036c0)="cd170362cb2f8800daa5bcc8b76e7a3a2862dbf7b66a600258c34f3d0c0730259d3fac87d6caa32a951596bc54a97f669206366ebcdec6710318cc9f5e05f5a879d66376e1dedf892ecb3c16decc10a5b3c6437c37a646d265818d754fc32ca959191147cf1569ba91e842f09b7d021a8b9bee162b5112b20f55e5e3d9a47cd91b2aeed21ead3219b92db172fed11ac94d57aab2e13cd1d6fc3a356d9f2bedd7f7373a5cbec897b0bbd431ea214e18c845e8d8be4337f40ec6c1f42685ac40ae77444e1e9126cd2d8b2e236e", 0xcc}, {&(0x7f00000037c0)="89a9a4ecd2b8c9d34f43cd9a9bdce1ce5131fae2961f150d153bf83057974e92e6b358139dfd38d1d4821fc5c847a0275aa69b88af89e0cbd7def471299e179e47f4594604cb9dca88ac3af4065906eb750fd74efe8f9e7504384124cfdb973479f7af38a4290a6d1641a470be3184c7722488a534ce268c0c3e12307b2f91b322b010c81072d9bac46893634a4ff45304c661973c4aad0c9e4fe05570e1b126dfbb93a7483bb53c484a1405576788452425c8e3844eb98d85d73d0fa8683a6f17e9dc8b4dec4eca4846487b6606fb77a753f45a25422bd4da9dba4d638b7574", 0xe0}, {&(0x7f00000038c0)="d21ab79153a4597d12fd6d6ac5e46f8505aa6715edd73703da6f0aafd3fe0e5e716f53ccabcbc873fe137d7b8dacd71189baaddce06fde8f1cda81d773c5edab0f00fa4f20eb00dfef73338e68585aaffea2cd0d6570423b6a85fe163e4c5c8e9681208dc9ea7c6225f3c5bc180ef58b4b0898d936b47191b6080ee3f3ac76104add0421b48e9e6bc685439131c2495630511d7909afde", 0x97}, {&(0x7f0000003980)="8b82a61c1b85d109b3753fd3c4f957618cc05e803ab472933ffada946a255c1ab8c92f7b67a1594da6abb064629e1d617811d7c41e681b7e13dfe0d25de1d05a01e7eed82a5b36", 0x47}], 0x9}, {&(0x7f0000003ac0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000004f00)=[{&(0x7f0000003b40)="2bcbd7f913825e5a3317a02a6e977191cc89fe395b2b309d27b81fcd681ddfa130214be58d9b6dad7a7084507f5d9b31fb79c8fc2d1de7b4148689ef29fd30901d86e565f97ae5fce49744da0381c46bf77eb2ddaa14fcbc056faf6afc2807cdc891ffdbbf32c911c24c56ae41", 0x6d}, {&(0x7f0000003bc0)="dac21c2b313661ef323ec4b690abad28a7eebb55199fd08546a645c2b3e25d04d16b2879810b2d93eadc3424a758a769f21136f086cfc25ed3d577e41b5cf32e8aef", 0x42}, {&(0x7f0000003c40)="a40babe8b3dd4db7a3345be97f4d1dc73522f5782b0753d980b83e310a8286cf5f2cb521a43e3f53b5a0e8ec1bafe8a6866ef9f9ad8ace73570c458880f62177ce9f02dec9591260cf8f05c5ef2169a2ce1e0cff628094f9b55dc446e68f408c76cdad4f861b678c05d3bb3fd8274d19b19b114e4d97db610f651a566c6996f992f3d535c094aa1862e2eaea89fe9f393cc64fee849e73cbb44a1cdee7ce2bad74e0ebf75b3f98cf5da70697cc584f97f778883279beba02cf43bf5e1c365859d12f367b8730c63346ddd557c79a", 0xce}, {&(0x7f0000003d40)="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", 0x1000}, {&(0x7f0000004d40)="de39b42ca63b2eeacbf4b4366d1a99dce26df391093720f0f0abb9f345de686f5845c63b805e468b632c48d980802dba5f782ceb46e6ad63084aee4134db19361ca515022caecda1bc6c7e2846d6e344ae79364295dce1c3225d09194da5f2894d0cac59517a4e0964da12b6352b497d4ed1a3b0da09f135c97d9ab0c0cd1244c8f9ef5168cfaf230bc8e886a2053f29f817de8b4e4737d4bd8da44b25baccf8d7166396d04d657cc7ea26eb2096749be138b24df7c81eed0781b0330540708a58213804dc3b9b2c7dba6f16d6c920a49de9fdcac8f34272", 0xd8}, {&(0x7f0000004e40)="468a2f0fb49a4827bd8014393983dba5f7a64d9452f6ca1fce87d9507fc492ef8fd1309c72c2d414d415764e8502ad07274136ca92df0099ce42ddd7442256b5e66dd8cb7f134bd895aab91f8f07cd693a1605bdc5519c5898d376d03207626ffbed1d71a01ee193686ce4ba4b5ae1410777af3274d8d34f1f84cac523b0d91f384aef06aa6ac2e9b8fa3a716d71a656e70a7d5af6340f06f93f87439b1e72a4f957", 0xa2}], 0x6, &(0x7f0000005440)=[@rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r49, r50, r51}, @cred={0x20, 0x1, 0x2, r52, r53, r54}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r55, r56, r57}, @cred={0x20, 0x1, 0x2, r58, r59, r60}], 0xb0, 0x4000}, {&(0x7f0000005500)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000005840)=[{&(0x7f0000005580)="67963c265d4a66be", 0x8}, {&(0x7f00000055c0)="4e4bf7fd448c6215c878da89d616b3d1024abb830fad250d0e6c4e1cf9e220ed86f3a2e1c1f3ce0da7544c72d3ce90820919cd075b35be87e2159bfc4a9eeaa0e9cf9af2b2789cec28378810ad8dfff5", 0x50}, {&(0x7f0000005640)="9117640f8c52e4cce9185d53f2ef1b2a62182b999bc672ecb33bfa4a87588513a7c8674b257a843ca09d53fcf85d782f32c07d37e73f0e89222a013d66cd6a1aca8276efe2b8d565aa09662a6f06129de476b12a2bcb6b04b7b65b69bf1604484b9fd69c079de7b0f5a14cf7dcf3bea81e3c6cd163cfb4416617b97d22df945b272460b10961803d19791dbeaa608d6f07626d4510d5f0171ced5e8d59267816836c1d79a88898cf8b3cf211e8bf600a3678b89a9b", 0xb5}, {&(0x7f0000005700)="a288f675b18be97774b8b4a238dee91c7872d4e17bc444bc4b89b2f4af3d1e21e96520a0a001bf2c25bc67ea755b3ca6423cf29c185b5a99929a4bc48fb77e875ed15e73001737549d9fb9a0dd22f3ca6811475c42d231f7d7e7cd4b7c651e64df34f1f3feac0eaa322f8265afa083373e5094931dfe29b71a0937623942eb245a8231bc68dd18c489130185af97728362f57921c231928dcaa3a1af39d1bf80cf6cf21f25aa78800f8acd9934a8266239c7bd55a9475a9f66bd43cff388de0cd60653c3c1a91c343714f0d0c6b7d5382ea252d8199becaa53eec043a4295d106d015347f08522", 0xe7}, {&(0x7f0000005800)="3f93be8b3f9ac72b5bfa42970e3dda693e8f16db2f6877", 0x17}], 0x5, &(0x7f0000006080)=[@rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r61, r62, r63}, @cred={0x20, 0x1, 0x2, r64, r65, r66}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r67, r68, r69}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r70, r71, r72}, @cred={0x20, 0x1, 0x2, r73, r74, r75}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}], 0x138, 0x20000004}], 0x7, 0x4800) [ 336.737882] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 336.777388] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 17:48:27 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x17, 0x0, 0xfffffffffffffdce) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4000, 0x46) ioctl$TUNSETLINK(r1, 0x400454cd, 0x317) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={0x0, 0x100000000}, &(0x7f0000000140)=0x8) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r2, 0x7}, 0x8) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) 17:48:28 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) unshare(0x2000403) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockname(r0, 0x0, 0x0) 17:48:28 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040), 0x2) ppoll(&(0x7f00000000c0)=[{r0, 0xc108}, {r0, 0x40}], 0x2, &(0x7f0000000780)={0x0, 0x1c9c380}, 0x0, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000000)={0x20, 0x3, 0xbcd, 0x7ff, 0x1f, 0x3}) 17:48:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000000)="ff02040000eeff0000000000000000000000000000020205", 0x18) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000100)={0xf6, 0x3f}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000140)={@mcast1, 0x4, 0x1, 0x3, 0xa, 0x3, 0x9}, &(0x7f0000000180)=0x20) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x8}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) 17:48:28 executing program 1: mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x109240, 0x0) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000040)) 17:48:28 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x84) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="ba0200000000000000e99f7b01adc2f2", 0x10}], 0x1}, 0x0) 17:48:28 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x10000, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8800, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x9, 0x0, 0x800, 0x8, r1, 0x3}, 0x2c) socket$isdn_base(0x22, 0x3, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000000c0)={0x8, @capture={0x1000, 0x1, {0x6}, 0x4, 0x200}}) 17:48:28 executing program 0: ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000000)={'veth0_to_bond\x00', @ifru_addrs=@hci}) r0 = dup(0xffffffffffffff9c) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000040)={0x3, 0x102, 0x7, {0x9, 0x1, 0x7fff, 0xffffffff00000001}}) 17:48:28 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f00000000c0)={0x100, 0x0, 0x201e, 0x6, 0x6, 0x2, 0x200, 0x1}) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f00000002c0)=0x5) r2 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mbind(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1, &(0x7f0000000100)=0xffffffffffffff81, 0x3, 0x0) close(r3) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000340)={0x6, {{0x2, 0x0, @multicast2}}}, 0x88) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10001000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r5, 0x204, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'lapb0\x00'}}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x96e1c99d016ee6e7}, 0x8000) setsockopt$inet_mreqn(r0, 0x0, 0x80000000020, 0x0, 0x2fb) 17:48:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f00000000c0)) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) r2 = getpid() fcntl$lock(r0, 0x24, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r2}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syzkaller1\x00', 0x10) 17:48:28 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000001c0)={@initdev, @loopback, 0x0}, &(0x7f0000000200)=0xc) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x1d, r1}, 0x10, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="0304000000150018f5710ca9c1cac3765b0efa8eb7000000000000000000", @ANYRES64=r2, @ANYRES64=r3/1000+10000, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="020000e0010000000400006036020000ecf33b9c2fc0532decd41215173f6a29b5a16a5ec3b11b9d0baa3688f296b61c5680871d05386afda0ef5e313a9ab6b2802fc0791d3e58501e9363b5e9435fad"], 0x80}}, 0x80) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000140)={0x42, 0x2, 0x200000000000003}, 0xfffffe34) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGBITSW(r4, 0x80404525, &(0x7f0000000000)=""/39) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) preadv(r4, &(0x7f00000017c0), 0x1a4, 0x0) setsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000080)=0x8, 0x4) 17:48:29 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f00000001c0)='syz1\x00') r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000140)={{0x0, 0x20000000000000}, 'syz1\x00', 0x48}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00\x00\xc3\x00', 0x40004002}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x339) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000340)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b\x06!\x982\xeck+8Dk;\x95\xfe7q\x8e\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd6\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\xb4(-$\xde`\x97\x8c\xe6\xcd\x8d\x99\x03\xe5u\x97\x14\xb0\xd6\xd0\xae\xcf\xd9\x1e\x1f\xd00=#\xa3\xd4v\xd8\xbdj\x10(\xb6\xf7\x15\xe1\x88\xfe\xe2\x86\xb72\xc4HC@T\xea\xb7XmW\xffk\xc4\x96M|\xf1\x1f\xfa$\xf8IW\xc4\xa9\xcc\x02(\'\x81}S\xe9\xa7\rJ\xc6\xf0_\xc3\x86\x0f\xbd\x83V\x9ar\x02\xbf\xa0+\xe2.i\x7fP\xebnW\x90\x8d\xc5\xc7w\t\xeb\xd9\xec\xd8\x87WA\xee\x15O]\xafI\x03\x9b\x9f\"\x1c\vMdKm\x7f$\"cIB#\xe1Zt\xc7\xc7\x9f\xa0\xd3\x18\x1d\t\xee\x86\xe8\xda\xae\xeeo\xf8s6WK5:\a\xa5\x89\x9a8\xb4\'\xf7\a\xe6\xbe\"<\xd2IS\x04\xb4\xb4\xee\x80\a\x9d\x1b\x15\xfa\xadAB\xdf\x17l\'7\xf9[\xe17\xcb\xdcF\xa4\xddW[#\xa5\x1cK&\x13\x1cF\x0e\xd5O\xf3\xd9\xc1\x0eYwk}\xbc \xe8\xd0l\xe1\xe2\x9a\x84\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) iopl(0x7) ioctl$EVIOCSFF(r5, 0x40304580, &(0x7f0000000040)={0x52}) 17:48:29 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000840)) close(r1) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000040)=0x200000, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000800)) 17:48:29 executing program 0: socket$isdn(0x22, 0x3, 0x23) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000340)) [ 338.151550] input: syz1 as /devices/virtual/input/input5 17:48:29 executing program 1: unshare(0x20400) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f00000000c0)=""/87) socket$pppoe(0x18, 0x1, 0x0) 17:48:29 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x8082, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) close(r0) 17:48:29 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x6, 0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000100)) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') [ 338.497837] misc userio: No port type given on /dev/userio [ 338.542595] misc userio: No port type given on /dev/userio 17:48:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) syz_open_pts(r1, 0x26000) r2 = syz_open_procfs(0x0, &(0x7f0000005880)='stack\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) getpeername$tipc(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) 17:48:29 executing program 0: r0 = socket(0x10, 0x80002, 0x0) syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x0, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x106ec401) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_getnetconf={0x14, 0x52, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x8015}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 17:48:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = dup(r0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{0x0, 0x1b6b, 0x9, 0x4}, {0x9, 0x8000, 0x4, 0x4fcd}, {0x800, 0x8000, 0xe3f, 0x7}, {0x9, 0x9, 0x100000001, 0x10000}, {0x2b9e2c41, 0xbf2a, 0x100000000, 0x8000}, {0x1, 0x6, 0x1, 0x100}, {0x6, 0x40, 0x100, 0x2}, {0x527, 0x9, 0x1, 0x2}]}, 0x10) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0xffffff94, 0x3}]}}, @icmp=@timestamp_reply}}}}, 0x0) 17:48:30 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) listen(r0, 0x40) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000), 0x21d) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x4000) signalfd4(r0, &(0x7f0000000140)={0x5}, 0x8, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x4, {0xa, 0x4e22, 0x7f, @empty, 0x2}, r2}}, 0x369) 17:48:30 executing program 1: r0 = socket$inet(0x2, 0x6, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ed827ce88000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bb9492d3ffa1c637e94aff7da32c6ba5"]}, 0x14d) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x20000) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) 17:48:30 executing program 0: setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x0, @remote, 0x0, 0x0, '\\blcu\x8a\r\x02\xf4\xde\x19\xc7\x13<\xb2\xa3', 0x0, 0x3}, 0x2c) 17:48:30 executing program 0: capset(&(0x7f00000001c0)={0x2000020080522}, &(0x7f0000000b80)) pivot_root(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) 17:48:30 executing program 2: mknod(&(0x7f000086c000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, &(0x7f00000000c0)='\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000003c0), 0x4) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x140, r2, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fff}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x12, 0x10}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x75}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}]}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2b}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x71}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x79}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2b}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'hsr0\x00'}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x200}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x140}, 0x1, 0x0, 0x0, 0x20008000}, 0x4004010) 17:48:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2f0000001d0081fd6d0000338f00000002dd0700060000001f5f03c9080001003898efab", 0x24}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000004640)=[{{}, 0x8}, {{&(0x7f0000000040)=@x25={0x9, @remote}, 0x80, &(0x7f0000000300)=[{&(0x7f00000001c0)=""/132, 0x84}, {&(0x7f0000000280)=""/74, 0x4a}], 0x2, &(0x7f0000000340)=""/130, 0x82}, 0x3f}, {{&(0x7f0000000400)=@ax25={{0x3, @null}, [@bcast, @default, @default, @netrom, @remote, @null, @bcast, @netrom]}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000480)=""/48, 0x30}, {&(0x7f00000004c0)=""/107, 0x6b}, {&(0x7f0000000540)=""/62, 0x3e}, {&(0x7f0000000580)=""/248, 0xf8}], 0x4}}, {{&(0x7f00000006c0)=@nfc_llcp, 0x80, &(0x7f0000001880)=[{&(0x7f0000000740)=""/56, 0x38}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/198, 0xc6}], 0x3, &(0x7f00000018c0)=""/237, 0xed}, 0xfffffffffffffff7}, {{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f00000019c0)=""/187, 0xbb}, {&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/96, 0x60}, {&(0x7f0000002b00)=""/75, 0x4b}], 0x4, &(0x7f0000002bc0)=""/4096, 0x1000}, 0x5}, {{0x0, 0x0, &(0x7f0000003d40)=[{&(0x7f0000003bc0)=""/60, 0x3c}, {&(0x7f0000003c00)=""/13, 0xd}, {&(0x7f0000003c40)}, {&(0x7f0000003c80)=""/155, 0x9b}], 0x4, &(0x7f0000003d80)=""/145, 0x91}, 0x1}, {{&(0x7f0000003e40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000004380)=[{&(0x7f0000003ec0)=""/157, 0x9d}, {&(0x7f0000003f80)=""/176, 0xb0}, {&(0x7f0000004040)=""/128, 0x80}, {&(0x7f00000040c0)=""/227, 0xe3}, {&(0x7f00000041c0)=""/175, 0xaf}, {&(0x7f0000004280)=""/18, 0x12}, {&(0x7f00000042c0)=""/174, 0xae}], 0x7, &(0x7f0000004400)=""/104, 0x68}, 0x3}, {{&(0x7f0000004480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000004540)=[{&(0x7f0000004500)=""/62, 0x3e}], 0x1, &(0x7f0000004580)=""/172, 0xac}, 0x1f43f4a6}], 0x8, 0x40, &(0x7f0000004840)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f0000004900)={@remote, 0x0}, &(0x7f0000004940)=0x14) sendto$packet(r1, &(0x7f0000004880)="478a7d0a5cfef53a9535dc58b3e85ae4ba97cc39b21063e9820e91a1e03c877fe75a248fc0ef12b6bbf3de2eafc54e01d0331be3d22793f7a238d60cfdc9615e882d06cbaecfa11ae8afe10e89b479079933e545f66b3c6cff26ee51e9557b070048c6521e1d1d41ef401068a846ce3773a006f041eec1e779229f4edb0d4f", 0x7f, 0x8040, &(0x7f0000004980)={0x11, 0xf, r2, 0x1, 0x2, 0x6, @random="023e550fa1ea"}, 0x14) r3 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x4924bd5, 0x0) 17:48:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x204100, 0x0) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f00000000c0)={0x9, 0x19, 0xd, 0xe, 0x3, 0xa9, 0x1, 0x91}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x287, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x30, 0x0, 0x0, 0x117) lsetxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00fb16cbaaca5ad8c89eb1d2852c0000aa067b4fc9373ab7e208f330ea0d8eb1b091a56b252860f4428ad16ee36b0560dec708b42dcd81d5b07cdd892c44a2b7a5cc81cf445d8a09d5721340fbd600d8d49cb93f4dbac4b344a5de0a48ce22c3c9bc2d25517ccfd70e3e8104f2"], 0x1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:48:30 executing program 0: r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x0, 0x20}) mq_timedreceive(r0, &(0x7f0000000100)=""/50, 0x32, 0xfffffffffffffffd, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 17:48:30 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000440)={0x5, 0x4, 0x4, 0x89, &(0x7f0000000240)=""/137, 0x50, &(0x7f0000000300)=""/80, 0xa5, &(0x7f0000000380)=""/165}) r1 = timerfd_create(0x7, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000480)={0x0, 0x401, 0x0, 0x3, 0x9a}, &(0x7f00000004c0)=0x18) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000500)=@sack_info={r2, 0x0, 0x800}, 0xc) timerfd_settime(r1, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x5}}, &(0x7f0000002000)) timerfd_gettime(r1, &(0x7f0000000080)) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x2) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, r4, 0x118, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}]}, 0x54}, 0x1, 0x0, 0x0, 0x800}, 0x40) fcntl$setlease(r0, 0x400, 0x3) 17:48:30 executing program 1: r0 = dup(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x54, r1, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x28, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd5}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0xc0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000004c0)={0x0, 0x9d, "ac06ec8dc7cdc93c1a73fc4511a3c0db34513cab3464549a6dce6f6be7d9fefadc920a0745ab93e107b1e566b3cf97d837c50663c961ffa29ad856c3cf157d803f64d09b92e0b795a2eb9ca9899c0337168dc8ae3594f38e20adbfd9ca2f592a43b1f377638b3a2751e88afddf74f9889285bb08c925d4d272ef05f9810e89d85d485f98986f70073d8ea9e90c05a2e5f26f71e54edd46e0c3c1463219"}, &(0x7f0000000580)=0xa5) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000005c0)={r5, 0x0, 0x1f}, 0x8) open(&(0x7f0000000000)='./file0\x00', 0x20100, 0x5) r6 = gettid() sendmsg$nl_route(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000010000100000000000000000000000000ce02679d323948629b9fbd21c8ff07355e2af43eb5f9ce1ebe151b8610021e662da2dffaa35c28854f66d0a9de34a704175113a50bc46b289174cd4449645c", @ANYRES32=r3, @ANYBLOB="000000000000000008001300", @ANYRES32=r6], 0x28}}, 0x0) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x600}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0xbc, r7, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'hwsim0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x23}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7f}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100000000}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x8810}, 0x4004) 17:48:31 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f000000ffd8)={'vcan0\x00', 0x0}) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000140)={0x80000000, 0x1a}) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000100)={r0, 0x0, 0x2, 0x7, 0x6}) r3 = socket$can_raw(0x1d, 0x3, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x1, r4, 0x1c, 0x0, @in={0x2, 0x4e22, @empty}}}, 0xa0) bind$can_raw(r3, &(0x7f0000010ff0), 0x10) setsockopt$sock_int(r3, 0x1, 0x1d, &(0x7f0000000040)=0xfffffffffffffffa, 0x4) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000007ff0)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f000000afb8)={0x1, 0x3, 0x0, {0x0, 0x2710}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}}, 0x0) recvmmsg(r3, &(0x7f0000001200)=[{{&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f00000011c0)}}], 0x1, 0x0, 0x0) [ 339.917208] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 17:48:31 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @remote, 0x0, 0x0, 'lblcr\x00'}, 0x2c) r0 = socket$inet(0x10, 0x2000000000000003, 0x0) ioctl$sock_ifreq(r0, 0x489f1, &(0x7f0000000140)={'bond0\x00', @ifru_settings={0x101, 0x3, @fr_pvc_info=&(0x7f0000000100)={0x1, 'vxcan1\x00'}}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000080)='ip6tnl0\x00\x00\x00\x00\x00r\xed\x02\x00') [ 339.997737] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 17:48:31 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r4, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r5, 0x0, r6, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r7, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r4, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) writev(r0, &(0x7f00000006c0)=[{&(0x7f00000005c0)="8f07d745f489095dd3c58ea7dd09b53fec363da68538acf2163bcd34e115aa21e581e1c665fb5e1dc7d59075271ce3385bc62ea88d86772cdd944a58e02d4f23e967777da9b2854be74098fff0a4833c7b0fb682be381de3959d08b6f7123e2a0d272868e497bfb72ca825aecd17ba6b7ee781003d3100a4deb39e1d560d4d817482e127004ab824063f73ba2b7697e1427987dc3bce62db365c1c84cea0519fdc108790bc362f77afdf02620cac15d2c59cc5c8b7ab12292dc01537c01db190f1980000f06ba38d51fe4a203d374effcf2fc629378e3f3d5c01fe240d3fd8d6a3588f9c1be70108203f4e461f8466e7ec", 0xf1}], 0x1) 17:48:31 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400001, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000040)=0x401, 0x4) accept4(r0, 0x0, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000018) 17:48:31 executing program 1: socket$kcm(0x10, 0x4000000002, 0x10) 17:48:31 executing program 1: unshare(0x2000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x4100, 0x0) sendto$inet(r2, &(0x7f0000000180)="dee8c6f875cc8797cdf3a90e1531b0de3ff8d23825e70d1cfcb3f10bd02f1d713b931cfda0e39961138e91fc63e7bc4a43e66a1b8165e39c1757055edb85b9bdc03c4f81dfff891c28fcee6aec2385dd585fa4c1856ecd615378a8d0bb634df0366ead00774bf9be6284ecc911688541129ab40fb0570c9ad9db8b0aa134bbfd04a3f664dd94fea96baabc0584f78b963b3a04574d73578f54ec8b8f554bd795cbfcceedeac7a48699c3f22e5eebcabe06d6a637e5468740ba36877a4f5624c3dff902d2091d9d9acc45d6b19597e95a780333b5ba1ebc3247f7bcc886e46b67ff4bcec81e12e2514da7ed8f976bc94a14d8bb7eea78e95b", 0xf8, 0x40, &(0x7f0000000100)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x202, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000040)) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000001}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x30, r4, 0x402, 0x401, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x2, 0x4, 0x7, 0x4}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x1) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x40, 0x0) 17:48:31 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r4, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r5, 0x0, r6, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r7, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r4, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) writev(r0, &(0x7f00000006c0)=[{&(0x7f00000005c0)="8f07d745f489095dd3c58ea7dd09b53fec363da68538acf2163bcd34e115aa21e581e1c665fb5e1dc7d59075271ce3385bc62ea88d86772cdd944a58e02d4f23e967777da9b2854be74098fff0a4833c7b0fb682be381de3959d08b6f7123e2a0d272868e497bfb72ca825aecd17ba6b7ee781003d3100a4deb39e1d560d4d817482e127004ab824063f73ba2b7697e1427987dc3bce62db365c1c84cea0519fdc108790bc362f77afdf02620cac15d2c59cc5c8b7ab12292dc01537c01db190f1980000f06ba38d51fe4a203d374effcf2fc629378e3f3d5c01fe240d3fd8d6a3588f9c1be70108203f4e461f8466e7ec", 0xf1}], 0x1) 17:48:31 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400001, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000040)=0x401, 0x4) accept4(r0, 0x0, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000018) [ 340.515053] QAT: Invalid ioctl [ 340.531982] QAT: Invalid ioctl 17:48:31 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r4, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r5, 0x0, r6, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r7, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r4, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) writev(r0, &(0x7f00000006c0)=[{&(0x7f00000005c0)="8f07d745f489095dd3c58ea7dd09b53fec363da68538acf2163bcd34e115aa21e581e1c665fb5e1dc7d59075271ce3385bc62ea88d86772cdd944a58e02d4f23e967777da9b2854be74098fff0a4833c7b0fb682be381de3959d08b6f7123e2a0d272868e497bfb72ca825aecd17ba6b7ee781003d3100a4deb39e1d560d4d817482e127004ab824063f73ba2b7697e1427987dc3bce62db365c1c84cea0519fdc108790bc362f77afdf02620cac15d2c59cc5c8b7ab12292dc01537c01db190f1980000f06ba38d51fe4a203d374effcf2fc629378e3f3d5c01fe240d3fd8d6a3588f9c1be70108203f4e461f8466e7ec", 0xf1}], 0x1) 17:48:31 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000380)={0x10000000}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400, 0x19) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f0000000040)=0xfffffffffffffffb) 17:48:31 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="23ff76d7872af876fffa8b3682f935aea18d90de6ba74858709f86016a6c383961eaa619d789095707471e83df1b41516a0fcc3a7180", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0x14) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e24, @rand_addr=0x6}}, 0x1f, 0x2}, &(0x7f0000000240)=0x90) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast1, @empty}, 0x8) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='.\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, 0x0) [ 340.760636] [drm:drm_calc_timestamping_constants] *ERROR* crtc 31: Can't calculate constants, dotclock = 0! 17:48:32 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r4, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r5, 0x0, r6, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r7, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r4, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) writev(r0, &(0x7f00000006c0)=[{&(0x7f00000005c0)="8f07d745f489095dd3c58ea7dd09b53fec363da68538acf2163bcd34e115aa21e581e1c665fb5e1dc7d59075271ce3385bc62ea88d86772cdd944a58e02d4f23e967777da9b2854be74098fff0a4833c7b0fb682be381de3959d08b6f7123e2a0d272868e497bfb72ca825aecd17ba6b7ee781003d3100a4deb39e1d560d4d817482e127004ab824063f73ba2b7697e1427987dc3bce62db365c1c84cea0519fdc108790bc362f77afdf02620cac15d2c59cc5c8b7ab12292dc01537c01db190f1980000f06ba38d51fe4a203d374effcf2fc629378e3f3d5c01fe240d3fd8d6a3588f9c1be70108203f4e461f8466e7ec", 0xf1}], 0x1) 17:48:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x402, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f00000001c0)=[@in={0x2, 0x4e23, @rand_addr=0x9}, @in6={0xa, 0x4e23, 0x5, @loopback, 0x81}], 0x2c) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) 17:48:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000280), 0xfffffffffffffff0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xff, &(0x7f0000000180)={&(0x7f0000000380)=@polexpire={0xc0, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast2, @in6=@local}, {}, {}, 0x0, 0x0, 0x8}}}, 0xc0}, 0x8}, 0xffffffffffffffff) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x12840, 0x0) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000200)=""/125) ioctl$IMCLEAR_L2(r2, 0x80044946, &(0x7f00000000c0)=0xffffffffffffffff) 17:48:32 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 17:48:32 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1f, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x3ff, 0x4, 0x7f, 0x3, 0x7, 0x400000000, 0x1}, 0x1c) perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000000000000400000000000c00"], &(0x7f00000000c0)=0x1a) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r1, 0x20}, &(0x7f0000000140)=0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000008c0)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000ff8000/0x1000)=nil, 0x0}, 0x68) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/attr/current\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000001c0)={0x30, 0x5, 0x0, {0x0, 0x2, 0x6}}, 0x30) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) 17:48:32 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:32 executing program 2: setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'tWRm0\x00\x10\x00\x00\x00\x00\x03\x00@\x00', 0x1}, 0x18) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$packet(r0, 0x0, &(0x7f0000000380), 0x80000) r1 = accept$inet(r0, &(0x7f0000000200)={0x2, 0x0, @local}, &(0x7f0000000080)=0x8c) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e24, 0x4, @rand_addr="ba07580e3952d994a10a6051e963c78a", 0x1000}}, 0x0, 0x8, 0x0, "dd98d46dcab9f999375c40b932a7e87f439d9f670170c75ac86c04795c4b3aa1ecef12809390d8acda8e16fa0b5425a1d5802ca506f6e2c011e834d43285509b4b7f8c583e88cacc7b0949637dfc4eb5"}, 0xd8) fallocate(r1, 0x52, 0x6, 0x3d1) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @broadcast}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000340)={@remote, 0x73, r3}) ioctl$SG_EMULATED_HOST(r2, 0xc0347c03, &(0x7f0000000000)) 17:48:32 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) 17:48:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_submit(r1, 0x200000000000001d, &(0x7f00000002c0)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x5, r0, 0x0}]) 17:48:32 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getnetconf={0x14, 0x52, 0x200, 0x70bd2a, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x2004c841}, 0x40000) ioctl$RTC_UIE_ON(r1, 0x7003) getsockopt$inet_int(r0, 0x10d, 0xc, &(0x7f0000000140), &(0x7f0000000180)=0x4) write$UHID_INPUT2(r1, &(0x7f00000001c0)={0xc, 0x24, "3d40be30e379fa45ab09e92125f4ce9345d4843eca950dc9f294d0657c650ea7a8bdf09b"}, 0x2a) 17:48:33 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) 17:48:33 executing program 2: r0 = openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000100)='io.weight\x00', 0x2, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x3, 0x140) ppoll(&(0x7f0000000200)=[{r0, 0x8080}, {r1, 0x1000}, {r2, 0x100}, {r3, 0x4}], 0x4, &(0x7f0000000240), &(0x7f0000000280), 0x8) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r4, 0x86}], 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)={0x2}, 0x8) 17:48:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x3b1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x30, 0x0, 0x0, 0xfffffffffffffee3) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r3, 0x4010641a, &(0x7f0000000080)={0x7, &(0x7f0000000000)=[0x100000000, 0x1, 0x0, 0x3, 0x2b, 0x0, 0x2]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, &(0x7f00000000c0)) 17:48:33 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) 17:48:33 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000240)) r0 = socket$netlink(0x10, 0x3, 0xa) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000040)) sysfs$1(0x1, &(0x7f0000007e40)='veth0_to_bridge\x00b\xa1\xfd\xde\x90\xd9\x02\x94\xffj\xf7\xb8\x8c>\xa0\xda@\xd2H\x1f\xfd\xf4V\x05.\x1f\xd10b\xe9xd\x84a\x1e\xc7\r\xe9\"\xfa\x91\xc5l`-\x16\x86\x05\bg\xf6z\x04\xd3\x94\xe6\x18\xe1\xb6\xa2\xf1\xb6Vjm\xadh\x8a+\xd91\xc6\xca\nt\xbck\x9c\xc3/\xc9\x19JI\xec\x87\x15TO\xb9\x18\x88|N\x80\xb6\xec\x14\xe9F\xba\xf6\xe4\t\x92Ay\"\x11\x05\xdb\xec\xbc\xccN\xd1\xf6\xb5\xb9\xa3\x81\x95\x99\xd1br\xd9zL\x03\x85\xa2*\xeb\b\x02\x1b\xf7\xcf\x1bG\xa9\xfb\xad\x81\xd3\x94\f\x80\x97\xe4\n5\v\xf8v\xe9\xbf\x02=\x0f\x144o\xaed;\xd45:\xcb9\xeeP\xf8Q') r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000059c0)) bind$unix(r1, &(0x7f0000007ac0)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000005740), &(0x7f00000056c0)=0x10) socketpair(0xd, 0x5, 0xfffffffffffffeff, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xbf, 0x9c}) write$P9_RUNLINKAT(r1, &(0x7f00000004c0)={0x7, 0x4d, 0x1}, 0x7) clock_gettime(0x7ffff, &(0x7f0000007c00)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80000, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000058c0)={0x0, r2, 0x0, 0x5, &(0x7f0000005840)='gre0\x00'}, 0x30) ptrace$getregs(0xffffffffffffffff, r5, 0x9887, &(0x7f0000005900)=""/148) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) recvmmsg(r3, &(0x7f00000055c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}], 0x1, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) perf_event_open(0x0, r5, 0x7, r1, 0x8) recvmmsg(0xffffffffffffffff, &(0x7f0000001440)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000005a00)=""/4096, 0x1000}], 0x1, &(0x7f0000000fc0)=""/38, 0x26}, 0x8}], 0x1, 0x0, &(0x7f0000001500)={0x77359400}) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{&(0x7f0000000ac0)=@alg, 0x80, &(0x7f0000000e40)=[{&(0x7f0000003540)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/71, 0x47}, {&(0x7f0000004540)=""/4096, 0x1000}, {&(0x7f0000000c40)=""/30, 0x1d}, {&(0x7f0000006a00)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/83, 0x53}, {&(0x7f0000000d00)=""/108, 0x6c}], 0x386}}], 0x1, 0x0, &(0x7f0000000ec0)={0x77359400}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000942000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r6, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r6, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmmsg(r6, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x9c, &(0x7f0000000d80)}}], 0x6d7, 0x40400d4) openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x1, 0x0) 17:48:33 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 342.666081] capability: warning: `syz-executor.2' uses deprecated v2 capabilities in a way that may be insecure [ 342.765178] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:48:33 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1d, &(0x7f0000000200)={@dev, 0x0}, &(0x7f0000000240)=0x14) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @local, @loopback}, &(0x7f0000000380)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000440)=0xc) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="200b00002400000326bd7000fcdbdf25703b0000ac000700ac1414bb0000000000000000000000007f0000010000000000000000000000004e24ffff4e2200000a00208037000000", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="6700000000000000070000000000000002000000000000003f000000000000000010000000000000070000000000000000000000000000008206000000000000020000000000000000020000000000000800000000000000ffffffff0000000081000000b66b6e00010101030000000014000d00e00000020000000000000000000000000c000f000700000000000000e400060000000000000000000000000000000000e00000020000000000000000000000004e2300004e21ffff0200202073000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x320}}, 0x20000000) r5 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x105000, 0x0) write$FUSE_NOTIFY_RETRIEVE(r6, 0x0, 0xfffffe10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) truncate(0x0, 0x1) ioctl$EVIOCGMASK(r5, 0x80104592, &(0x7f0000000040)={0x1f, 0x12, &(0x7f0000000000)="c29cb0d174afdd16c7c9b336d79278b9bb58"}) syz_emit_ethernet(0x140c117bc9625718, 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, 0x0) fsync(0xffffffffffffffff) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r7, 0x891b, 0x0) bind$inet(r7, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_int(r7, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) prctl$PR_GET_SECCOMP(0x15) stat(0x0, 0x0) lsetxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r7, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) stat(0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r8) prctl$PR_GET_TIMERSLACK(0x1e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, 0x0) sendto$inet(r7, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r9, r7, 0x80000) 17:48:33 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 343.035511] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:48:34 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000240)) r0 = socket$netlink(0x10, 0x3, 0xa) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000040)) sysfs$1(0x1, &(0x7f0000007e40)='veth0_to_bridge\x00b\xa1\xfd\xde\x90\xd9\x02\x94\xffj\xf7\xb8\x8c>\xa0\xda@\xd2H\x1f\xfd\xf4V\x05.\x1f\xd10b\xe9xd\x84a\x1e\xc7\r\xe9\"\xfa\x91\xc5l`-\x16\x86\x05\bg\xf6z\x04\xd3\x94\xe6\x18\xe1\xb6\xa2\xf1\xb6Vjm\xadh\x8a+\xd91\xc6\xca\nt\xbck\x9c\xc3/\xc9\x19JI\xec\x87\x15TO\xb9\x18\x88|N\x80\xb6\xec\x14\xe9F\xba\xf6\xe4\t\x92Ay\"\x11\x05\xdb\xec\xbc\xccN\xd1\xf6\xb5\xb9\xa3\x81\x95\x99\xd1br\xd9zL\x03\x85\xa2*\xeb\b\x02\x1b\xf7\xcf\x1bG\xa9\xfb\xad\x81\xd3\x94\f\x80\x97\xe4\n5\v\xf8v\xe9\xbf\x02=\x0f\x144o\xaed;\xd45:\xcb9\xeeP\xf8Q') r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000059c0)) bind$unix(r1, &(0x7f0000007ac0)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000005740), &(0x7f00000056c0)=0x10) socketpair(0xd, 0x5, 0xfffffffffffffeff, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000100)=@generic={0x0, 0xbf, 0x9c}) write$P9_RUNLINKAT(r1, &(0x7f00000004c0)={0x7, 0x4d, 0x1}, 0x7) clock_gettime(0x7ffff, &(0x7f0000007c00)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80000, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000058c0)={0x0, r2, 0x0, 0x5, &(0x7f0000005840)='gre0\x00'}, 0x30) ptrace$getregs(0xffffffffffffffff, r5, 0x9887, &(0x7f0000005900)=""/148) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) recvmmsg(r3, &(0x7f00000055c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}], 0x1, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) perf_event_open(0x0, r5, 0x7, r1, 0x8) recvmmsg(0xffffffffffffffff, &(0x7f0000001440)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000005a00)=""/4096, 0x1000}], 0x1, &(0x7f0000000fc0)=""/38, 0x26}, 0x8}], 0x1, 0x0, &(0x7f0000001500)={0x77359400}) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{&(0x7f0000000ac0)=@alg, 0x80, &(0x7f0000000e40)=[{&(0x7f0000003540)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/71, 0x47}, {&(0x7f0000004540)=""/4096, 0x1000}, {&(0x7f0000000c40)=""/30, 0x1d}, {&(0x7f0000006a00)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/83, 0x53}, {&(0x7f0000000d00)=""/108, 0x6c}], 0x386}}], 0x1, 0x0, &(0x7f0000000ec0)={0x77359400}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000942000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r6, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r6, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmmsg(r6, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x9c, &(0x7f0000000d80)}}], 0x6d7, 0x40400d4) openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x1, 0x0) 17:48:34 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x12\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r2, &(0x7f0000000000), 0x5) fcntl$addseals(r2, 0x409, 0x8) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3800000000000000, 0x1) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x80}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000c80)={0x0, 0x1000, "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"}, &(0x7f0000000440)=0x1008) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000480)={0x0, 0x3}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e23, @empty}}, 0xfffffffffffffff7, 0x1, 0x800, 0x7fff, 0x5}, &(0x7f00000005c0)=0x98) sendmsg$inet_sctp(r3, &(0x7f00000006c0)={&(0x7f00000000c0)=@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000280)="db99f26f58e49c4d71643e77aa9117ec1564e4f651445477f7f0533bfdf50321fa7e6ad4307b0c3f2c04e611d6307ef0f2e454d46d962f17864cc43bc59ed26a3f3a70d352180ebf1f43e64eed37d24c8ad47e7e4faa3e02b343572184d555c3f2b4aaa4bc1217a83270179291a7fc63ab7e8266445a530332fbe96416d115f9f263e6db218e092466ef1387fc6b18584d10b6219828c374947ebfca6d44cd", 0x9f}, {&(0x7f0000000340)="58c68d856172e37ad95b74b67aecccbc7370165c375883b7c1bf32f8957e524d5645ec13f33565780a66fdce9c6f224beb9ba50bce2ab81287c4fb63e21f9cdfc86dd178910e79c380332efccf1ce036a837065bde11483d28efa3b9aaa1417e0fda798259f68cf939009f83f196205271f87c46897d15cda3eb87e3f4a8c433299f75e078f5304543d99c1247d94b60e5b4da0af41e21f3db71a8e05acd17a045fe50df6873be4cebfc5be927acdc2026a580711e0014808c732e259b5b73217b76a5d60f815a4fac59b36739bcf792829214df75f2e092d13bfff2e34d7d13c97372b7a12b5e904364dc253c79", 0xee}], 0x2, &(0x7f0000000600)=[@sndrcv={0x30, 0x84, 0x1, {0x4, 0xfffffffffffffffa, 0x8, 0x5, 0x9, 0x5, 0x1, 0x40, r4}}, @sndinfo={0x20, 0x84, 0x2, {0x7, 0x8008, 0x0, 0x1000, r5}}, @sndinfo={0x20, 0x84, 0x2, {0x7, 0x1, 0xb9, 0x3, r6}}, @sndinfo={0x20, 0x84, 0x2, {0x4, 0x20c, 0x3, 0x1, r7}}], 0x90, 0x20000004}, 0x40) fsetxattr$system_posix_acl(r2, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000240)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) dup3(r1, r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 17:48:34 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x3, 0x40001) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000200)=@generic={0x2, 0x2, 0x6}) socketpair(0xa, 0x3, 0x20, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$packet_buf(r1, 0x107, 0x6, &(0x7f00000000c0)=""/90, &(0x7f0000000140)=0x5a) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@random={'security.', '\x00'}) 17:48:34 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:34 executing program 3: syslog(0x1, &(0x7f0000000000)=""/10, 0xa) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000001c0)=0x3, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000200)=0x10000, 0x4) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000240)=0x56) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x200000, 0x81) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f00000002c0)={0x3, 0x4, 0x401, 0xd0991a2a3e49c69}) r3 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)="31acd1c6648a5f198f5b5e8f78ec3c7d4ee538cb3d30e47d0f406d071a189f1a2d601ead6f9b3ba2f827f980fd9545b779b05ed657e8cb4bbec0bead86306fc4", 0x40, r3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x100, 0x1) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000004c0)={'gre0\x00', &(0x7f0000000480)=@ethtool_channels={0x3d, 0x100000000, 0x2a42, 0x3, 0x868, 0x3, 0x0, 0x29b320e, 0x200}}) read$eventfd(r4, &(0x7f0000000500), 0x8) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000540)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000600)={r5, r1, r7}, 0xc) ioctl$BLKRRPART(r4, 0x125f, 0x0) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000640)=0x91) fchdir(r2) prctl$PR_SET_ENDIAN(0x14, 0x2) iopl(0x6) lsetxattr$trusted_overlay_origin(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='trusted.overlay.origin\x00', &(0x7f0000000700)='y\x00', 0x2, 0x1) ioctl$TIOCSLCKTRMIOS(r4, 0x5457, &(0x7f0000000740)) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000780)={0x2, r2}) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000007c0)={0x9}, 0x4) getsockname$inet6(r0, &(0x7f0000000800)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000840)=0x1c) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0)={'syz', 0x0}, 0x0, 0x0, r3) write$P9_RSTATu(r2, &(0x7f0000000900)={0x6d, 0x7d, 0x1, {{0x0, 0x53, 0x0, 0x100000001, {0x0, 0x3, 0x7}, 0x40000000, 0x1000, 0x8, 0xb46, 0x8, 'keyring\x00', 0xb, '%#selfwlan1', 0x0, '', 0xd, 'vboxnet0)self'}, 0x5, 'user\x00', r6, r7, r6}}, 0x6d) mq_open(&(0x7f0000000980)=']\x00', 0xc2, 0x20, &(0x7f00000009c0)={0x1, 0x3, 0x100000001, 0x40, 0x8, 0x4, 0xfffffffffffffffa, 0x3}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000a00)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x2, 0xb0, @loopback, 0x8}, @in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e22, @rand_addr=0x3}, @in6={0xa, 0x4e20, 0x3ff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}], 0xa8) 17:48:34 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:34 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=@newsa={0x13c, 0x10, 0x9, 0x0, 0x0, {{@in6=@mcast2, @in=@initdev}, {@in=@remote, 0x0, 0x33}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'tgr160\x00'}}}]}, 0x13c}}, 0x0) 17:48:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x3, 0x40001) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000200)=@generic={0x2, 0x2, 0x6}) socketpair(0xa, 0x3, 0x20, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$packet_buf(r1, 0x107, 0x6, &(0x7f00000000c0)=""/90, &(0x7f0000000140)=0x5a) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@random={'security.', '\x00'}) 17:48:35 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:35 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.SMACK64IPIN\x00', &(0x7f00000001c0)='system\x00', 0x7, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000ef010000000000000004000000000000001000000000000000200000000000ba00"], 0x24, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400000) writev(r0, &(0x7f0000000200), 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000200)) listxattr(&(0x7f0000000280)='./file0/../file0\x00', &(0x7f0000000080)=""/160, 0x28d) lsetxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0/../file0\x00', &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x2) 17:48:35 executing program 2: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0xc802002000000000, 0x0) msgsnd(r0, &(0x7f0000000000)={0x1}, 0x8, 0x800) 17:48:35 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:35 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:35 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'hsr0\x00', 0x400}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 17:48:36 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000140), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") recvmsg(r0, &(0x7f00000025c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000002500)=[{&(0x7f0000000180)=""/147, 0x93}, {&(0x7f0000000240)=""/66, 0x42}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/33, 0x21}, {&(0x7f0000001300)=""/197, 0xc5}, {&(0x7f0000001400)=""/116, 0x74}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/87, 0x57}], 0x8, &(0x7f0000002580)=""/9, 0x9}, 0x10100) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000026c0)=[@in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e20, 0xe52, @mcast1, 0x8}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e23, 0x3, @dev={0xfe, 0x80, [], 0x1b}, 0x2}, @in6={0xa, 0x4e22, 0x100000001, @remote, 0x609}, @in={0x2, 0x4e22, @remote}], 0xffffff85) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000002680)=0xffffffffffffffff, 0x4) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000100), 0x10) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40000, 0x0) 17:48:36 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 345.355640] IPVS: ftp: loaded support on port[0] = 21 [ 345.567710] chnl_net:caif_netlink_parms(): no params data found [ 345.657660] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.664362] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.672975] device bridge_slave_0 entered promiscuous mode [ 345.683834] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.690526] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.698953] device bridge_slave_1 entered promiscuous mode [ 345.740198] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 345.755047] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 345.793889] team0: Port device team_slave_0 added [ 345.807300] team0: Port device team_slave_1 added [ 345.903606] device hsr_slave_0 entered promiscuous mode [ 345.937923] device hsr_slave_1 entered promiscuous mode [ 346.067552] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.074115] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.081384] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.087982] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.188858] 8021q: adding VLAN 0 to HW filter on device bond0 [ 346.211360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 346.222233] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.231792] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.246258] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 346.267521] 8021q: adding VLAN 0 to HW filter on device team0 [ 346.289232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 346.297480] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.303976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.362257] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 346.370649] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.377229] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.387281] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 346.396492] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 346.405357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 346.423163] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 346.435023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 346.468480] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 346.478559] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 346.486763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 17:48:37 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x9, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x5, 0x10000) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000080)={0x0, "8aafb56a2b3ee696e19fe4164d07b93751b21b53b7fe5dfb9afdda91bdee4270"}) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000000)={0x80, "690fb809555bd4d6a33206d4ff9ced0b727f6ac9bd5eacce77d66fb599cf823c", 0x1, 0x1}) 17:48:37 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x10000000000003, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0x2}) dup2(r2, r1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) 17:48:37 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x1, 0x3f, 0x1000, 0x2, 0x0, 0x81, 0x10000, 0x1, 0x1, 0x8, 0x3, 0x7ff, 0x80000000, 0x14000000000, 0x1, 0x8000, 0xf8e1, 0x5, 0x4, 0x4, 0x78b8, 0xcea, 0x6, 0x3, 0x10000, 0xffff, 0x43c8480e, 0x8, 0x1, 0xffffffff, 0xffffffffffffffff, 0x10000, 0x81, 0xffff, 0x6254, 0xe30, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000200), 0x1}, 0x11000, 0x7, 0x8fae, 0xf, 0xfffffffffffffff8, 0x3, 0x13}, 0x0, 0x8, r0, 0x8) r2 = creat(&(0x7f00000002c0)='./file0\x00', 0x100) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, 0x0, &(0x7f0000000040)) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x1, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="8e8ef562dd6ee7a0d76e8f19be03fecce998586c1d79c415475ccb93f26f03807f253431c95d2c794787c773753f4edf95bc0b82809822123205c40ea311fe8fcd24f7fd14941ac1b140", @ANYRES16=r4, @ANYBLOB="000829bd7000ffdbdf2514000000940005004400020008000200000200000800010015000000080003000500000008000300050000000800030007000000080003000300000008000400050000000800040048c6ca02080001007564700044000200080003001d010000080001001b0000000800040002000000080001001e00000008000400400000000800030020000000080004000844ffff0800030002000000240001000800030001000000100001007564703a73797a31000000000800030001000000"], 0xcc}, 0x1, 0x0, 0x0, 0x4040004}, 0x4) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x7fff}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000100)=r5, 0x4) 17:48:37 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) mq_unlink(&(0x7f0000000080)='e\x17@\vM') fcntl$setlease(r2, 0x400, 0x1) exit(0x0) close(r2) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) getgroups(0x4, &(0x7f0000000180)=[0x0, 0xffffffffffffffff, 0xee00, 0xee01]) r6 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) write$FUSE_DIRENTPLUS(r3, &(0x7f0000000240)={0x150, 0x0, 0x3, [{{0x6, 0x1, 0x6, 0xfffffffffffffffa, 0x7fff, 0x9, {0x0, 0x7f, 0x1, 0x8000, 0x7, 0x7266, 0x7, 0xc5e, 0x80000000, 0xfffffffffffffffc, 0x9, r4, r5, 0xfffffffffffffff8, 0xee}}, {0x5, 0x9, 0x5, 0x4, 'eth0\x00'}}, {{0x0, 0x1, 0x0, 0x5, 0x5, 0x3, {0x2, 0x80000001, 0x2, 0xffff, 0x4, 0x4, 0x0, 0x2, 0x1, 0x6, 0x7ff, r6, r7, 0xfff, 0x4ffa}}, {0x3, 0x49c, 0x5, 0x1, 'eth0\x00'}}]}, 0x150) 17:48:37 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x1f) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000080)={0x0, 0x4, [@remote, @dev={[], 0x19}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @random="44ce257e4470"]}) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130009006900000000000000ab0080480700000046000107a277001419000a0010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 17:48:38 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x81, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000040)={0x7, @raw_data="5ec7df665461a7c4e4e715bbe597a144bcc191540d8ed138b1719ab6ff59f8d8f1bacc78703153d797725479bb4edb3776cb90ee9dcdad5ef3c09c67daa6523828a4caebdc985f9a858474790c57014cac37abd113d4032c246f4a6c819cb0108a4df5fbc9529f331d709027e512dd8751780300e285c047841475880843ae4ba1a51327f684ccd593834066902e36ba5522450ea07a3f35048d2a646258fa88b4e2eea1e76daebe5b4fcc4d5d04766130ff7d5a8f9e8b263637b7b5eb1296cf8f8c1e2df35c4070"}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x0, 0x0, 0xc30, 0x2, 0x10000, 0x8}, 0x8, 0x1, 0x84a, 0x401, 0x7, "a89863fd7f191f13326b9a016feb50f80c0030321380029af383a5ca6dee59df293c08b6b1e2e53311615d613198939428375fd751b57eaa9840c9d8e654920faec3956349497c621ace9c8bbce986b0a93045b00e4b702ed53a4c94f2c9fabb14862450ea280d2fb1e2999391c0cb6aa8a20bb6de5bc955323f2f0a574d1179"}) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) [ 347.108066] encrypted_key: insufficient parameters specified [ 347.125357] encrypted_key: insufficient parameters specified 17:48:38 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @local, 0x4}, 0xffffffffffffff11) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003500)=[{&(0x7f0000000380)=""/170, 0xaa}], 0x1}, 0x0) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) ioctl$FICLONE(r0, 0x40049409, r0) 17:48:38 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900), &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x8002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@local, 0x0, 0x0, 0x0, 0x5}, 0x20) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f00000000c0)={0x8000004, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) 17:48:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f00000002c0)=""/169, 0xc}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='fdinfo\x00') socketpair$unix(0x1, 0x8000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchdir(r1) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x30, r3, 0x4, 0x70bd29, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x8, 0x3, 0x1ff, 0x9}}}, ["", "", "", "", "", ""]}, 0x30}}, 0x40) [ 347.347337] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:48:38 executing program 2: r0 = socket$inet6_sctp(0xa, 0x200000000000001, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000021616f8a02ef0f111266638bdd9c04e72fb2c887cc6258fe000eebbed9dc36208a84ab95517975c888f61a469ce0618e72f9fa8ae02ebffccb182dc4c0a66488690700215c42b02f050a56c694b5bfae2757f8bd112cfa82f53b0000000000000000000000"], &(0x7f0000000080)=0xfdd2) 17:48:38 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900), &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:38 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900), &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:38 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(r0, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3, 0x12, r2, 0x0) mbind(&(0x7f0000ff1000/0xc000)=nil, 0xc000, 0x1, &(0x7f0000000680)=0x9, 0x40, 0x0) r3 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r3, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x24) listen(r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socket$rxrpc(0x21, 0x2, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r3) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) 17:48:38 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) io_setup(0x6, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x75, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0x2, 0x32, 0xffffffffffffffff, 0x0) close(r0) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x0) set_robust_list(&(0x7f0000000200)={&(0x7f0000000140)={&(0x7f0000000100)}, 0x1, &(0x7f00000001c0)={&(0x7f0000000180)}}, 0x18) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r2, 0x4008af23, &(0x7f00000000c0)={0x3, 0x8000}) 17:48:38 executing program 2: migrate_pages(0x0, 0x8, &(0x7f0000000000)=0x141, &(0x7f0000000040)=0x2) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f00000002c0)={0x7f, 0x3eef, 0x3, 0x9}) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xe273, 0x80000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffa, 0xcf}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000140)={r2, @in={{0x2, 0x4e21, @broadcast}}, [0x1, 0x5, 0xb64, 0x0, 0x8, 0x8, 0x2, 0x4, 0x7fff, 0x4, 0x8b, 0x6, 0x1, 0x3ff, 0xfffffffffffeffff]}, &(0x7f0000000240)=0x100) getuid() 17:48:38 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, 0x0, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:39 executing program 1: r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="b991a100c7a73700000000000000000000000000000000", @ANYRES16=r1, @ANYBLOB="02002abd7000ffdbdf250d0000000800060002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/96, 0x60) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = epoll_create1(0x0) r4 = epoll_create1(0x0) close(r3) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000c85000)) ioctl$PPPIOCATTACH(r2, 0x4004743d, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r3, &(0x7f0000000140)={0x5}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, &(0x7f0000000300)={0x0}) 17:48:39 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, 0x0, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:39 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, 0x0, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:39 executing program 2: migrate_pages(0x0, 0x8, &(0x7f0000000000)=0x141, &(0x7f0000000040)=0x2) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f00000002c0)={0x7f, 0x3eef, 0x3, 0x9}) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xe273, 0x80000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffa, 0xcf}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000140)={r2, @in={{0x2, 0x4e21, @broadcast}}, [0x1, 0x5, 0xb64, 0x0, 0x8, 0x8, 0x2, 0x4, 0x7fff, 0x4, 0x8b, 0x6, 0x1, 0x3ff, 0xfffffffffffeffff]}, &(0x7f0000000240)=0x100) getuid() 17:48:39 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x3c39, 0x827d, 0x7, 0x3, 0x0, 0x3}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00\x00') r2 = openat$cgroup_ro(r1, &(0x7f0000000140)='mem\x00\x01y/\x06\x00\x00\x00\x00\x00\x00\x00\x16\xd4B\xab\xe3\xfarent\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 17:48:39 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, 0x0, 0x0, r4, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:39 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) getpeername$inet(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) dup3(r0, r0, 0x80000) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x800002, 0x0) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000100)={0x5, 0x7, "90800075355c77e411cbddf8abb6df455d4e66b600", {0x357, 0x7fff}, 0x1}) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000000)={0x0, 0x0, "e0b46692ba0f05be33331f2a65fc712eeb0b98f155ad37ce"}) 17:48:39 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r0, 0xc, 0x2}, 0x14) pwritev(r0, 0x0, 0x0, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x320, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x5) [ 348.676668] Unknown ioctl -1069001191 [ 348.694133] Unknown ioctl -1069001191 17:48:39 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) accept$inet(r0, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f0000000180)=0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x200440, 0x0) connect$rds(r1, &(0x7f00000001c0)={0x2, 0x4e23, @empty}, 0x10) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000080)) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="14e10000", @ANYRES16=0x0, @ANYBLOB="0000000000000000000002000000"], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000000)=0xfffffffffffffffe, 0x0) recvfrom(r0, 0x0, 0x201, 0x40, 0x0, 0xffffffffffffff71) 17:48:39 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, 0x0, 0x0, r4, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:39 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000140)={0x0, 0x9, 0x301d}) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000100)={0x81, 0x100000001, 0x4}) r1 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000, 0x0) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x1ffc00}], 0x1, 0x0) 17:48:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0xfffffffffffffffe, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000080)={0x8f}) 17:48:40 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0xd0000, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) r2 = dup(r0) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f00000004c0)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x4, 0x4, 0x0, &(0x7f0000000280)}) 17:48:40 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, 0x0, 0x0, r4, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:40 executing program 1: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f00000000c0)={0x3f, 0xf, 0x4, 0x4000000, {r0, r1/1000+30000}, {0x1, 0xb, 0x80000000, 0x9, 0x7f, 0x2, "2b11db02"}, 0x100000001, 0x4, @planes=&(0x7f0000000080)={0x1ff, 0x20, @fd=0xffffffffffffff9c, 0x1000}, 0x4}) close(r2) r3 = socket(0x2, 0x2, 0x0) shutdown(r3, 0x0) unshare(0x28020400) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f000000eff4)) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x400) epoll_wait(r4, &(0x7f000000affb)=[{}], 0x1, 0xfffffffffffffef7) shutdown(r3, 0x800000000001) 17:48:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x80800) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x80) perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x7, 0x3, 0x1, 0x9, 0x0, 0x1, 0x52800, 0x1, 0x3, 0x2, 0x4, 0x3, 0x2006adc, 0x9, 0xfffffffffffffe01, 0x2d81, 0x6, 0x3ffc00, 0x0, 0x8, 0x573, 0x6554, 0xfffffffffffffff9, 0x4, 0x1, 0x7c, 0x7, 0x3f, 0x74b, 0xffffffff, 0x1f48, 0x32, 0x694a, 0x2540, 0x1, 0x7, 0x0, 0x6, 0x1, @perf_config_ext={0x1ff, 0x4}, 0x10000, 0xfffffffffffff801, 0x1, 0xf, 0x2, 0x101, 0x4}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x5) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x141800, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x202c00, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x614000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) r2 = dup(r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x100000001) timerfd_gettime(r2, &(0x7f0000000300)) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r3, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) get_thread_area(&(0x7f0000000000)={0xf5b, 0x20001000, 0x4000, 0x3ff, 0x2, 0x7f, 0x7, 0x7, 0x3, 0x8}) 17:48:40 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:40 executing program 3: r0 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000040)='9', 0x1}], 0x1, 0x881806) read(r0, &(0x7f0000000000)=""/30, 0x1000001cd) r1 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000280)={0xffffffff, 0x80000000, 0x7, 0x7, 0x8, 0x4}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x3, r4, 0x0, 0x0, @ib={0x1b, 0x5, 0x80000001, {"557c06b2d1522348b8e29d6f9589c417"}, 0x8, 0x8, 0x5}}}, 0xa0) ioctl(r1, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 349.359469] kauditd_printk_skb: 3 callbacks suppressed [ 349.359501] audit: type=1400 audit(1552844920.403:31): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11303 comm="syz-executor.2" 17:48:40 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001dc0)=[{{&(0x7f0000000100)=@generic, 0x80, &(0x7f0000000340)=[{&(0x7f0000000080)}, {&(0x7f0000000180)=""/199, 0xc7}], 0x2, &(0x7f00000003c0)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'ip6_vti0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x69, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x3, 0x1ff, 0x0, 0x81, 0x7, 0x2, 0x6, 0x3f, 0x0}, &(0x7f0000000080)=0x20) r3 = shmget$private(0x0, 0x1000, 0x800, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_INFO(r3, 0xe, &(0x7f00000002c0)=""/80) r4 = open(&(0x7f0000000380)='./file0\x00', 0x2, 0x7c) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r4, 0x800442d2, &(0x7f0000001400)={0x1, &(0x7f00000013c0)=[{}]}) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000280)={r2, 0x80}, 0x8) 17:48:40 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x80800) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x80) perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x7, 0x3, 0x1, 0x9, 0x0, 0x1, 0x52800, 0x1, 0x3, 0x2, 0x4, 0x3, 0x2006adc, 0x9, 0xfffffffffffffe01, 0x2d81, 0x6, 0x3ffc00, 0x0, 0x8, 0x573, 0x6554, 0xfffffffffffffff9, 0x4, 0x1, 0x7c, 0x7, 0x3f, 0x74b, 0xffffffff, 0x1f48, 0x32, 0x694a, 0x2540, 0x1, 0x7, 0x0, 0x6, 0x1, @perf_config_ext={0x1ff, 0x4}, 0x10000, 0xfffffffffffff801, 0x1, 0xf, 0x2, 0x101, 0x4}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x5) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x141800, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x202c00, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x614000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) r2 = dup(r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x100000001) timerfd_gettime(r2, &(0x7f0000000300)) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r3, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) get_thread_area(&(0x7f0000000000)={0xf5b, 0x20001000, 0x4000, 0x3ff, 0x2, 0x7f, 0x7, 0x7, 0x3, 0x8}) [ 349.735452] audit: type=1400 audit(1552844920.783:32): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11323 comm="syz-executor.2" 17:48:40 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x80800) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x80) perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x7, 0x3, 0x1, 0x9, 0x0, 0x1, 0x52800, 0x1, 0x3, 0x2, 0x4, 0x3, 0x2006adc, 0x9, 0xfffffffffffffe01, 0x2d81, 0x6, 0x3ffc00, 0x0, 0x8, 0x573, 0x6554, 0xfffffffffffffff9, 0x4, 0x1, 0x7c, 0x7, 0x3f, 0x74b, 0xffffffff, 0x1f48, 0x32, 0x694a, 0x2540, 0x1, 0x7, 0x0, 0x6, 0x1, @perf_config_ext={0x1ff, 0x4}, 0x10000, 0xfffffffffffff801, 0x1, 0xf, 0x2, 0x101, 0x4}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x5) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x141800, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x202c00, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x614000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) r2 = dup(r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x100000001) timerfd_gettime(r2, &(0x7f0000000300)) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r3, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) get_thread_area(&(0x7f0000000000)={0xf5b, 0x20001000, 0x4000, 0x3ff, 0x2, 0x7f, 0x7, 0x7, 0x3, 0x8}) 17:48:40 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:41 executing program 3: socketpair$unix(0x1, 0x9, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x40085112, &(0x7f0000000100)={{0xffffff92}, {0xffffffd0}}) [ 350.001427] audit: type=1400 audit(1552844921.043:33): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11331 comm="syz-executor.2" 17:48:41 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x80800) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x80) perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x7, 0x3, 0x1, 0x9, 0x0, 0x1, 0x52800, 0x1, 0x3, 0x2, 0x4, 0x3, 0x2006adc, 0x9, 0xfffffffffffffe01, 0x2d81, 0x6, 0x3ffc00, 0x0, 0x8, 0x573, 0x6554, 0xfffffffffffffff9, 0x4, 0x1, 0x7c, 0x7, 0x3f, 0x74b, 0xffffffff, 0x1f48, 0x32, 0x694a, 0x2540, 0x1, 0x7, 0x0, 0x6, 0x1, @perf_config_ext={0x1ff, 0x4}, 0x10000, 0xfffffffffffff801, 0x1, 0xf, 0x2, 0x101, 0x4}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x5) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x141800, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x202c00, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x614000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) r2 = dup(r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x100000001) timerfd_gettime(r2, &(0x7f0000000300)) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r3, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) get_thread_area(&(0x7f0000000000)={0xf5b, 0x20001000, 0x4000, 0x3ff, 0x2, 0x7f, 0x7, 0x7, 0x3, 0x8}) 17:48:41 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:41 executing program 3: socketpair$unix(0x1, 0x9, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x40085112, &(0x7f0000000100)={{0xffffff92}, {0xffffffd0}}) 17:48:41 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 350.368578] audit: type=1400 audit(1552844921.413:34): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11346 comm="syz-executor.2" 17:48:41 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x80800) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x80) perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x7, 0x3, 0x1, 0x9, 0x0, 0x1, 0x52800, 0x1, 0x3, 0x2, 0x4, 0x3, 0x2006adc, 0x9, 0xfffffffffffffe01, 0x2d81, 0x6, 0x3ffc00, 0x0, 0x8, 0x573, 0x6554, 0xfffffffffffffff9, 0x4, 0x1, 0x7c, 0x7, 0x3f, 0x74b, 0xffffffff, 0x1f48, 0x32, 0x694a, 0x2540, 0x1, 0x7, 0x0, 0x6, 0x1, @perf_config_ext={0x1ff, 0x4}, 0x10000, 0xfffffffffffff801, 0x1, 0xf, 0x2, 0x101, 0x4}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x5) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x141800, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x202c00, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x614000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) r2 = dup(r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x100000001) timerfd_gettime(r2, &(0x7f0000000300)) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r3, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:41 executing program 3: perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000008c0)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000ff8000/0x1000)=nil, 0x0}, 0x68) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score\x00') ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000040)=0xad) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) 17:48:41 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) [ 350.604375] audit: type=1400 audit(1552844921.643:35): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11357 comm="syz-executor.2" 17:48:41 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x80800) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x80) perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x7, 0x3, 0x1, 0x9, 0x0, 0x1, 0x52800, 0x1, 0x3, 0x2, 0x4, 0x3, 0x2006adc, 0x9, 0xfffffffffffffe01, 0x2d81, 0x6, 0x3ffc00, 0x0, 0x8, 0x573, 0x6554, 0xfffffffffffffff9, 0x4, 0x1, 0x7c, 0x7, 0x3f, 0x74b, 0xffffffff, 0x1f48, 0x32, 0x694a, 0x2540, 0x1, 0x7, 0x0, 0x6, 0x1, @perf_config_ext={0x1ff, 0x4}, 0x10000, 0xfffffffffffff801, 0x1, 0xf, 0x2, 0x101, 0x4}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x5) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x141800, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x202c00, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x614000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) r2 = dup(r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x100000001) timerfd_gettime(r2, &(0x7f0000000300)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:41 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) 17:48:42 executing program 3: r0 = open(&(0x7f0000000100)='./file1\x00', 0x400841, 0x70) mkdirat(r0, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r2, &(0x7f0000000240)=""/181, 0xb5, 0x100, 0x0, 0x0) read$FUSE(r1, &(0x7f0000001000), 0xff5c) write$FUSE_INIT(r1, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x2}}, 0x50) 17:48:42 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r3, 0x0, r4, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x80800) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x80) perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x7, 0x3, 0x1, 0x9, 0x0, 0x1, 0x52800, 0x1, 0x3, 0x2, 0x4, 0x3, 0x2006adc, 0x9, 0xfffffffffffffe01, 0x2d81, 0x6, 0x3ffc00, 0x0, 0x8, 0x573, 0x6554, 0xfffffffffffffff9, 0x4, 0x1, 0x7c, 0x7, 0x3f, 0x74b, 0xffffffff, 0x1f48, 0x32, 0x694a, 0x2540, 0x1, 0x7, 0x0, 0x6, 0x1, @perf_config_ext={0x1ff, 0x4}, 0x10000, 0xfffffffffffff801, 0x1, 0xf, 0x2, 0x101, 0x4}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x5) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x141800, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x202c00, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x614000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) r2 = dup(r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x100000001) timerfd_gettime(r2, &(0x7f0000000300)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:42 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:42 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) getxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@random={'user.', '\x00'}, 0x0, 0x0) mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0x91) getpeername$unix(r0, &(0x7f00000001c0), &(0x7f0000000140)=0x6e) setsockopt$inet6_tcp_int(r0, 0x6, 0x3, &(0x7f00000000c0)=0x3d65, 0x4) 17:48:42 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r3, 0x0, r4, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:42 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x80800) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x80) perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x7, 0x3, 0x1, 0x9, 0x0, 0x1, 0x52800, 0x1, 0x3, 0x2, 0x4, 0x3, 0x2006adc, 0x9, 0xfffffffffffffe01, 0x2d81, 0x6, 0x3ffc00, 0x0, 0x8, 0x573, 0x6554, 0xfffffffffffffff9, 0x4, 0x1, 0x7c, 0x7, 0x3f, 0x74b, 0xffffffff, 0x1f48, 0x32, 0x694a, 0x2540, 0x1, 0x7, 0x0, 0x6, 0x1, @perf_config_ext={0x1ff, 0x4}, 0x10000, 0xfffffffffffff801, 0x1, 0xf, 0x2, 0x101, 0x4}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x5) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x141800, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x202c00, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x614000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) r2 = dup(r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x100000001) timerfd_gettime(r2, &(0x7f0000000300)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:42 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x73, 0x0, &(0x7f00000001c0)=0x157) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x140, 0x0) statx(r3, &(0x7f0000000080)='./file0\x00', 0x800, 0x200, &(0x7f00000000c0)) close(r1) close(r0) 17:48:42 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r3, 0x0, r4, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:42 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x80800) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x80) perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x7, 0x3, 0x1, 0x9, 0x0, 0x1, 0x52800, 0x1, 0x3, 0x2, 0x4, 0x3, 0x2006adc, 0x9, 0xfffffffffffffe01, 0x2d81, 0x6, 0x3ffc00, 0x0, 0x8, 0x573, 0x6554, 0xfffffffffffffff9, 0x4, 0x1, 0x7c, 0x7, 0x3f, 0x74b, 0xffffffff, 0x1f48, 0x32, 0x694a, 0x2540, 0x1, 0x7, 0x0, 0x6, 0x1, @perf_config_ext={0x1ff, 0x4}, 0x10000, 0xfffffffffffff801, 0x1, 0xf, 0x2, 0x101, 0x4}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x5) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x141800, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x202c00, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x614000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) dup(r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x100000001) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r2, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:42 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r3, 0x0, r4, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r2, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:43 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 351.939714] audit: type=1400 audit(1552844922.983:36): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11416 comm="syz-executor.2" 17:48:43 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x80800) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x80) perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x7, 0x3, 0x1, 0x9, 0x0, 0x1, 0x52800, 0x1, 0x3, 0x2, 0x4, 0x3, 0x2006adc, 0x9, 0xfffffffffffffe01, 0x2d81, 0x6, 0x3ffc00, 0x0, 0x8, 0x573, 0x6554, 0xfffffffffffffff9, 0x4, 0x1, 0x7c, 0x7, 0x3f, 0x74b, 0xffffffff, 0x1f48, 0x32, 0x694a, 0x2540, 0x1, 0x7, 0x0, 0x6, 0x1, @perf_config_ext={0x1ff, 0x4}, 0x10000, 0xfffffffffffff801, 0x1, 0xf, 0x2, 0x101, 0x4}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x5) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x141800, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x202c00, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x614000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) dup(r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:43 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:43 executing program 3: syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff86, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = open(&(0x7f0000000080)='./file0\x00', 0x480400, 0xe) accept$alg(r0, 0x0, 0x0) nanosleep(&(0x7f00000000c0)={0x77359400}, 0x0) 17:48:43 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r3, 0x0, r4, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r2, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 352.281845] audit: type=1400 audit(1552844923.323:37): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11428 comm="syz-executor.2" 17:48:43 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900), &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x80800) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x80) perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x7, 0x3, 0x1, 0x9, 0x0, 0x1, 0x52800, 0x1, 0x3, 0x2, 0x4, 0x3, 0x2006adc, 0x9, 0xfffffffffffffe01, 0x2d81, 0x6, 0x3ffc00, 0x0, 0x8, 0x573, 0x6554, 0xfffffffffffffff9, 0x4, 0x1, 0x7c, 0x7, 0x3f, 0x74b, 0xffffffff, 0x1f48, 0x32, 0x694a, 0x2540, 0x1, 0x7, 0x0, 0x6, 0x1, @perf_config_ext={0x1ff, 0x4}, 0x10000, 0xfffffffffffff801, 0x1, 0xf, 0x2, 0x101, 0x4}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x5) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x141800, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x202c00, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x614000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) dup(r0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:43 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r3, 0x0, r4, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r2, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 352.649255] audit: type=1400 audit(1552844923.693:38): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11444 comm="syz-executor.2" 17:48:43 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) writev(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r2, 0x0, r3, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r1, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x80800) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x80) perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x7, 0x3, 0x1, 0x9, 0x0, 0x1, 0x52800, 0x1, 0x3, 0x2, 0x4, 0x3, 0x2006adc, 0x9, 0xfffffffffffffe01, 0x2d81, 0x6, 0x3ffc00, 0x0, 0x8, 0x573, 0x6554, 0xfffffffffffffff9, 0x4, 0x1, 0x7c, 0x7, 0x3f, 0x74b, 0xffffffff, 0x1f48, 0x32, 0x694a, 0x2540, 0x1, 0x7, 0x0, 0x6, 0x1, @perf_config_ext={0x1ff, 0x4}, 0x10000, 0xfffffffffffff801, 0x1, 0xf, 0x2, 0x101, 0x4}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x5) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x141800, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x202c00, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x614000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:43 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900), &(0x7f00000008c0)=0x36c) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:44 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) writev(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r2, 0x0, r3, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r1, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 352.935958] audit: type=1400 audit(1552844923.983:39): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11453 comm="syz-executor.2" 17:48:44 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:44 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) writev(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r2, 0x0, r3, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r1, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x80800) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x80) perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x7, 0x3, 0x1, 0x9, 0x0, 0x1, 0x52800, 0x1, 0x3, 0x2, 0x4, 0x3, 0x2006adc, 0x9, 0xfffffffffffffe01, 0x2d81, 0x6, 0x3ffc00, 0x0, 0x8, 0x573, 0x6554, 0xfffffffffffffff9, 0x4, 0x1, 0x7c, 0x7, 0x3f, 0x74b, 0xffffffff, 0x1f48, 0x32, 0x694a, 0x2540, 0x1, 0x7, 0x0, 0x6, 0x1, @perf_config_ext={0x1ff, 0x4}, 0x10000, 0xfffffffffffff801, 0x1, 0xf, 0x2, 0x101, 0x4}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x5) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x141800, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x202c00, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x614000, 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) [ 353.304237] audit: type=1400 audit(1552844924.343:40): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11469 comm="syz-executor.2" 17:48:44 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000980)={'syz0\x00'}, 0x45c) r1 = dup2(r0, r0) write$P9_RCREATE(r1, &(0x7f0000000000)={0x18, 0x73, 0x1, {{0x8, 0x1, 0x2}, 0x5}}, 0x18) ioctl$UI_DEV_CREATE(r0, 0x5501) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) getsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000080)=""/79, &(0x7f0000000100)=0x4f) 17:48:44 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r3, 0x0, r4, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r2, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:44 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x80800) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x80) perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x7, 0x3, 0x1, 0x9, 0x0, 0x1, 0x52800, 0x1, 0x3, 0x2, 0x4, 0x3, 0x2006adc, 0x9, 0xfffffffffffffe01, 0x2d81, 0x6, 0x3ffc00, 0x0, 0x8, 0x573, 0x6554, 0xfffffffffffffff9, 0x4, 0x1, 0x7c, 0x7, 0x3f, 0x74b, 0xffffffff, 0x1f48, 0x32, 0x694a, 0x2540, 0x1, 0x7, 0x0, 0x6, 0x1, @perf_config_ext={0x1ff, 0x4}, 0x10000, 0xfffffffffffff801, 0x1, 0xf, 0x2, 0x101, 0x4}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x5) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x141800, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x202c00, 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) [ 353.562997] input: syz0 as /devices/virtual/input/input6 17:48:44 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r3, 0x0, r4, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r2, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 353.615316] input: syz0 as /devices/virtual/input/input7 17:48:44 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x80800) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x80) perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x7, 0x3, 0x1, 0x9, 0x0, 0x1, 0x52800, 0x1, 0x3, 0x2, 0x4, 0x3, 0x2006adc, 0x9, 0xfffffffffffffe01, 0x2d81, 0x6, 0x3ffc00, 0x0, 0x8, 0x573, 0x6554, 0xfffffffffffffff9, 0x4, 0x1, 0x7c, 0x7, 0x3f, 0x74b, 0xffffffff, 0x1f48, 0x32, 0x694a, 0x2540, 0x1, 0x7, 0x0, 0x6, 0x1, @perf_config_ext={0x1ff, 0x4}, 0x10000, 0xfffffffffffff801, 0x1, 0xf, 0x2, 0x101, 0x4}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x5) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x141800, 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000130a0508ff0280fffdfffe2e0a0000000c0003002f006a007d0a00010c000200570022ff02f1d271"], 0x2c}}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x7, 0x8, 0x2, 0xfff, 0x2}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x111001) 17:48:45 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r3, 0x0, r4, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r2, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:45 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x80800) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x80) perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x7, 0x3, 0x1, 0x9, 0x0, 0x1, 0x52800, 0x1, 0x3, 0x2, 0x4, 0x3, 0x2006adc, 0x9, 0xfffffffffffffe01, 0x2d81, 0x6, 0x3ffc00, 0x0, 0x8, 0x573, 0x6554, 0xfffffffffffffff9, 0x4, 0x1, 0x7c, 0x7, 0x3f, 0x74b, 0xffffffff, 0x1f48, 0x32, 0x694a, 0x2540, 0x1, 0x7, 0x0, 0x6, 0x1, @perf_config_ext={0x1ff, 0x4}, 0x10000, 0xfffffffffffff801, 0x1, 0xf, 0x2, 0x101, 0x4}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x5) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) [ 354.186785] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 354.239052] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 17:48:45 executing program 0: r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:45 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:45 executing program 3: syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) 17:48:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x80800) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x80) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) [ 354.609954] kauditd_printk_skb: 3 callbacks suppressed [ 354.609992] audit: type=1400 audit(1552844925.653:44): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11519 comm="syz-executor.2" 17:48:45 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 17:48:45 executing program 0: r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, &(0x7f00000000c0)=0x39f) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x4000) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x1, 0x3}, 0x10) 17:48:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x80800) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:46 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 17:48:46 executing program 0: r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 355.113554] audit: type=1400 audit(1552844926.153:45): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11533 comm="syz-executor.2" 17:48:46 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, &(0x7f00000000c0)=0x39f) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x4000) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x1, 0x3}, 0x10) 17:48:46 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 17:48:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:46 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:46 executing program 1: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 355.483260] audit: type=1400 audit(1552844926.523:46): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11548 comm="syz-executor.2" 17:48:46 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x4000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r1, 0x330, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) r2 = socket$kcm(0xa, 0x6, 0x0) sysfs$3(0x3) setsockopt$sock_attach_bpf(r2, 0x10d, 0x2, &(0x7f0000000640), 0x35) 17:48:46 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) [ 355.713535] audit: type=1400 audit(1552844926.753:47): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11558 comm="syz-executor.2" 17:48:46 executing program 1: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:46 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:46 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:46 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x9, 0x1, {0xb}}) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x8) 17:48:47 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:47 executing program 1: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha256-avx2)\x00'}, 0x58) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) r3 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x1f, 0x80) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000003c0)={r3, r0, 0x5}) getpgrp(0x0) socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x800, 0x0) clock_getres(0x6, &(0x7f00000001c0)) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x8000, 0x9, 0xfffffffffffffffd, 0x9}]}) fgetxattr(r4, &(0x7f0000000380)=@known='trusted.overlay.metacopy\x00', &(0x7f00000002c0)=""/157, 0x99) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x16) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f00000000c0)={0x7, 0x7, 0x2e, "bc1f9c76d79dc6ca725012de8e774e61062a28d08b2398f24d826c912ad1102fea644a951ff4a12e1ad976f237a69ffc14197ec6a9964a96b77b9b18", 0x17, "df31dee0c2b5992b16a4eae08f4122a9e6621b63f49d3dbcae75271897799916f21b6a7ac379263aec5b8632d62dd174a0bd2b95ebbc04335e0499b3", 0xf0}) syz_open_dev$mouse(&(0x7f0000000400)='/dev/input/mouse#\x00', 0x8, 0x109000) 17:48:47 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:47 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:47 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:47 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:47 executing program 2: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:47 executing program 4: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f00000000c0)=[0xee01, 0x0, 0x0, 0x0, 0x0, 0xee01]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x8, &(0x7f0000000540)=[r0, r1, r2, r3, r4, r5, r6, r7]) r8 = syz_open_dev$vcsn(&(0x7f0000000580)='/dev/vcs#\x00', 0x6, 0x200000) r9 = openat$dir(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x4000, 0x60) renameat(r8, &(0x7f00000005c0)='./file0\x00', r9, &(0x7f0000000640)='./file0\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r8, 0x0, 0x20, 0x85, &(0x7f0000000680)="b6fea1ace4479b51d2528201122a58554750702545f5388f79c4951ce3aa51a6", &(0x7f00000006c0)=""/133, 0x375}, 0x28) clock_gettime(0x3, &(0x7f00000007c0)) ioctl$sock_inet_SIOCSIFPFLAGS(r8, 0x8934, &(0x7f0000000800)={'ip6erspan0\x00', 0x9}) write$P9_RREADLINK(r8, &(0x7f0000000840)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) connect$l2tp(r8, &(0x7f0000000880)=@pppol2tpv3={0x18, 0x1, {0x0, r8, {0x2, 0x4e21, @multicast1}, 0x3, 0x4, 0x2, 0x2}}, 0x2e) getsockopt$inet6_tcp_buf(r8, 0x6, 0x1b, &(0x7f00000008c0)=""/64, &(0x7f0000000900)=0x40) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000940)={0x4, [0x4, 0x4, 0x101, 0x2]}, 0xc) ioctl$DRM_IOCTL_AGP_ALLOC(r8, 0xc0206434, &(0x7f0000000980)={0x6, 0x0, 0x0, 0x20}) ioctl$DRM_IOCTL_AGP_ALLOC(r8, 0xc0206434, &(0x7f00000009c0)={0x7fff, r10, 0x10001, 0x6}) ioctl$KVM_SET_VAPIC_ADDR(r8, 0x4008ae93, &(0x7f0000000a00)=0x4000) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r8, 0x10f, 0x84, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) r11 = semget$private(0x0, 0x2, 0x120) semctl$GETNCNT(r11, 0x2, 0xe, &(0x7f0000000ac0)=""/143) ioctl$RTC_AIE_ON(r8, 0x7001) syz_open_dev$video(&(0x7f0000000b80)='/dev/video#\x00', 0x4, 0x20000) mq_open(&(0x7f0000000bc0)='\x00', 0x0, 0x91, &(0x7f0000000c00)={0x1, 0x43e7, 0x1, 0x8001, 0x5, 0x1f, 0x7, 0x6775a92e}) truncate(&(0x7f0000000c40)='./file0\x00', 0x9) ioctl$DRM_IOCTL_GET_MAP(r8, 0xc0286404, &(0x7f0000000c80)={&(0x7f0000ffd000/0x3000)=nil, 0x6, 0x1, 0x80, &(0x7f0000ffe000/0x2000)=nil, 0xfff}) 17:48:47 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:47 executing program 2: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:47 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:48 executing program 3: r0 = userfaultfd(0x100) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 17:48:48 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:48 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:48 executing program 2: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:48 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:48 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:48 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, 0x0, 0x0) 17:48:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x4b564d03, 0x1]}) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4040ae9e, &(0x7f0000000200)={0x0, 0xffff8000}) sendmmsg$inet_sctp(r2, &(0x7f0000000380)=[{&(0x7f00000000c0)=@in6={0xa, 0x4e20, 0x81, @rand_addr="ca901127f7a4e5a992508bf151325d44", 0x20}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000100)="079696efbabfdb4b46f90668920c8f911db512cfc10338f44c2e216f2fe5fa105a59c4abb6c5b93829affbaf263fb8feec3569a90f23c0198305510497d0a91243930d2ca0b57dc13d59bc106d95b0c2", 0x50}, {&(0x7f0000000180)="29c552472932ae5e7f71827dbd4d6d77cfca8dcc87e0dda2e72ec6e0fbada2095f61a581dc8a388925bc5eff2b4075d6d2eba01a2e815397f4505eaf523cc7dac7307a32c680825c8a499a", 0x4b}], 0x2, &(0x7f0000000340)=[@dstaddrv4={0x18, 0x84, 0x7, @local}], 0x18, 0x8800}], 0x1, 0x10) [ 357.761430] IPVS: ftp: loaded support on port[0] = 21 [ 358.021955] chnl_net:caif_netlink_parms(): no params data found [ 358.109112] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.115757] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.124052] device bridge_slave_0 entered promiscuous mode [ 358.133210] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.139871] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.148329] device bridge_slave_1 entered promiscuous mode [ 358.181339] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 358.195663] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 358.227521] team0: Port device team_slave_0 added [ 358.236041] team0: Port device team_slave_1 added [ 358.311790] device hsr_slave_0 entered promiscuous mode [ 358.407421] device hsr_slave_1 entered promiscuous mode [ 358.529195] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.535808] bridge0: port 2(bridge_slave_1) entered forwarding state [ 358.543059] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.549931] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.637298] 8021q: adding VLAN 0 to HW filter on device bond0 [ 358.661063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 358.672608] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.682646] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.698198] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 358.720858] 8021q: adding VLAN 0 to HW filter on device team0 [ 358.739026] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 358.747719] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.754217] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.800601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 358.808786] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.815347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 358.825009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 358.833928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 358.844449] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 358.865712] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 358.873987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 358.887968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 358.928405] 8021q: adding VLAN 0 to HW filter on device batadv0 17:48:50 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x9, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x2, 0x0) write$P9_RVERSION(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="1300000065ffff01000000063d915a7ec3cdaf"], 0x13) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="8062ec6e02d3354ced38654bce8cab4c00633759a73bdb2c8c60f1ac7d1261ed7af565f2fad378029c96a0c4300e0b90123c414a265ab6129cdeb85fc4d2a4296abfec7e9f6e0fd497d77717fdb16884af39f65262011115666fb0c3a3e20ee89914b722ba897049dd692d7063839dae50b2591dd28de2d97cecc414dbb77d9ebc002ed5b07aba3503bd36fcc4c245694b7289ca3757ed1a094a91e5f03f40859826d083859d1b46d18a403a5f224b320b88c225fc03ec0086a9476b04095ae9df153bea7786aa8ceebb3f6ecbd3eb4d31d624141935021766d1", 0xda}, {&(0x7f00000002c0)="b9fb451f27aa7d2a3e4f209144630226562a003c9c7ce4f78b830c62fda5d08e9f93781448bd63c7f4774f20e2459a52971a587cd13f38ae6ce427ea2b939096667ee2357e3ffe2f6a6e22c129249c116f3a9593b6bd5f947c362e2c5f7408eb6e6f8565848171823818f26a910e1c7d25439026863e130fe8973206ba64b53410c2581fbb74a447bc938de5af26afa61ebde55d8036415d5ef08804b3278224fac6c2fc565c994de04b139739b4954a3416cc26ff80abe4455cae248c39f0c13ecfc78a508084c99b40dd7598ce46cd8c26b8b342f6e0caa695ae39e32ce499e380f0b1f2399a0834d3f57dff332c9620", 0xf1}, {&(0x7f00000003c0)="5c706f553d6422ceb2f189ef9e027a2daa670edbaed53d19ebafcf23dd347df68e49ac26ef71b250201fa1817c48b98370f465e7ba4e78c4d28914a516baed5afcf3486099ef6fa73b0ab0c3b68f0b5225632e6674d3668ef45eedd7edeb09ee29d3c72f6728eec5ec0d02a933b2426ba8528a1f0122baae32998c2c60f74175ec15ad57d32755a3ba9bea5570ffc3f213f441e64434856a6c063341df5cc2bb57141cdf22e820edd75ca3c1080b38dac2723014d6618c1fa57857902f8bd8fe3da183f303f3e8f150997967ef5e808b127d2019f419f3859ca336a229c37e0181a2e286dab0a64d255c7128db", 0xed}], 0x3) fallocate(r0, 0x4, 0x100000000, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000000)={0x0, 0x34325842, 0x0, @stepwise}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000200)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000240)={r3, 0x80000, r2}) 17:48:50 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:50 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, 0x0, 0x0) 17:48:50 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x2, 0x208, [0x20000280, 0x0, 0x0, 0x20000350, 0x20000380], 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x280) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000023c0)) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0xd8, &(0x7f0000000180)=[@in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e21, 0x0, @empty, 0x6}, @in6={0xa, 0x4e21, 0x1, @mcast2, 0x3}, @in6={0xa, 0x4e24, 0x8, @mcast1, 0x9}, @in6={0xa, 0x4e22, 0x10000, @local, 0x7fffffff}, @in6={0xa, 0x4e21, 0x9, @mcast1, 0x7}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e23, 0x10002, @mcast2, 0x45}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000004c0)={r2, 0x1000, "977130e710b674aa38e3c84b1d4df2746d5d1f25e7a77a25279c1a1769c0175c535035300883582f6dcdb24e089a456fd7865505bc6e915e03162cf8637fef07a56d09cc8d84e2cfdc323f2cf9707a3610068fb2747597f077d27b2755efcac5e795641b52c4de081a08bd52e84ee595d3ccb83dcbab9c7e0b33255af55ace77935d36c4b842e3b0975bf042f215806832f1804d349c9b5b1b8bd432ac64eb268ae7d984c14e32dfd9ecc91c05793e713c375f577a4e7ebdd5fb5b6f9f1f2195149b23ab60bd9a36924f522dee970bc4b1aec70148150b03946eda95a2421ea728e64ceb391b55b1935078ab33104a176335cc623f39fd5a6abf8b12f35f0b0d3a627e536cdd7ed3d0fc704dded684e798c53710e2bd587e0a9a894927a7867c9a29bb1e50281d51f8133d3445ea14af51a4afe583454a33f79d47e515891da1fa2121ec74c52b6121c957abed52e524ebf5bb2ae6db029532aeb424ab994d528e470cdc59dd8a3b03f182ba38fb93e993881fe4a4a5dbc74eb776df2cf5a258b1765d452a9590bf1eea047cfaf47aed7a0cc18e3b757430dd2f7fb5d7428ce6fc6cfafc282b7beb1497b62771d4eadf79db63c4db7e16f08137a5f1f8ffdc375067d26795caae893c60dcfb1f6b091781f51b1b84ff8f425c433040b6b2e454b1ae57734b71d4519c29e248ebdbb9c52746589387830587bbd40aacf09ee4ef6a2b1efd2cea3f36b2a16a5e056704764beab2e194dec4176044b1dea9a7d90b70e20e61e57ba8b736df2347627dcbd5f8db5093e0f58fce1425851025a03edce60321a3809186446cc2677542c3430e9ccfd0b0fecfc55d44a3214e5232037d961bdccbe05b863b78fbf9d1729d0ebbafae6cf483d303b2d81d08eb7a4f58e63ac8b92867fcd5489401057e7a71647ade067c1ab4bcf393d54be268fbeafb205b84d94f121e4450621d5c792652799ced8b1f6e71bf1cf2bd90bf0c173b99d274ddf6b588ba8730f83f8a8d3fdd95b00408a49d133249babc61bbd256ede29d74b8bad35e68af279e4c862355371b174532fc8b0fe6cdefdc715b8eacd60244ac00cb1ae2ba63de7485f00f262e0f2126c982984baba814320d10097d27fd18126f96129f2f155766b3729f75b56b8bb937e35776f07e3d251075c68a8024f3bb45c78aaf35a7221e8dd1b82070b8a111b36560dc7debf003f7d55bd54dd17d701b233c8e7ca39659b4f10025d61a9c42ce2cbf8938da90d501452179f819a9e46bccbd1da125fbc616524dd68effaa8be9ae3c6db12fcce6dce61a0798135e9bfff3f0dfdf1d155d2df7cfbae10fe71517aec02a15b476fe1642071373a407e3fa67784cfcfb1fe4404bf707aa242c5b93c29b5b6481d5e86e1fb682e2364626614ecf33a4f167a4c1deb5c6d1db5daa3646f548d2988d561d025d65e11e17833f2e24b78bd1e2879299cc6297b57b1f10c4a698f8aae5161976e80f02655f88f8311863fa34e4750f093075873e7f0e2d8b1b112f71719b96f4285159091d3a10aa2ec94b421b66075960a243464c3a14d94e0db4bd62f62839c157045f23cc2fb0914b1cb49e916e56dbc3dac41d6823fcb81b529303db0a929ba7fee28a7e512f123a31f01070f949a79f44cd128535feacb2ac6f39204c2678ee146ae5adac8c2fcef3f69c8f4d5228de4ba7af2e6bb0f1c0a53c62b97f7c4902be5ea503f2e38f1cb0512c72f8e8b4a5212e54b650eeeb4c4fafd43dec2cc54760915ff515bb299830ad16d7eded9a28e75c144da37c028b2637c7b28729da9fc2f136e1848559148d23faaab29728afde7e0ba2a3aea0e3d37e8f73469fb008fc6a2a5916c64d611f29a324a0a7b5c6a5b369682c96454aacb5f14630e15f1e5824b337c801e983c1570fbe21b949606c714f4f369cba14963a1f8dc2960537a488f34c052ebb08709331e7e73860ef672685ed4fc8fc3cf430e7aca278d402c0f3d68cfe359ce731aaf9b74daa0850128a9bc262a8a603b96e1521e5bfd328c43889574cc0aee25ace8ec6f20547e8a7b67c99130d69adbae3f99364a92876b0c918cb51a83e6d633b9517aa7fa1201d5aa1732fb16cc8f640272eb71a61acbeca13bf820e0c8c714a75ea903a0254460a1c49a45229dac8fd93f3be08f5333b45f71440945be2a93c95f5a957e3bcaea9064d9044af6fc8042211ecbaaa9c54e66205091bfa9cdff362cfbe3da65a2d29c5bd1bb121b2e3f5111244572a98fcebdacbb6fcc9e93c135ab225e6a730f9b5cfe97ebe4abc1b4ead2dc17e1f2b7f84f48e7e5b5445e679c1b2268ff89ded20a70310acc7b4b355aa4b5dd0476355c7ae7e1e682bf771d8a6f6b5d2ed5b41400103171a47cc58a24590ab76fc615a30c4ac6d9071f145d5d51d7a4661176e10739d309acd629fbcc5b700b35c4b47ca82ac4aa5588562587568e9406c023acd323bc70ac491016716a0a945279f02a7d8f2a242ec9db806b120775fb9a67ad04f49be2ec1b8fcab6bc111082817bf2cb7c9d6d3201cd1648ce145e7e740daeb7363c53154001e0bf51471f35aa11b54acf9301f6060c1f5761bf9a15fcccba89cb3f4f5684a4bb3314efb848406eb8c1fda794549525ff9cdffffde7f11f411387d47b987f02103c6e1dbff8569213097536fd8d3d7df16f960c4e92efea98b26973c1e3e28c375ec0851d697f407177abec95e0de6de567a4bf21396ec16bf2fdb1564b3d8ad621fd7d715f14580f478ca04019d08236861664af4d669d2a97ffb4927a5082c646297b3807d069f615c78cceca23ef6d1a4acef60a2c372cdb7d27446e14cb6490517e0be422df5105a307164f1f53cfa1f644bb1963a299e693b9a4845a60cce2796e04b877edf03289c096c111b878a725dc658f0cfcd3bc5cad63f81db00cbf7f18a6d5d970af2b6c50c049fb83cb423a094121377fcbcc7dcaa9de756a1e8232d355b4e1e97df681fc10081da94c19dc189fed8cb1008d5c32da220114ff3ec8b08f511ba56ec267911a39b312cb7f86f38bfbb3412287d27971f489cdb0227e61a6f8582e50c9030b337ba1d1b2645ab45f731c41ecdd5956feb10f0dcf068bea21cab93d8f08ae5d8de4eefec071444bd7f46eafa4fdef7894ebdb957d09522e4692056edc738fd569d6d8b82ee168826ac1d6a2647656d2493a15594a01c027c36c3f88a204cd63ba03e52255c40baeacd19846df713724bb8304a98818bcada4713f16aee4bd7cb0c398b7be1eba2dc4263f68e52a15836d7cfb0d84c41721023a4389950e70f6f2ec5e3347533e131f76f98653c2e7ecfd096a0205355cce5bbb2161ed5ae6a1e973a9f5d52099b8def02c8eee728264e82b97d850082aecab21597f7c8d1ab974ebff175dbd53273f035eba6ca50ebab66a3ba3d22cb6a639260d688bf22ae47f87f0991511d21877a3b512b81bf85251c8206d14d75412fcafe1d503da84edab93e70eaa9f0689c212da0a5116dd29f5fcf6ff3b2e8ef4443e8681a92a24ecf5d259dcf50315a0c1368cae1145f751b95c531016ff6675fbda12581a0052fcc327a7fac0eeb0e151323dab7bafc613aee78ecb5443417d0db129979e6c21873e8c153b2f9e7d5bfb1b1e69ae9e994ff711565efde799f2259480358ebcb6d45d915c6817cf931d3b3e6160651235b56517a7c2c398d139f742465a8bf6d9fe2c1c5d29b3fb7a07e7cf5dbb4881049b3643d476d85e8eae7146de1cc168332935f9d4008f75d4907bb81e2d2bd93a7eb1829bfbc6dcc609fd08740de5c8f5cef4b1fe06f60c2607c76095c934f9bcc4b2e4f20f1b57f527dd598d23094a08086a7f617c76e0ffe3f07960f252600d5f1faca8e64d735f85daedc848dcc8a7f753a91fc26ec2221af0077fb9198ba3a6e17f9019ff7364cc991964dd6724413acd6b3e157471a3b5f9182bff25736751bdd23567015cc8e2ac1a7fbca42a0d44088dd64f3c989f19716c60de958dd4b6631a21924481ccc3fdf079eaed3e73f326cfd975306679f4b40c46e4abd58f000e62fa9669d7e766897ab713752275efc95a4a0d86cf477e1b9f8925cbc32b858130b5e53270991e8926d5fcaff5fdb55ecefb9295927c52c4a0afc346d6fb909620f758d496a6e6cabf41b32b9cd02d5b0fb5d35ef4ffe570f68ed7c0cda5f2c85ec3f33c42da81b2e8d283241baba6486ceac73fb510c427f9e86b958baee0340257b174a1dd9b0559f8ed7f7d19723b0eb40693909a8e8939a824eddb735e519f5ce1ef25685b40fd6ffbbb3470133ed208b53bc19bec604e3c1cf95f86a2f2fdd842ecc8949065daed3fc9aa5112e594e0e00607e69af58624d0d38153f340ff8d017dcb9cd34807ee0a08ca6aca88ccf726956a228dfa7a9e8b30e4803d4f89eff064a6ec75dec65450f50ec24227a66dbb852ac948a8b71632b33b4614c748159e40d84c453f45371781ed4a5a11966bd583afcc9439a790849b3945f4d6b52df98a2f8491f744d63e700dab5921e2891f2867b3d2253c1fb6c55152454502c2897c203ef727b7411ade9abbd20f258877eea65ac24110a41b1428a6d1fa1ce3c315be53821af616a9d3c8b4e4ea0802d73759424953238714b6a9ebdaf4c70a8ae369aa97970d378dedd39a78005f9642fe152d2fbbe6c6a4f57809330820e1240d20f97945ed713556f167e112646a5f33ecbc9519c6dd4f9fc70970cf9e7b2e53559db188cdcef1997b78a7ac60b1ebd39fd68cdab7c0f795ac714c4a28e6e69a0a26bba75f5805bf822f5da88d9f6462086cd58e0ab589c46c5070246d1d6f184e0d75532873ca6cb08f4ea2ad974226efe1cda19013dc9556a3bd743338b0674073ca84a3927db31f3c6cc4a02a6e5ff424489e3e398203ff0db9bc1c88f2f70fde3d4cec5f84e93b411b9f8f005958b3ae4a96a0ed1cddfa203d02b50abae887c4e3e9270d441111de05a0e5bf795582111832cab96d70df694b05d160e77dde300d0894e6a2b196d746eabaaa597fe34f1b9e25e5085b93c662d6c442d295c8a6e0188e79eab0912e41afe2f810e92df511732e5906c105e19be37a25df011177c1ef02b45cccb949348f83a51ecefde426fb20e2acdd1cd9da47094291113beb278a4ab37c2c15bfa02e42de12b835f68709d37c41653625224b70c08c3cf6a8c2b07b3a8f34257f4615054d1376fee902fb77f9474bb0b3d03e2fbf051dc3c339c59faa2c9700213c7a6b59de1a89de6e45233ec362334c8be6a4909f153c79f30ef29f3e90d641356029d80e2dc04876e4631f02c02f500863b52d513194f8dd8fcdc86f0a184431d37e9a9e6ab51bfe8b79aba87d6706a4cadeef39a8ea24086d18f9396b2c288b3d9ef0994f21b06549184bac0413dc1c59bd341689aeea66d2ef30b3930765c5985f4c3188f08ae7f0bca98e136763186e83b60ddf3cb0101789c82cdf75eadba3f6415d28436adae566177b06a8844e0b9a0e888869957b3432bed0807784ea29ed4c30b64e6ba70e50efa8e43548c7c11f76eb43b1af3c647b18d342cd174786a5dff468e99bb2998dcaca463da64ed48023a07904b071c0ba7992c2c4685030e00b82a4e4409df186874fc9085c6b556151f3d8314585cd9d38ee458180f5098618f2a77211f80dc48c639af15675928d98e05c3b35ab9f682d7bc34f6df2b60b0754411362aa6da39a5dc5adc5c8650c2ef1dede7fa0a22df75eb7b9c3cb54f54d3f3dcd22b24696ab0d2868e5e4a7b691f7a92d5f0d41989d24e7453"}, &(0x7f00000000c0)=0x1008) 17:48:50 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:50 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, 0x0, 0x0) 17:48:50 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x800) getsockopt$inet_int(r0, 0x0, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) listen(r0, 0xc438) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4c, 0x0, &(0x7f0000000040)) 17:48:50 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x6, 0xc8200) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x998}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000100)={r1, 0x1, 0x20, 0x4000000000000, 0x9}, &(0x7f0000000140)=0x18) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={&(0x7f0000000040), 0xc, &(0x7f0000058000)={&(0x7f000023f000)=ANY=[@ANYBLOB="8400080000f4ffddbc7000ffffffff0000dffc0c0000000000000000f7ffff5a659a62290ffc38686bff3ec20c2dbfdc5e9f13e1a04810d464fbc3f4c1b4e2bb501fb1bb949869c2984d914d9f04005e4fcd4dd3050bc1700612dbc3080c91745fa158cf0d70309f7f1969136edfd73294c0356675ffff000044f2a432a15b4ce56aa1"], 0x83}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) socket(0x24, 0x0, 0x0) 17:48:50 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:50 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:50 executing program 2 (fault-call:1 fault-nth:0): r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:50 executing program 3: r0 = socket$unix(0x1, 0x7fffffffffc, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x50, &(0x7f0000000100)}, 0x10) listen(r0, 0x5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000000), 0xffffffffffffff93) getegid() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000080)) r3 = dup(r2) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r3, 0xc008551a, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) 17:48:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) socketpair$unix(0x1, 0x100000000000008, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) io_getevents(r2, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000000)={0x77359400}) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f00000000c0)={{0x9, 0x0, 0x0, 0x100, 0x4, 0x5000000}, 0x7, 0xa2, 0x75, 0xe9b0, 0x9, "ab7f8506ca268d08b12620aeea52d7476482e33a7625ea9e1967955573d40290e5c0d13f02abc30f59c4f4263fe9778b2ef88e27ffa45eec73fea48a96d75e43fae0e581c8c8166645bd98f419f470f51bfc929e6d3b3e39a6a73d7756f19d2c351c150f9aa7dd74def070266975f46144bd60477be09f253cc938d45539d4ae"}) socket$inet6(0xa, 0x1, 0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140)}]) [ 359.974925] FAULT_INJECTION: forcing a failure. [ 359.974925] name failslab, interval 1, probability 0, space 0, times 1 [ 359.986565] CPU: 1 PID: 11713 Comm: syz-executor.2 Not tainted 5.0.0+ #15 [ 359.993535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.002927] Call Trace: [ 360.005651] dump_stack+0x173/0x1d0 [ 360.009362] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 360.014601] should_fail+0xa19/0xb20 [ 360.018403] __should_failslab+0x278/0x2a0 [ 360.023172] should_failslab+0x29/0x70 [ 360.027121] __kmalloc_track_caller+0x1ce/0xc70 [ 360.031840] ? kstrtoull+0x76e/0x7e0 [ 360.035617] ? proc_pid_attr_write+0x29a/0x4e0 [ 360.040258] ? kmsan_internal_memset_shadow+0x14c/0x430 [ 360.045691] memdup_user+0x79/0x190 [ 360.049380] proc_pid_attr_write+0x29a/0x4e0 [ 360.053864] ? proc_pid_attr_read+0x450/0x450 [ 360.058426] __vfs_write+0x1e2/0xc20 [ 360.062202] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 360.067620] ? __sb_start_write+0x10c/0x230 [ 360.071997] vfs_write+0x481/0x920 [ 360.075626] __se_sys_write+0x17a/0x370 [ 360.079663] __x64_sys_write+0x4a/0x70 [ 360.083628] do_syscall_64+0xbc/0xf0 [ 360.086446] Unknown ioctl 21529 [ 360.087475] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 360.087512] RIP: 0033:0x458079 [ 360.087591] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 360.087623] RSP: 002b:00007ff24b447c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 360.087678] RAX: ffffffffffffffda RBX: 00007ff24b447c90 RCX: 0000000000458079 [ 360.100833] Unknown ioctl -1073195750 [ 360.118227] RDX: 0000000000000025 RSI: 0000000020000480 RDI: 0000000000000003 [ 360.118252] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 360.118278] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff24b4486d4 [ 360.118302] R13: 00000000004c739d R14: 00000000004dcf10 R15: 0000000000000004 [ 360.217093] Unknown ioctl 21529 [ 360.220675] Unknown ioctl -1073195750 17:48:51 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:51 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:51 executing program 2 (fault-call:1 fault-nth:1): r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:51 executing program 3: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000380)=""/28, 0x31) readahead(r1, 0x0, 0x20) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000002700)={0xbf, @tick=0x8001}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001f40)='/proc/capi/capi20\x00', 0x402000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000001fc0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000002080)={&(0x7f0000001f80), 0xc, &(0x7f0000002040)={&(0x7f0000002000)={0x1c, r3, 0x400, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x8000) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001bc0)='/dev/sequencer2\x00', 0x12500, 0x0) ioctl$CAPI_GET_MANUFACTURER(r4, 0xc0044306, &(0x7f00000020c0)=0x7) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x2000, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r5, 0x80845663, &(0x7f0000001e80)) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000013c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r5, &(0x7f0000001a40)={&(0x7f0000001940)={0x10, 0x0, 0x0, 0x8080}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x1c, r6, 0x8, 0x70bd2d, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x80) sched_setaffinity(r0, 0xffffffffffffffd8, &(0x7f0000000000)=0x2) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f000035d000)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "f75b294d1329a8b9", "3ea8a52dca94fd4ed6d9b97507c23e20693db0512891fef97458475cecfd0b19"}) sendmsg$kcm(r5, &(0x7f0000001b80)={&(0x7f0000001b00)=@l2={0x1f, 0x100000000, {0x5, 0x9, 0x5b, 0x7, 0x81, 0x20}, 0x101, 0x287}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001c40)="9b4ff61d8ce2b469eb1320f24d2198a35c0efba7cd540fb3344798c5c4f161968bf925b496ffa66b156bbf5d8b5a84b2edc5d6b3d0ada1914074a8d0855ac4084c45f7e4668bde501122c50eb50b4f62d1dc8b69c049e3a5b10ca42a0e7f1ae3855543dcbf20b9c03c975f23dd07edbbae283b933d0a4f6de7a7afbac328eb03c809f97d2b187b8cdb79b2f31a1b7e21949eb911a8da0c8e2d9eb8bc726799f416fdc8de68099beeb65379bc77e59660e8ff5b1c0ce090917e14bd4a2b601d43b6976000ce11206b0ea66805ca4153997ebcd20a", 0xd4}, {&(0x7f0000001d40)="63213f38211aabec4f101e05e3907c88fe3b36452ea8ff364a659cc7558a867f1bdb8a20bfdb812a7a3a0881e5b482854335378166431e8b965045e280cfc382aad2d4a5d13f02b1dbdcf047463405f9869f0ddae6e59281c0298a805a2152a2b072bca0ff1ee9db31d0f0460c5fd64486323f5974f010e71e12579cf3bf2a13e2ae81cd52bf684623a82978061ef12bbcdb1ac761c51c4ae81f20144caaa3ad257f0d3cf9ec6aeece292d34e7cdddbd8554527eabbb5db7f953655d69ceb0935e4d3b731e670ad8b0ed4d56b5c53eda88a83047fdd6017593726e", 0xdb}], 0x2, &(0x7f00000023c0)=ANY=[@ANYBLOB="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"], 0x250}, 0x8005) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x274880, 0x0) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_inet_SIOCSIFNETMASK(r5, 0x891c, &(0x7f0000002100)={'bridge_slave_0\x00', {0x2, 0x4e24, @multicast1}}) ioctl$ASHMEM_SET_PROT_MASK(r7, 0x40087705, &(0x7f0000001a80)={0x6}) ioctl$DRM_IOCTL_VERSION(r7, 0xc0406400, &(0x7f00000022c0)={0x1, 0x100000000, 0x7, 0x49, &(0x7f0000002140)=""/73, 0x17, &(0x7f00000021c0)=""/23, 0xbd, &(0x7f0000002200)=""/189}) getresgid(&(0x7f0000001800), &(0x7f0000001840)=0x0, &(0x7f0000001880)) sendmsg$unix(r7, &(0x7f0000001900)={&(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0xda, &(0x7f00000016c0)=[{&(0x7f00000003c0)="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", 0x1000}, {&(0x7f0000002780)="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", 0x105}, {&(0x7f00000002c0)="0c87e1b445e6319c9e9e9f00b91bc38582eecb11fa5c4874fe943c06cc1d6a8724ebc3c45b970a3f5b4b53e5ae30801e363f3577bff1f9fc9ccd7641947daf71a509badb2e979c4d1f5494b16c7792d86a8703f89bf9d343f1bc042993a926b62b3373a991cee92363444ad6dbd077741514ed13d52e8322f9b3f1334c45f4a75eb9b93b1c1317d79f84befd4237d58aa72948083b989b6a2527eecf266d13eb1036", 0xa2}, {&(0x7f00000014c0)="ffbbf265e86c62b78687e92a916bdca6d96dea33af608315cabfe247403d2ec026a6e024cb60877b952041289fdeae00ff8109133971031963d4fe29404512febf356b3279454f34f472da1d919166b024cc870e425b98359d5e1b396e45fd14894877b7a75832ee98671966a622a1c5eadb02f8ccafdc92ab6e5e126849f59a6d5ad6ad2018d0f12b2379ab95ab8f0006d9f03e46f1c5a590660f55b45bb6c38bf68fc8684b90487e489fb1c2bd474a0ef5eb1236e6d9a5630fc282", 0xbc}, {&(0x7f0000000240)}, {&(0x7f0000001580)="b54f31d85a82526e625c0834c788bf2be91ad7f5d88689fe008be6c0bb2506e46834c40267f18d3ec265ae5ec36ebd37a746121b8ccb963f05ae", 0x3a}, {&(0x7f00000015c0)="7214abbfb0074e2f0fb28f89276439ff53775bc4840db09b475c8f86db7911b2ea5c12f7486c65f0f2c37943475e72f939c5b4eb938738abebd553412ae78199304e93d4c5c5d90e0718980f655352fac2654b87b1152880515f3965cff4aa3cd6609df4fdf70e62ac901e75b49b422f67097f146f1a8b9050870af90642460a6442cfc88c84fba2d458f4d45a1eb1f20bc12067d44d2225a11165a9c823d73d9a96068fd24db858e97a56b0a9de988e0319fcdf37e8980307e62154269377022e7caa9389b2369ff568e991b04db48f433894384a8c37a577ecd9", 0xdb}], 0x7, &(0x7f00000018c0)=[@cred={0x20, 0x1, 0x2, r0, r8, r9}], 0x20, 0x40}, 0x40000) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001e40)='/dev/sequencer2\x00', 0x220000, 0x0) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/sequencer2\x00', 0x10000000000000, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r10, 0x40087705, &(0x7f00000000c0)={0x41, 0x3ff}) 17:48:51 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x418080, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x40, 0x0) getdents(r1, 0x0, 0x0) ioctl$TIOCCBRK(r0, 0x5428) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r2, 0xc0345642, &(0x7f0000000040)={0x7, "af76913ecb83439918a4107b1ba2f860b1178130fa130eebd48985c9b0bb15c3", 0x0, 0x1}) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000080)={0x9, 0x5, 0x2, 0x9, 0x800, 0x15e}) [ 360.648359] FAULT_INJECTION: forcing a failure. [ 360.648359] name failslab, interval 1, probability 0, space 0, times 0 [ 360.659780] CPU: 0 PID: 11741 Comm: syz-executor.2 Not tainted 5.0.0+ #15 [ 360.666733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.676113] Call Trace: [ 360.678766] dump_stack+0x173/0x1d0 [ 360.682458] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 360.687718] should_fail+0xa19/0xb20 [ 360.691497] __should_failslab+0x278/0x2a0 [ 360.695790] should_failslab+0x29/0x70 [ 360.699741] kmem_cache_alloc+0xff/0xb60 [ 360.703848] ? audit_log_start+0x85c/0x1270 [ 360.708269] audit_log_start+0x85c/0x1270 [ 360.712508] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 360.717759] common_lsm_audit+0x1c1/0x2fb0 [ 360.722050] ? aa_audit_msg+0x100/0x100 [ 360.726079] ? aa_audit_file+0xd10/0xd10 [ 360.730205] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 360.735455] aa_audit+0x679/0xa70 [ 360.738976] ? aa_audit_file+0xd10/0xd10 [ 360.743126] aa_audit_file+0x862/0xd10 [ 360.747106] aa_change_profile+0x3371/0x3d60 [ 360.751564] ? kmsan_slab_alloc+0xe/0x10 [ 360.755697] ? __msan_poison_alloca+0x1a0/0x2a0 [ 360.760423] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 360.765657] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 360.771072] ? strcmp+0x83/0x160 [ 360.774543] apparmor_setprocattr+0x1358/0x13a0 [ 360.779298] ? apparmor_getprocattr+0x5c0/0x5c0 [ 360.784025] security_setprocattr+0x139/0x210 [ 360.788579] proc_pid_attr_write+0x3f7/0x4e0 [ 360.793062] ? proc_pid_attr_read+0x450/0x450 [ 360.797624] __vfs_write+0x1e2/0xc20 [ 360.801424] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 360.806860] ? __sb_start_write+0x10c/0x230 [ 360.811248] vfs_write+0x481/0x920 [ 360.814850] __se_sys_write+0x17a/0x370 [ 360.818898] __x64_sys_write+0x4a/0x70 [ 360.822833] do_syscall_64+0xbc/0xf0 [ 360.826628] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 360.831894] RIP: 0033:0x458079 [ 360.835152] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 360.854097] RSP: 002b:00007ff24b447c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 360.861866] RAX: ffffffffffffffda RBX: 00007ff24b447c90 RCX: 0000000000458079 [ 360.869178] RDX: 0000000000000025 RSI: 0000000020000480 RDI: 0000000000000003 [ 360.876534] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 360.883846] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff24b4486d4 [ 360.891182] R13: 00000000004c739d R14: 00000000004dcf10 R15: 0000000000000004 17:48:51 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:51 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:52 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x40, 0x40) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000180)={0x77, 0x10001, 0x1, 0xfffffffffffffff8}) init_module(&(0x7f00000000c0)='\x8f,securityeth0/cgroup!(mime_typeeth1systemppp1user(GPLnodev@+\x00', 0x3e, &(0x7f0000000100)='/dev/audio\x00') openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @loopback, @initdev}, &(0x7f0000000740)=0xc) r1 = socket$kcm(0x10, 0x5, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001240)="2e0000002a00810600000000000000cf0300b0eba0b4d65cdbaa18b29c473da67e3d743298cbb3001be63e75c80b", 0x2e}], 0x1}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x117, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r2, 0x1c, 0x0, @in={0x2, 0x4e23, @empty}}}, 0x90) [ 360.902400] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 360.909444] audit: out of memory in audit_log_start 17:48:52 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:52 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket(0xfaa89485db8d2bf6, 0x0, 0x2) accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) getpeername$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x508, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r2}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x8081) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x400032, 0xffffffffffffffff, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x802c542a, &(0x7f0000000040)) 17:48:52 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000080)={r1, 0x0, 0x8, 0xd1}, 0x10) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000000c0)=r1, 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x400, 0x200002) ioctl$SCSI_IOCTL_GET_PCI(r2, 0x5387, &(0x7f0000000040)) 17:48:52 executing program 2 (fault-call:1 fault-nth:2): r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:52 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x0, 0x40800) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000240)) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0xfe, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x2, 0x7ff, 0xd267}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000280)={0x0, 0x95}, &(0x7f00000002c0)=0x8) accept4$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14, 0x80000) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000340)) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000300)={r4, 0x3ff, 0x4, 0x7}, 0x10) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @remote}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x0) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000400)={r5, 0x1, 0x6, @local}, 0x10) 17:48:52 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:52 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="10000000000000002900000043000000"], 0x10}}], 0x1, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8001, 0x420000) accept(r0, &(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000040)=0x80) r1 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 17:48:52 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:52 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:53 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20012, r2, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xb) clone(0x0, 0x0, 0x0, 0x0, 0x0) connect$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000040)=0x100000000000) 17:48:53 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:53 executing program 2: write$apparmor_current(0xffffffffffffffff, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000100)={0x3ff, {{0xa, 0x4e20, 0x9, @empty, 0x1000}}}, 0x88) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3801000010000100000000000000da00fe8000000000000000000000000000bbfe8000000000000000000000000000aa00000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ffffffff0000000000000000000000000000000032000000ff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000480003006465666c61746500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x138}}, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x202, 0x0) 17:48:53 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 362.199677] binder_alloc: binder_alloc_mmap_handler: 11803 20001000-20004000 already mapped failed -16 17:48:53 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r2, 0x0, r3, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r1, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x8046, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) write$cgroup_int(r1, &(0x7f0000000080)=0x5, 0x12) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = gettid() write$P9_RLCREATE(r2, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r3, 0x15) 17:48:53 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x202000, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f00000000c0)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@local, 0x8, 0x3, 0x0, 0x2, 0x800, 0x1}, &(0x7f00000001c0)=0x20) 17:48:53 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:53 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r2, 0x0, r3, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r1, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:53 executing program 4: r0 = socket$inet(0xa, 0xf, 0x84) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x80, 0x200000) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x4, 0x4, 0x7f}}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) bind$can_raw(r1, &(0x7f0000000200)={0x1d, r2}, 0x10) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r3 = accept4(r0, 0x0, 0x0, 0x800) shutdown(r3, 0x1) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='dctcp-reno\x00', 0xb) shutdown(r3, 0x1) 17:48:53 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:54 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r2, 0x0, r3, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r1, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 362.975750] audit: type=1400 audit(1552844934.023:48): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11845 comm="syz-executor.2" 17:48:54 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:54 executing program 4: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000200)={0x9, 0x3}) r1 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000140)={'vxcan1\x00', 0x2}) r2 = socket$inet6(0xa, 0x80003, 0x2) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x200}, &(0x7f0000000280)=0x8) connect(r2, &(0x7f0000000300)=@in6={0xa, 0x4e21, 0x9, @loopback, 0xffffffff}, 0x80) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000002c0)={r3, 0x7}, 0x8) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x80000000000000, 0x2, @ipv4={[], [], @multicast2}}, 0xfffffffffffffd34) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23, 0x9, @mcast2, 0x9}, 0x1c) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) r4 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x3, 0x2000) keyctl$join(0x1, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x188, 0x2, 0x4, 0x9}, {0x7, 0x2, 0x1, 0x81}]}) ioctl$VIDIOC_OVERLAY(r4, 0x4004560e, &(0x7f0000000380)=0xfffffffffffff801) 17:48:54 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000080)=0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x24000, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)=0x0) mq_notify(r1, &(0x7f0000000180)={0x0, 0xc, 0x4, @tid=r2}) unlinkat(r1, &(0x7f0000000100)='./file0\x00', 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:54 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r3, 0x0, r4, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r2, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 363.283587] audit: type=1400 audit(1552844934.323:49): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11861 comm="syz-executor.2" 17:48:54 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 17:48:54 executing program 3: io_setup(0x10000, &(0x7f0000000240)=0x0) r1 = syz_open_dev$cec(&(0x7f0000000280)='/dev/cec#\x00', 0x1, 0x2) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000440)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x3, 0x401, r1, &(0x7f00000002c0)="17b7134f79da0ad4f56726b38c68ce3a2e31ea00d09ecdbd4f5e63022313e0c5ca6d3cab7404cd156e77acd31d392a60c3e509f613839323", 0x38, 0x1269, 0x0, 0x1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x3, 0x9, r2, &(0x7f0000000380)="e46040d7d61028fe315b00667305902d6744f5fce0801fa75e68a725e323be81dccbb04d6e1fb682c5778ef0ce68701f34430a729b531d1f5de2e255519bedc2e00f30ed2c5b74bf696ff8120aa31446539694b834", 0x55, 0x9a6, 0x0, 0x1}]) r3 = socket$alg(0x26, 0x5, 0x0) r4 = gettid() fcntl$setown(r3, 0x8, r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000000)="ab553fec942499000000000000000062576b3831a5c90746", 0xffffffffffffffa3) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x40002, 0x0) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r6, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x104201}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="080229bd7000fbdbff2511000000080006fff7ffffff30002300000003000300000014000200626f6e645f736c6176655f3000000000080007004e22000008001601000000"], 0x54}, 0x1, 0x0, 0x0, 0x40005}, 0xc000) 17:48:54 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:54 executing program 4: r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000240)={0xfffffffffffffffe}, 0x0, 0x8) clock_gettime(0x0, &(0x7f0000000180)) rt_sigtimedwait(&(0x7f00000000c0), 0x0, 0x0, 0x8) timer_create(0x0, &(0x7f00009cefa8)={0x0, 0x12, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000040fe0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x14) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x7, 0x440) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000280)=[@in={0x2, 0x4e20, @local}, @in={0x2, 0x4e20, @rand_addr=0x7ff}, @in6={0xa, 0x4e20, 0x7, @loopback, 0x7cb4daa0}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e22, 0x4, @empty, 0x200}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e22, 0xffffffffffffff00, @mcast1, 0xa4fd}, @in={0x2, 0x4e24, @remote}], 0xc4) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000040)={0x9, 0x5}) 17:48:54 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r3, 0x0, r4, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r2, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:54 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) [ 363.667263] audit: type=1400 audit(1552844934.713:50): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11877 comm="syz-executor.2" [ 363.688799] audit: type=1400 audit(1552844934.713:51): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11877 comm="syz-executor.2" 17:48:54 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) prctl$PR_SET_MM(0x23, 0xb, &(0x7f0000ffc000/0x2000)=nil) sendmsg$tipc(r1, &(0x7f0000000400)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x3, {0x4e21, 0x1}}, 0x10, &(0x7f0000000380)=[{&(0x7f00000000c0)="bdf79dd14dc537c75b87b9fc0ae44001b1f2e70890bfe37f5ed945660001ce6a804f80dd56e42c9e23503707758e664dda32ca2856f19543de32d0a03dc3f510eb733e315a0622eacf5abeeb3dd719ec8c3356460fa4fd7a4439eb8312d8fa40cb8b4d7ccad562e72e1d12b736808c8aad23a2ea138a1fc9672ef493b45aeb6ffb4397ce06d0822002355a17e30812caf3b72b2f9c87", 0x96}, {&(0x7f0000000180)="918fc6d60854e5b1039587a8e3118340a21eef49e1a0fe8379bc89827501061a26197aea752a75b91d03ad16e3e6b28caf0713afe4855c", 0x37}, {&(0x7f00000001c0)="1eefb17833ad41ac48d939dbd9734c53dacfe80417bc8b52b05f98f16a543397e61d369547923b99764166432dade4f7c794a930c6e7e5cf7b77230ea5caed5feb8f4b409f4454aa7f5fd2fcafb628e69e7388588693a828b3b6cb7c254b8c223da0f316c458a1d9dfaf70702279ce5a2bd89b6315f10f10f56a15b3483249686924145af5b8851facbc11561468ad7156e028411144ec2c15225d4f0ead8624eabb53f6c81bde3b77cde32d0e84", 0xae}, {&(0x7f0000000280)="19eb72414abaf454298280b93dca6eb0573e120cf89cc5a2c9655d59d0fd58c734fd8d0d49d29bdc8423fd805562506461e39e207a19f3dbdeb181592f732eafd9f11f14d9cdbbfb4d5a428507176b7d32e54d5815d2b478a8e7e7aff66badfdec4c03ed64036cc1c41b759e215aa07c44d8977e0b56152ae25930c78663c69bbf244c87989ca9f97c5412", 0x8b}, {&(0x7f0000000340)="45020f7eb8a6046e41d9a995ff5990", 0xf}], 0x5, &(0x7f00000004c0)="8c27670aa403239b11f3bb74e5a8ec09d81a74ec53467dec502c51fd401488c3549ad1c042dceeefe4fc411f47748430baa0e5126ee1d3b1d2ac703fcf1ab62f5cdcb57c72812991fd13070750b60216c4a79feb8a532d16f0c8cf5e2d637bcee7f11a1852e5b006343108404e25577cae2e51741a5b32171e936b2d7bfcc8b77928e267b787027ae252ea8d26", 0x8d, 0x80}, 0x40) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0xfffffe04) getsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000440), &(0x7f0000000580)=0x4) 17:48:54 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x4) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r3, 0x0, r4, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r2, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:55 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) [ 363.978488] audit: type=1400 audit(1552844935.023:52): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11890 comm="syz-executor.2" 17:48:55 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 17:48:55 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, 0x0, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:55 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, 0x0) [ 364.244158] audit: type=1400 audit(1552844935.283:53): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11905 comm="syz-executor.2" [ 364.357416] audit: type=1400 audit(1552844935.333:54): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=11905 comm="syz-executor.2" 17:48:55 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=@hat={'changehat ', 0x1, 0x5e, [':-\x00', '/proc/thread-self/attr/current\x00', '/proc/thread-self/attr/current\x00', '\x00', '#vmnet1./[vboxnet1.\x00', 'permprofile ', '(ppp0)procselinuxð1;wlan0wlan1vboxnet1{!)ppp0mime_typeem1\x00']}, 0xffffffe7) [ 364.518584] audit: type=1400 audit(1552844935.563:55): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=11925 comm="syz-executor.2" 17:48:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = dup2(r0, r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc8, 0xe0, 0x2, {"da16ae59f871f8570f1ce2e2cb5a01c04d1cfd38a0cd62ba64fc8fe4b363429795ced97c2645c88013e4bda9aae46b8c322bc1a958953d6691af6a07404da9f972bdde830310b9d4b0816d03ba13b404f6ddb73bce0d8163da1d7610dc52167305dfbb77a26061045fa0acacfe4482705e8abb4b0ccf0e35121bd87139e2ac3ed1e0c38d9677c9290fec94cd461c487f93c4d73053d53f30af6a7392a84db620903591e0165496265f55e636faacef2150096a168deb670fda9176cae92b5306de2fb25ad43f39"}}, {0x0, "632f0884b9581fef330b756591510a738d057a702fb2fc831e149bbd1eee2f6267d30c72977f1611cca5d612d5dd79606fd21d440f23e73ed82e06bd7ebe5c2758f3779fd20711c46a7dcf902168e85fa74d3dddc3ecd424f2859cb4b0ceb8972c8f589ac800ab84244e933ae2e9766d3204b65838e822092c490208c2c1177b5052dbfef7f8cb7feebe91e95d9c96c9313f1156340ced6449f32acf4e558257c2ae363515a46d6af14c5aaf1f3fcb07a15fd6ffaca5"}}, &(0x7f0000000240)=""/203, 0x198, 0xcb}, 0x20) write$P9_RATTACH(r1, 0x0, 0x0) 17:48:55 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, 0x0, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:55 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x7fc00000000000, 0xffffffff8603ad93, 0x6, 0xffffffff7fffffff, 0x3, 0x3f, 0x8, 0x72, 0x40, 0x267, 0x7fffffff, 0x5, 0x38, 0x2, 0x1, 0x3, 0x2}, [{0x7, 0x80000000, 0x96, 0x80000001, 0x5, 0x5db, 0x7, 0x4e}], "6776bc7381145f9d37905944efa63b1a61abda5f3faf9ae820fb8fea50cb4721c2b901", [[], [], [], [], [], [], [], [], []]}, 0x99b) ioctl$int_in(r1, 0x80000000004d00, 0x0) 17:48:55 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, 0x0) 17:48:55 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="7065726d70726f66696c65203a222f2f656d8100000000000000786e6574302d7573657200"], 0x25) 17:48:56 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x8000, 0x9, 0x800}) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8001, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r1, 0x28, &(0x7f0000000140)}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) write$apparmor_current(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7165726d70728f4258c198f46f66696465203a222f2f656d307070703176686f786e6574302d7521791db875f24b1f73657200995689f31b423572672d63b96b2cfe76d7f1140525108ddc86276ff2c63a30d6033469ae64eeb02dd1e483d3ee93ea9f09e1ffcbdaf702a4e2378e8f912a5a25e4145371d7d8a5dee8da473cf9e839f424d81577b103d2150cc1a84504"], 0x25) 17:48:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @local}, 0x10) sendto(r0, &(0x7f0000000280)="86", 0x1, 0x4001, 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x80000001, 0x200) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f00000000c0)={0x2, 0x1, @stop_pts=0xf4}) recvmmsg(r0, &(0x7f00000092c0)=[{{0x0, 0x0, &(0x7f0000003bc0)=[{&(0x7f0000003b80)=""/56, 0x38}], 0x1}}], 0x1, 0x1, 0x0) 17:48:56 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, 0x0, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:56 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x10000, 0x0) ioctl$VIDIOC_S_FBUF(r1, 0x4030560b, &(0x7f00000000c0)={0xa, 0x40, &(0x7f0000000040)="902a0bd33e91ba0f52d5d9255cfeae1f9d6a39a885422083050006b7d84229b673568c9550c8a2a91b275501bee5ae6963c886cdcb8fa5fa", {0xa20d, 0xaacf, 0xa0363159, 0xf, 0x0, 0x9a9, 0x1}}) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:56 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, 0x0) 17:48:56 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:56 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:56 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x4, 0x301400) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000100)={0x3}) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="7065726d70726f66696c6520ed7e2f2f656d307070703176626f786e6574302d7573657200a55aac44ad247074756857f9e584d19541a881728fe7df4ac1dd3d3345b975c70014b92c5d"], 0x25) 17:48:56 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) r1 = syz_open_dev$mice(&(0x7f0000005180)='/dev/input/mice\x00', 0x0, 0x40082) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f00000051c0)=@dstopts={0xbf}, 0x8) [ 366.086084] kauditd_printk_skb: 4 callbacks suppressed [ 366.086116] audit: type=1400 audit(1552844937.133:60): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=ED7E2F2F656D307070703176626F786E6574302D75736572 pid=11972 comm="syz-executor.2" 17:48:58 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000600)=""/97, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000380)=""/181, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001900)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x1) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000840)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) 17:48:58 executing program 1 (fault-call:3 fault-nth:0): perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:58 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:58 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1000, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000040)) socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) getsockname$tipc(r1, &(0x7f0000000000), &(0x7f0000000100)=0x10) write$apparmor_current(r0, &(0x7f0000000480)=ANY=[@ANYBLOB='permprofile :\"//em0ppp1vboxt0-user\x00\x00\x00'], 0x25) 17:48:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) close(r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200200, 0x0) fstat(r1, 0x0) [ 367.087922] audit: type=1400 audit(1552844938.133:61): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F7874302D75736572 pid=11984 comm="syz-executor.2" [ 367.093797] FAULT_INJECTION: forcing a failure. [ 367.093797] name failslab, interval 1, probability 0, space 0, times 0 [ 367.120586] CPU: 0 PID: 11992 Comm: syz-executor.1 Not tainted 5.0.0+ #15 [ 367.127567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.136979] Call Trace: [ 367.139653] dump_stack+0x173/0x1d0 [ 367.143346] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 367.148666] should_fail+0xa19/0xb20 [ 367.152458] __should_failslab+0x278/0x2a0 [ 367.156785] should_failslab+0x29/0x70 [ 367.160763] kmem_cache_alloc_trace+0x125/0xb40 [ 367.165578] ? fib6_info_alloc+0xd0/0x3b0 [ 367.169820] fib6_info_alloc+0xd0/0x3b0 [ 367.173872] ip6_route_info_create+0xb82/0x4cb0 [ 367.178625] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 367.184074] ? ip6_route_add+0x6a/0x340 [ 367.188115] ? ipv6_route_ioctl+0x836/0x860 [ 367.192531] ip6_route_add+0xc1/0x340 [ 367.196407] ipv6_route_ioctl+0x836/0x860 [ 367.200710] inet6_ioctl+0x268/0x410 [ 367.204540] ? inet6_getname+0x800/0x800 [ 367.208748] sock_do_ioctl+0x147/0x5e0 [ 367.212735] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 367.217993] sock_ioctl+0x7a6/0xd40 [ 367.221691] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 367.226961] ? sock_poll+0x450/0x450 [ 367.230739] do_vfs_ioctl+0xebd/0x2bf0 [ 367.234744] ? security_file_ioctl+0x92/0x200 [ 367.239351] __se_sys_ioctl+0x1da/0x270 [ 367.243421] __x64_sys_ioctl+0x4a/0x70 [ 367.247373] do_syscall_64+0xbc/0xf0 [ 367.251174] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 367.256422] RIP: 0033:0x458079 [ 367.259694] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 367.278685] RSP: 002b:00007f83c310ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 367.287937] RAX: ffffffffffffffda RBX: 00007f83c310ac90 RCX: 0000000000458079 [ 367.295274] RDX: 0000000020000000 RSI: 000000000000890b RDI: 0000000000000003 [ 367.302580] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 367.309933] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83c310b6d4 [ 367.317265] R13: 00000000004c3805 R14: 00000000004d6640 R15: 0000000000000004 17:48:58 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7065726d686174203078303030303030303030303030303030325e3a222f2f656d307070703176626f786e6574302d757365720070707031282e25776c616e81000000000000006e30003a6717a4d620a1c940fa846a8d93441bd5222f2f656d307070703176626f786e6574302d75736572003a222f2f656d307071703176626f786e6574302d75736572007065726d70726f66696c6520003a222f3b656d307070703176626f786e6574302d7573657200000027292b2800"], 0x1) 17:48:58 executing program 3: r0 = memfd_create(&(0x7f0000000240)='#em1#+\x00', 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20, 0x0, 0x0, {0x40, 0x4, 0x4}}, 0x20) sendfile(r0, r0, &(0x7f0000000040), 0x930) mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x7, 0x0, &(0x7f00000000c0)) 17:48:58 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {0x0}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:58 executing program 1 (fault-call:3 fault-nth:1): perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:58 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) ptrace$setregs(0xf, r2, 0x80000001, &(0x7f0000000440)="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") r3 = epoll_create(0x401) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000003740)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SCSI_IOCTL_SYNC(r4, 0x4) ioctl$KVM_SET_FPU(r5, 0x41a0ae8d, &(0x7f0000000280)={[], 0x1ff, 0x7, 0x4, 0x0, 0xfffe00000000000, 0x3, 0x7000, [], 0x2ade494b}) bind$unix(r0, &(0x7f000055b000)=@file={0x1, './file0\x00'}, 0xa) connect$unix(r0, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x0, 0x403fc) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$VT_ACTIVATE(r4, 0x5606, 0xffffffffffff798f) connect$unix(r0, &(0x7f00003de000)=@file={0x1, './file0\x00'}, 0xa) close(r0) 17:48:58 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) 17:48:58 executing program 3: r0 = socket(0x1e, 0x805, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000180)) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) r3 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x5, 0x800) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000100)={0x100000000, 0x6, 0x3, 0x449}) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) 17:48:58 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {0x0}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 367.897462] audit: type=1400 audit(1552844938.943:62): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12024 comm="syz-executor.2" 17:48:59 executing program 1: prctl$PR_CAPBSET_READ(0x17, 0x1f) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:48:59 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x220040, 0x0) ioctl$CAPI_SET_FLAGS(r1, 0x80044324, &(0x7f0000000040)) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:48:59 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40187542, &(0x7f0000000040)=ANY=[@ANYBLOB="00210000010000007c91036e5fed4cd12f519466d2870003cf5fe4acb8865cce7451ac02832bceadcc382fb443d79ae062cf999bccf7abd9810292708b9fa5ee9e2518b1c0a4502bc8a7af13193a7721d5ac9aae476806cddf6d1fd1e990ee2466dc62dcbcce2438b379868bfe8dd0ee414d38533ee3bff332c95b0302d8860294bf7f1e8e1f0d9308f5545292f6a70b0b293357de7bf03b08be2d85792f00000000dc247df4911816a7522a8f78ed26fb2c0e78d26cc50000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000140), 0x4) 17:48:59 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {0x0}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:59 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) pwrite64(r0, &(0x7f0000000080)="1990019f9b9aeea993fa8dc4c954c26c43938979230e7c32fa2fd09e7b4f9b3f311cbbc862afeccb3878610bf57988d60e7a4cea751e70e9ba2c", 0x3a, 0xfffffffffffffffb) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 368.335538] audit: type=1400 audit(1552844939.383:63): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12042 comm="syz-executor.2" 17:48:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x1}, 0x2c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e22, 0xff, @mcast1, 0x40}}, 0xffffffffffff8000, 0x760, 0x10000, 0x2}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000140)={r4, 0xb3, 0x30, 0x81, 0x97d7}, &(0x7f0000000180)=0x18) dup3(r1, r3, 0x0) 17:48:59 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = inotify_init1(0x80000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x2) write$apparmor_current(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7065726d70726f66696c65203a222f2f656d307070703176626f8e223cd7aa1997bc01000000b1786e6574302d7573657200"], 0x54b) 17:48:59 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) 17:48:59 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:48:59 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x200000001}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 368.651631] audit: type=1400 audit(1552844939.693:64): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F8E223CD7AA1997BC01 pid=12056 comm="syz-executor.2" [ 368.773642] audit: type=1400 audit(1552844939.763:65): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F8E223CD7AA1997BC01 pid=12056 comm="syz-executor.2" 17:48:59 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0xfffffffffffffffd) close(r0) socket$tipc(0x1e, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x84f, 0x2000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000080)={0x5, 0x3, 'client0\x00', 0x7, "117309104e164036", "fbb46f875f7911103c03e80bd3072a22bf6a9cc533ca19e5143aa8e6ed534220", 0x80000000, 0x8}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x40002014}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r3, 0x200, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 17:48:59 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) sendmsg$key(r0, &(0x7f0000000040)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="02000000070000000000000000000002050019f1fffffffefffadfffffffffffffff0000ac1414aa"], 0x28}}, 0x0) 17:49:00 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2000, 0x0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f00000004c0)=""/4096) write$apparmor_current(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="7065726d70726f66696c65203a222f2f656ddfff000000000080786e6574302d7573657200"], 0x25) 17:49:00 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:00 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e23}, 0x6e) 17:49:00 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={'bridge0\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x0, @dev}, 0x4}}, 0x26) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000080)) connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x32) r3 = dup3(r1, r1, 0x0) ioctl$KVM_GET_TSC_KHZ(r3, 0xaea3) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x3, 0x400040, 0x4) writev(r3, &(0x7f00000002c0)=[{&(0x7f0000000140)="8fd4fb549a2477f1c1a10d6ad6556522979426f0e2972887c2abfc348e31db9962500bfada549ffaa7e6fb239fa817ce1de9b52a238c6998cc258d8540ba75330e1fb14421f15146119d8177fbaadd05f3ac940e4aead16fb6db04fc573486358704290c1007b9be220e8e54c6827a94", 0x70}, {&(0x7f00000001c0)="da123e2a3448b07f9c4e8fdb06328e08c60e0995035227a34e33023da707a40c3564996a065eaf407952315a8446f7695e268bfabf1677321c477c3cb0ea92b7d302904b8493ff4b7519dcadd37281c4b9ee319a9ad334232b8d81906c4d8d3353e6f126c03d85f7d7e434823ff34c32d3b01da64b48ad1373d1be3f190126290ea9f7bdf10062db7f01c37dd586c8a049a1a7d0a7629a5b7fa1d25ffb966a1044acf4e9ce4852e1b0b8f6b787053d81ff42e343a317b06f4eabcf434ea2739e213b10dc628ea39b6aabff2129df5aec9d35f79493ba8b8f294b74848e182359", 0xe0}], 0x2) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r3, 0x29, 0xd3, &(0x7f0000000300)={{0xa, 0x4e22, 0x4, @remote}, {0xa, 0x4e23, 0x40, @rand_addr="8644945314b331b172dbfa5ce1abced3", 0xcd}, 0x1, [0x9, 0x68f5, 0x7c, 0x200000081, 0xfffffffffffff761, 0x7ff, 0xfffffffeffffffff, 0x5]}, 0x5c) write$binfmt_elf32(r2, 0x0, 0x0) bind$rds(r3, &(0x7f0000000100)={0x2, 0x4e23, @rand_addr=0x7}, 0x10) [ 369.140162] audit: type=1400 audit(1552844940.183:66): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656DDFFF pid=12080 comm="syz-executor.2" 17:49:00 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) preadv(r0, &(0x7f00000013c0)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000180)=0x14) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0xc, &(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000100)={r0, r0, 0x9}) getpeername$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) read$FUSE(r0, &(0x7f0000006400), 0x1000) 17:49:00 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:00 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="7065726d70008000006c65203a222f2f656d307070703176e26f786e6574302d7573657200"], 0x25) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfc0, 0x2) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x6, 0x9, 0x1000, 0x9, 0x400}) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x10000) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000140)=0x5d) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000240)=0x0) r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r2, &(0x7f0000000280)={r2, r0, 0x5}) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000180)={r3, @in={{0x2, 0x4e20, @remote}}}, 0x84) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f0000000040)={0xf000, 0x4000}) 17:49:00 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x4002, 0x0) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0xa) getsockopt$inet_tcp_buf(r1, 0x6, 0xe, &(0x7f0000003180)=""/4096, &(0x7f0000004180)=0xfffffd5c) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f00000000c0)={0x0, 0x0, 0x5e3}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000100)={0x0, r2, 0x5}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:00 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x114, r1, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x478d670e}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x81}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}]}, @TIPC_NLA_MEDIA={0x4c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x45}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100000000}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x20000000}, 0xf475ab10820358cd) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000300)={0x1, 0x0, {0x37, 0x4, 0x2009, 0x8, 0x6, 0x4, 0x1, 0x1}}) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1) 17:49:00 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x44000) write$binfmt_aout(r0, &(0x7f0000000040)={{0x107, 0xfffffffeffffffff, 0x3, 0xe8, 0x20b, 0x7, 0x4, 0x7}, "376f372943f301eb5d7926867289daa68992023c7d508b927fcc4a670cb614ffb74df19102c8c4ee9fc57f9d52f3f8320ce0110faeb798b64451284f2157f0b427322e5e6f76d21ac21978778a52d5067a40afa2b046da960782708868560dac24579a1d9468bb4be3cc4b63ecbffe02350cfafd0427c5e68022716013c7148d98978cf7ddad491e37e634f5219076469318286d", [[], [], [], [], [], [], [], []]}, 0x8b4) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000900)={0x0, 0x6, 0x5, [0xad64, 0x5, 0xfffffffffffeffff, 0x7, 0xff00000000000000]}, 0x12) r1 = syz_open_dev$mice(&(0x7f0000000940)='/dev/input/mice\x00', 0x0, 0x400100) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f0000000980)={0x1, 0x0, {0x3, 0x1, 0x7, 0x400}}) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f00000009c0)={[], 0x3, 0x80, 0x0, 0x0, 0x3ff, 0x100000, 0x6001, [], 0x7}) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x20) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b80)={0x32, 0x4, 0x0, {0x3, 0x4, 0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x32) sendmsg$nl_crypto(r1, &(0x7f0000000d40)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000c00)=@getstat={0xe0, 0x15, 0x20, 0x70bd2b, 0x25dfdbff, {{'rfc4106(morus640)\x00'}, [], [], 0x2400, 0x2000}, [""]}, 0xe0}, 0x1, 0x0, 0x0, 0x40}, 0x810) r2 = dup2(r1, r1) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000d80)=""/148) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000e80)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000e40), 0x13f, 0xb}}, 0x20) r3 = syz_open_dev$evdev(&(0x7f0000000ec0)='/dev/input/event#\x00', 0xa81, 0x121800) getpeername$inet(r0, &(0x7f0000000f00)={0x2, 0x0, @loopback}, &(0x7f0000000f40)=0x10) readahead(r2, 0x7fff, 0xd3) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000f80)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000fc0)=0x1c) syncfs(r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000001000)={'ipvs\x00'}, &(0x7f0000001040)=0x1e) sendmsg$tipc(r1, &(0x7f0000002100)={&(0x7f0000001080)=@id={0x1e, 0x3, 0x1, {0x4e23}}, 0x10, &(0x7f00000010c0), 0x0, &(0x7f0000001100)="b3c776640d59553234e17ed804d9e272b5d512e43040af0e17307aec10382c2d6c8484438a0e9846c58d4b5fc8487348a74333405c807d1d5869141f924173327c479009a442d8b0620dc636f8ccf7c95cb2d9c597b0a1004e0900f77e874e2ee403a51dccd1bdde75dd3fa22cd5eca294cea4c3cb5a598f6f44554f85a42e0e84d1e1f5aecb3f62b348308d4744b153e65c7938d7587877e4cda2ace8385b7d6a8d48bcd2e024b8206975b7ae4b5d12dc7c53fffa4d0abd963889c573ae41e1931d1b7fc90e7ec4fd8198437303071b9c614396830a7af1af0dd856e8666b82f28ab4b89239988c1f133413266e23c2d9c19f4bd601c1a3aa4e12b12b6a5e3919a4d0135d522a5d2260dfeed9e335a262c6bd191c3982ee1ecf3a3041978d6978b388e9639286eef33104a77e3ee5ce93d07fb79e99424ae92369622cb362f6b8d4b87ba103cc4df6416a4267386a7247a6fcb51c31e78668a286c5feb5f0b3cc1f7d6d1a3bfad1642a33c4c2fa73fb3cf2148bf2a561108161f550f4899ac9154b8259b58ada27627a5c3221caad39b505a9b95822739920de12d2af42f4726ca3827afc1e4969b8a9c24f417a308df6f222a94287130ef7d737d17dca6ca2dcf8be1a564d40fe87533e61aa1b265daf8a1498cd9bc0fd309c2917762a97719da22cbcfdec4090fba5b1bf8916afa1daf93662aeecea8c2fbbff65f7c0bf4d40d240aca6f1e7b451daba3e8284952547ec4a87f604ba433a1af016ab9293d7e7f614bb9911e468018e377e2963755109a4ad2bf6f7d3ecd9e7208c964bf616f798136851d5d4e0339c28a2b0b5cb7b2f4e412f8058be6fc24e8eded614121d3abd0b090f71641b68e77b8a9fe128a689df03aeaeca491202de1643fcee27e07fc0359f998aeb269dcdc1bd9968d1410c498cdfda32a73290779aef7395fd2a81450f4dfb30d3d5a6e7140a9ea70c50254668192a9e1f9872b8a140d690a814919b0fee7aff6689ec367a64a7696c007081bb8975b0ddb043dca2c405d829ab2f907fc3640dfd7445602a705b287d7ece16da03157663245d9d519af7e4931a2e23b50942d3a50af5a473aeb055d39bca93d13bfab0af7decdba02eecc4652942626c149674c8b8c4d35e6419b2ae30392b8d98c513029376d9e41fe495e667dbbd5c40648f83f2000efb47fab90ed0d796e4e96a13787f2e464d530d0fefe41fff629f81abb5e0d0a13d67c10cb674e4f7d72743926082eaa317bc212c4aa15911c8664034b93c4306869581e2bdbab0ff78d439dcd4d5490630ed71fb5f8a16c4c42de2a6809e73fbb90128dd0744d17dfb2b7fe3b73c772dad13c08f5ad970a3b38354256f83c2a57c633a4a8be406a5260293db0fe7eae2876eed4132824cf3db71144fd73f2ba00fc48eb312dfb1d84ad8e6d7a71e525732dab3509bea215091d7215edf1bcd1fec921427728a0c50ccf79056e29ce12d76f0781df7af9489ae28883aae36d12b3c4a49132214b356fb3aaf5772f955edebd58eb1234bd265e78b8406a4fe3827986d359436c061121f0b2c4e1bb2ae0074f308ba074fa218438adb51c7ca5ae984d0d8a23437d06a8759a43ceff0fbc0b7e8fa55e49e6bf9b3703827fa61102121411f977d5345073cbf5e1321932464921ce078f8b453c467c9aa0dbc087172a9e0a33c768ed858f44585a01642ed02d990163afb4202dc860a9de3fe1f24f3b74cf5e935e3b87351624d9e377262d9e97952622a0aa53c45c08c7e02adb5aba020d7be833eccd8d2b5a4bc8168b6c58f82598cdd9325c0264609baac4e056762d081bfa0c0308a69bc7541f652d46e60c322bd3c04261c3f46f7f6dfcfd35b911e5ae51e67314f1323d865ebf21373ef422373be51a5331a5f47adcbb7597f5e47fd0c30f161ac69fd01e82a019b89c19052c9ae65e3161b62ded259115722ae2548db55d2e374533d3a8acfb4a5fb1770953dcc76993c7e1ece6df4b3c45a25d19ba8861dc9f89179843bba703af54106d605fe5911a247a14ee20621a11fab8dd6ef48d04b37aed1dd238ceb4ebec6b6f09320968e3bf875f13b81e7e32a699b9dcdafe03ad904c99cfd66e9c33bafd9783f8a8ff581da919607db7b78e96e6a5b0f1cdb0a1e117e9d61544cb3e599111c364999039006b45c245bf56370c7b76060d1af1020eba629c0f7247bb27a225fdc991063e40dbee1e5c5b9f851d29b0eaea142aa4d1ed22206decab15bca7f608c686b5b0cc02772afa5169222387ef53552702af00b0036efcb1d0f8b5a119798f65142f3848b5ce004f721881cd5b8c553bbb6b00eabb8c16f3a3ece1327423f8aea5b919cdc78e9c1a0dfe2466084b75280cd94762d75406649a1af2fb383bff35882b183157f283af298d362779b0cc65f6b30ad74f06a95b5221513b347de3febe98fc18923a4ede7d4d38e9e5924caf10015949cb1e02b7da89b1363f1816b1ad9ed4a3df0975e760be57ccf70f693d097324038a5b89a00df0b064fe354c470a072e8bb8b5969c5be5cc63d4d93c421f1f7d68c55736648f73c00ddf15ca3d38b962a898927e01b1733fe6f0b95c05284b4465b5d18572792e1ca24fd39b8477fef0dab5125b49375517ca23ee3cb34442dc264e4f4175bdc22a5910ad3c87730503615bae33dd085715bdbd1375826dbacaff9cc5333d866824c3e92f4ca79d8f5f706a298904296d0ec6d0d61a7bc396fb5754264dbd414ce2469d44308f8b3e7f4beda40f7bfc9fff62cbfb3b15505ecae84fea92ad67c5963b5414a72aa7686938c47497bedd7d03a5b8e9db0225f3dccfc14f35993e2eb4423dc259a632d7e33620aa694f0d7cd6cae0c779e34126b66ce78aa08996b4cec52d56f4fa572dfd48e1babda3b208b99dc3e2b240fa74f44c5de1844b8848413b6d06e2a535de96dc7c8d75a4a7261d89daba13dddad8f5fc786ef11a356c70d77af9624b5d35f46dd623993d011004c25331a14c365906daa0ca57167780e6398d9877ccfc54be21e893fea7bcba3da06f2db82d9971bf65fd5b108b9830094bbb76b48bc0be96a91de910c2b29381d5bed343774c6f7c71a0d8162419d61504cfa75cd02c9fa972824e77a6ef74c4c199f26b333e8bfe82bada55e074b23118dc5b605f3498a770a6502a14c5f982e1b7b9405295a85324c4eb684babbebf87d9a19870cb4fc1945e5d5943876284cc8db2ea668f8a4aca9a270f0359f0680ef6e00d021e59681e5f6b39da06ccec4875f9bcfbbd52054c4f9b061fc50333fe0bb7e170e9f69d9676acc00198b13236cda9a5f2b68f1861ea7f45402e586c5c91e16bb17caf7cd505ee4661c89d3967e6e4366bce81398eb96fc3973db174f2f79f88ab5354e4cf904766b30c43f4bb02c9ea96ec69bd83792ef87e2b7cc81cb6295af0e6fc2a48087b6cd1fed826fa05077bdcd715245c8a936b99e0df45c1a94a67cb663d4a2193fc114d7931a048e30c6aa122f8b5f7b1d3c4256919ddd57ec689ee3831ed5a30feb76e378a7ffe3c51edce19ff883445d99db08ceacd7c110450ede1e528bd5e4def81b8aa75805df41d6c17b6a715ba9c1aaa9079a92200be4265a50ed6286e99a30b935963340a31f56d60d941b7f8f208919f9d08405d1d246454269ad9b0d749d39cd8b8ece7e6ca0774b6b65ed5bc360e205cf37ff9275fe8da99c5390c53ce42bd05134d140bd4bce8230c645fb667ed26975256bedbee8d89bbca2b39770385afe74f48e5b9e08310479132b12492fefb5d7f51c1f56f106583363a00eec39fa438f6a2d6da0725c9dcf8a2b70995923e7faf91f36752d902cb730a7013d06ca9f5a199034a969e247d17fafbeb1288de6f6b2dd16ac956f5d11a9e9bb07b80efa6ba3d0326f4236ff7a7eaa5517a4f9e40c62b64e0edae8ca0a8962d569c50440eb07c4f547b9d5d5e66c98564720967cdaf4537bac439fbc139296432430a2f554b43247be170f1a3918102c48a17cdd4623f8f6a8139f60859e8181306ce8b128ecff9ad7fba1cb75b5fb51922e5824c50829e70678557365b14bc3effcd60a5198122d38def7315645f601b57183325141a2d211de31640316bdf99806eaa02efc8507bc79bef9ef819b64f86c888d3d55af0c72aca79adde17df71262ba03d844d0b67e8159f8df520b9463ef1e800959894328b73c546b1fe810d6b5e3f67d7867639c3116a4c4a3c6a43ab0e2e2ee8a9388be5e9e3094cb842629e1edcc32a7df7bbf1b5c0b35493cd843e96fda7c370565e17db1f8a4fb06602237927c53acb22e0bdb4b3a0fd233988e08d2f89d069b6a71fe1daa78ffab5a6b1eb3b18169241a25bf732a1c8eb0d3857ac13fd3aba19ae5a29b2defdc27fba22c1923dc29e916d389b298e3c9fc1a5c393b9489e9fc45a9b519f3574b99d94aadb9007dcbe76abdc8f4bfe5c05b0d6e9803709c72a4f754922ee494dc2f90326fa71a6691e5c228e7ebc57f83a5de82b100bb2533cd574d02bc27a68b8f10013239131c0bd41bade9f81300cb3c4158f5688a3ad7d645b50c2bf54b701847788ebf70b5db99468ef63a6d1bb11a4f8ea81f581ce866254c75cdd347783a36dc94af57d67ce53291f0631843bfdece551997c5c24ec6356cc674906ed55828123d2dff45a9a4a6d73e1b8183cf6b9fba461e8c7573e3285c9c08036ab7d4709e59a72d122e3a45d35345ef2a27bd5d82f805aa635e7fd1af951c85d4054ab78b94752ce2a3de10dc1ba116ac99323ea09c1026859377f7f1bb54bd22469e66df6179269b4ddf44fe7e8a0060efa1e0fae12993f5d04794ae5d8508527c037f3d108e5824ceb9620e63ac67fda4087731ae4ded3e5f888dd5c84771640004d64b6a6328a724cea552efce31dda1dc213e5a56ff1c45f3db94035d5dc44b8e2c3d2effb9234d050e24ac3e813b4271ceb8fcc110b258adaa24bf5b3e83d8aab25679494d54a1f0239f0b6fbc54e3dc33a36522ecad868958df388b40f9c1b7f131101c6f09920545b7c6be53e3796abb1831be3659ceedcc5d149386a06bdf42559d3d9b05ddd780597241cda6315c0e21803b96b7a6b7f9a37284d9baae4de73f70c5385143da3fed0ca152cf10de8da1fb6ef264e809c08d8e144511b3fa5476321864d338c283d23df6649055de2d6eb25a172d37b851421c2902ff0c490dffad92abfc1aeb6d532287a197025089faff506204c6699f05aa919b4425a0aba44bd12a1727765b1788602b3a601b610f86ffec12a469775a6ce2257d767b27cef85bd3cb04b0b1a389c3431e1f58fdc5419f9c2cc7445aa05290d25e6ad2a43e601628a2971bd6921085dac128b62c6456346e8022f93d265b331548e3f3de65dc793ef881a23741d74b8b0c36020fe6999b5647dfd8ba52e2bc0ac3fbc0e24ad7a17412f2147bc39781af37bbbb6eeb74f559846c0324f526458845e16739a3d0d811139cd848ea078ac799997ca200d635888718784705619c0f282739f0cbcffbb39b088ee0ffa80f97157d52b59b94bf8ed8b6601e20db40611b64c67d8616e06c46677c8ca5880b532abd69cc050558f6097ceb9a0270a85ba7e1badc1d6f2c3205e3d646baa6c03e3576644147b47257bd8f1e67176c458271d9c7fbc289ad9a3af1e968f6e46c43151e577508f88b51a412995f0e289115c0229e960e5499c36be62a53bd4dba8d7766e104528b4e54872a25f09ed981eadbc5ff0297c77fdc934fc74c2df48d10b724043238bcdc9684ec5c373a9f34", 0x1000, 0x800}, 0x4040) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000002140)={0x2, [0x0, 0x0]}, &(0x7f0000002180)=0xc) ioctl$TCSETSF(r2, 0x5404, &(0x7f00000021c0)={0x0, 0x0, 0x2, 0x6, 0x17, 0x5, 0x70d, 0xffffffff80000001, 0x2515, 0x0, 0x1, 0x100000000}) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000002200)=0x2) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000002240), &(0x7f0000002280)=0x4) openat$ion(0xffffffffffffff9c, &(0x7f00000022c0)='/dev/ion\x00', 0x101100, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000002300)=0x54, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000002340)='illinois\x00', 0x9) ioctl$TIOCSBRK(r2, 0x5427) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000002380)=0x7f) write$binfmt_script(r3, &(0x7f00000023c0)={'#! ', './file0', [{0x20, 'vmnet1'}, {0x20, 'cgroup'}, {0x20, 'bdev\x11'}, {0x20, '/dev/ion\x00'}, {0x20, '/dev/input/mice\x00'}, {0x20, 'vmnet1\xff'}], 0xa, "5024b5657bfd853c79fe04bb4af7270e8896b49281fdc621b810190a87334cd22a948fa79a359e00c0fde3522f30982880dd827f86e8a68f4ff762c2611fd907d9f4338aebe8952f48c1f8962e3e0dd2681ca3426cf4b3b5fe627a2b7d5e007ae71805b6063ad4378fcc0154ba8a6070474e738d1ef348b113c9ce787b4a742c28c3fe184796"}, 0xc8) 17:49:00 executing program 3: bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="7f454c46060507000700000000000000020000000d0000001a0300000000000040000000000000009f02000000000000160000003f00380001000900ff0301000200000009"], 0x45) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) 17:49:00 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae3", 0x10}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:00 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7065727070703176302d757365000000000000000012bee197dcd49b01d21a4f3805d4595d860562b66a1789b70aee0cc692d5f2fbf8e72079c62155fdd8bba87824f09520f5585f03a8e1f5f99508f9d4409bad26246c181243f9d6"], 0x25) 17:49:00 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x20000, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40000, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={0x0, r2, 0x0, 0x6}, 0x14) r3 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x3de4, 0x200) io_setup(0xd70, &(0x7f00000001c0)=0x0) io_cancel(r4, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x8, r0, &(0x7f0000000200)="9bdf359bcb36f29fde447d2b5bbc01ccb1c7da696307516ae008ac5ffcd525c6597f8bbec2f3460993b5b47d1fa1f47244d1bb2edfb70c62e4e72e34081143b4d9a2ffb055d536c0344546fe5e3a1a70d5c440bc1d72627910f5e15d228034ebe52d43cd163eae003a72e74ef50b779cc1e8f23ca91557f36d88593dec93fd30909681c9b7e933fbf56a84012250cbeb65539caaced0450b531ad4e5fa9489caf6fa73e56f1c4f07b0dd8d4f9c037ed48a1c35aafd5fc7136ad8f5de2f6e801ddeed9d62bc2082ab55084011203a300f04771415a72e8e3e0f2aa88a88", 0xdd, 0x3, 0x0, 0x1, r1}, &(0x7f0000000340)) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f00000000c0)={{0x9, 0x9, 0x1ff, 0x8, 0x80000000, 0x79578069}, 0x6}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f0000000080)=0x9, 0x43) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) 17:49:01 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x5, 0x40002) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000040)={0x1, 0x0, 0x102, 0x2, {0x7, 0x8, 0x7f, 0x8}}) write$apparmor_current(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7065726d70726f66696c65203a222f35f26d307070703176626b786e657475736572008ac55a1248db6134c95a8422c924b59a3441dd645c8d02b49f84f13b55b2f6120866a7f7650aacde812094807864045818d9a53bc6faedf63e492f2ea05517db49d3414c1543ae04285084ad21b630ea1673229a5fadc1790f26d822e80e53383780b919f1ac3fc963e90f4e4bffdb17a05f888b1cb0bdf34ad6179d7495c0d1dbb718abfb8cac8ba17e6de38f196437afa2ed871698bb0000"], 0x25) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000140)=0x4) 17:49:01 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae3", 0x10}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:01 executing program 4: clone(0x201, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) execve(0x0, 0x0, 0x0) creat(&(0x7f00000001c0)='./file1\x00', 0x21) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) clone(0x3102001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$TCGETS(r0, 0x5401, 0x0) [ 370.252149] audit: type=1400 audit(1552844941.293:67): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F35F26D307070703176626B786E657475736572 pid=12137 comm="syz-executor.2" [ 370.273702] audit: type=1400 audit(1552844941.313:68): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F35F26D307070703176626B786E657475736572 pid=12137 comm="syz-executor.2" 17:49:01 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [{0x2de, 0x0, 0x8}, {0x0, 0x0, 0x1000}]}) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:49:01 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f00000000c0)={r0}) 17:49:01 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae3", 0x10}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 370.626855] audit: type=1400 audit(1552844941.663:69): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12157 comm="syz-executor.2" [ 371.027513] IPVS: ftp: loaded support on port[0] = 21 [ 371.144069] chnl_net:caif_netlink_parms(): no params data found [ 371.188882] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.195473] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.203090] device bridge_slave_0 entered promiscuous mode [ 371.211216] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.217745] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.225733] device bridge_slave_1 entered promiscuous mode [ 371.248906] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 371.259266] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 371.282652] team0: Port device team_slave_0 added [ 371.290049] team0: Port device team_slave_1 added [ 371.377771] device hsr_slave_0 entered promiscuous mode [ 371.445432] device hsr_slave_1 entered promiscuous mode [ 371.509393] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.515976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.522856] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.529519] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.584273] 8021q: adding VLAN 0 to HW filter on device bond0 [ 371.600003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 371.609391] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.617068] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.628294] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 371.643528] 8021q: adding VLAN 0 to HW filter on device team0 [ 371.656450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 371.664415] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.670997] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.688265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 371.696549] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.703035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.726485] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 371.735027] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 371.748640] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 371.763801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 371.779401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 371.792582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 371.820229] 8021q: adding VLAN 0 to HW filter on device batadv0 17:49:03 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672", 0x18}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xe, 0x4000000000000800, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000000), 0x0, 0x1}, 0x20) 17:49:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x848000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2714, 0x0, &(0x7f0000000000)) 17:49:03 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x80000, 0x0) write$P9_ROPEN(r0, &(0x7f0000000080)={0x18, 0x71, 0x1, {{0x10, 0x3, 0x1}, 0x1}}, 0x18) connect$vsock_dgram(r0, &(0x7f00000000c0)={0x28, 0x0, 0x2710, @reserved}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 17:49:03 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7065726d70726f66696c65203a222f2f656d307070703176626f78bd651577f4f36e65000000000000924f176f0e865ade113e5fbdafc142b4e558f5a0b156087e6c5c246801f47511c371bdf7028856c90d01a0c642baebd269b5a268cd9f7be5"], 0x25) 17:49:03 executing program 4: r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000640)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r2, 0x400c4301, &(0x7f0000000180)={0x0, 0x0, 0x8001}) read(r2, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) dup3(r1, r2, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000016) [ 372.187703] audit: type=1400 audit(1552844943.223:70): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F78BD651577F4F36E65 pid=12185 comm="syz-executor.2" 17:49:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) fchown(r0, 0x0, 0x0) 17:49:03 executing program 1: syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x9, 0x101400) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x8, 0x20000) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:03 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x3) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:49:03 executing program 5: socket$alg(0x26, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) memfd_create(0x0, 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) write$binfmt_elf64(r1, 0x0, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) 17:49:03 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672", 0x18}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000180)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) write(r0, 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0x35, &(0x7f0000000300)={0x1}, 0x8) [ 372.572989] audit: type=1400 audit(1552844943.613:71): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12207 comm="syz-executor.2" [ 372.640986] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:49:03 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x0, 0x6d, 0x20000000000001, 0x0, 0x0}, 0xbe) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000640)='/dev/null\x00', 0x10000, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, 0x0, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='\x00', 0x1, 0x2) write$tun(0xffffffffffffffff, 0x0, 0x0) vmsplice(r2, 0x0, 0x0, 0x8) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) restart_syscall() futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000001c0)={0x80000000, 0x6}) r4 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x40100, 0x0) keyctl$reject(0x13, r4, 0x3, 0x0, 0x0) tkill(r3, 0x4001000000000014) 17:49:03 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x401, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@ipv4={[], [], @loopback}}}, {{@in6=@initdev}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f00000000c0)={@mcast2, 0x0}, &(0x7f0000000100)=0x14) fstat(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@empty, 0x4e20, 0x4b, 0x4e21, 0x93, 0xa, 0x20, 0x0, 0x3a, r3, r4}, {0x0, 0x400, 0x7, 0xfa, 0x800, 0xfffffffffffffffe, 0x570a, 0x8000}, {0x9, 0xb5b6, 0x9, 0x81}, 0xfa9b, 0x6e6bb6, 0x1, 0x0, 0x1, 0x3}, {{@in6=@rand_addr="4302e9ba8e27a940268e0eaccdcd344b", 0x4d6, 0x33}, 0xa, @in6=@mcast1, 0x3501, 0x3, 0x3, 0x85f, 0x2, 0x200, 0xffff}}, 0xe8) 17:49:03 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000080)={0xd, 0x1, 0x9}) 17:49:03 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672", 0x18}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 372.926231] audit: type=1400 audit(1552844943.973:72): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12226 comm="syz-executor.2" 17:49:04 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x2, 0x6d, 0x0, 0x0, 0x0}, 0xbe) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000640)='/dev/null\x00', 0x10000, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) write$tun(0xffffffffffffffff, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) restart_syscall() futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000001c0)={0x0, 0x6}) r3 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x40100, 0x0) keyctl$reject(0x13, r3, 0x3, 0x0, 0x0) tkill(r2, 0x4001000000000014) 17:49:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, &(0x7f0000000040)=r0, 0x52d) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 373.024111] audit: type=1400 audit(1552844944.013:73): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12226 comm="syz-executor.2" 17:49:04 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2202, 0x2) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:49:04 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000140)={r2, 0x2, 0x5}, &(0x7f0000000180)={'enc=', 'oaep', ' hash=', {'rmd256\x00'}}, &(0x7f0000000200)="8f4062a067968d26ec601731c81274197958231288f9cd23dfe9a51ba4bf6b087e9dcf6b5b9f1d3d46ba8572286ad5bfdd1230571eaf04f9a2152747f51420ff45bb3a8610ebc357c4c6bd43ec93cee19928d03c70e018456c6647ade2f1b852b3b939e1428b9ef0e204b6718641278549fbdcb7ebf26524a28a147a7e454136f1998fbca8e81cc32e3ffa0c8e805ac964d86021405dd3f0919b0664b4682d06f97f6d5b0295091af3ecc12067204ccc56309ecc0c8b79c466662a759f41b55ea136632465ca00547ab740a3d02ffab82bb8302a291bd073a96a75da5d7b451d8fb8773f465b3b0b3fc0343190218c", &(0x7f0000000300)="0f235052e5dd6c4ee1ad81b62b08228d352e28299f9a18f91a001b438f1406b6e7f04cb48da9645201e192bcecad1423f75db9cc4d706953ea94b292f2c70fcb0373e892be56665bc63923381201682dc9a7b5c5aaa0ec5baf9531aa73515d") ptrace$peekuser(0x3, r1, 0x8) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x400000, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x7) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:04 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf7037", 0x1c}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 373.252462] audit: type=1400 audit(1552844944.293:74): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12242 comm="syz-executor.2" 17:49:04 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigprocmask(0x0, &(0x7f00000000c0)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x12) ptrace$cont(0x1f, r0, 0x0, 0x0) ptrace(0x18, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 17:49:04 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=@hat={'permhat ', 0x1, 0x5e, [':\"//em0ppp1vboxnet0-user\x00', ':\"//em0ppp1vboxnet0-user\x00', '/proc/thread-self/attr/current\x00', ':\"//em0ppp1vboxnet0-user\x00', 'trusted\x00', 'kposix_acl_access\x00', 'permprofile ', 'wlan1\x00', 'trustedtrusted,}\x00', '/proc/thread-self/attr/current\x00']}, 0xe1) 17:49:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) select(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9cf, 0x1}, 0x0, &(0x7f0000000140)={0x0, 0x6, 0x0, 0x10000, 0x0, 0x62d0, 0x5355}, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x1, 0x2}) r1 = syz_open_pts(r0, 0x88802) ioctl$TCSBRKP(r1, 0x5425, 0x858) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000300)=0x54) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffeec) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x10000014c) eventfd(0x6) bind(r4, &(0x7f00000003c0)=@l2={0x1f, 0x7ff, {0x0, 0x1, 0x7, 0x1, 0x10001, 0x6}, 0xc0, 0x7aa3}, 0x80) ioctl$EVIOCGPHYS(r3, 0x80404507, &(0x7f0000000340)=""/74) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 373.634137] audit: type=1400 audit(1552844944.673:75): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=12265 comm="syz-executor.2" 17:49:04 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f37, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:49:04 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x50000, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000004c0)={@dev}, &(0x7f0000000500)=0xc) r1 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc74, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000140)={@mcast1, 0x0}, &(0x7f0000000180)=0x14) bind(r2, &(0x7f00000001c0)=@hci={0x1f, r3, 0x3}, 0x80) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000029c0)='net/rt_cache\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000002a00)={0x7, 0x2, 0x4, 0x40, 0x0}, &(0x7f0000002a40)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000002a80)={r5, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, &(0x7f0000002b40)=0x84) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x40, 0x0) ioctl$RTC_PIE_OFF(r6, 0x7006) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000100)={0xffffffffffffffff}) r8 = getpid() write$FUSE_LK(r6, &(0x7f0000000280)={0x28, 0xffffffffffffffda, 0x4, {{0x94, 0x7fffffff, 0x3, r8}}}, 0x28) getsockopt$XDP_STATISTICS(r7, 0x11b, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x18) 17:49:04 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf7037", 0x1c}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:04 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000040)=@nullb='[d::]:,65.:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ceph\x00', 0x0, 0x0) 17:49:04 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7065726d70726f66696c6520297d7065737347504c76626f786e65743100fe8ce6b059dded79880cb357710ab7adabfc342916adfac5849c57ed35087b8af6436f74ff06caac7bdfdadc4927614aacd9968e746e04293220ebc6eace5478034ccfcaa7def92738df6217ecae6e004665312538c2f3cf67365843b00000000088a02990fb128a798aeaf6fa4e2ef2b7081ca620744e04b45d9e7b29df4de3c1f5d9ded48659aa"], 0xffffffcc) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, 0xffffffffffffffff) write$UHID_INPUT(r1, &(0x7f0000000180)={0x8, "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", 0x1000}, 0x1006) accept$alg(r1, 0x0, 0x0) [ 373.877612] libceph: resolve '65.' (ret=-3): failed [ 373.882810] libceph: parse_ips bad ip '[d::]:,65.' [ 373.940932] audit: type=1400 audit(1552844944.983:76): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=")}pessGPLvboxnet1" pid=12286 comm="syz-executor.2" [ 373.969440] QAT: Invalid ioctl 17:49:05 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x10, r0) ptrace$setregs(0xf, r0, 0x0, 0x0) [ 374.011240] audit: type=1400 audit(1552844945.033:77): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=")}pessGPLvboxnet1" pid=12286 comm="syz-executor.2" 17:49:05 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x1, 0x200) getsockname$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:05 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf7037", 0x1c}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:05 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7065726d70726f66696c65203a22142f656d307070703176626f786e6574302d7573657200c650305bf4e55205b1e63052544fd8e71c6adf5b0be31a79a0b1b4d51d0521b79662999d048f6c1e357d80085c6f0aa814a9ea8ea3894f20e51bc58a5027a11f4b38005454297963638998989fb4ce4fbbfc18dc6c980d80ac55b6fcc3b00bf09c05f26b7c6c4d55531f58"], 0x25) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x103000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000040)="4367020349ed1c1a261086298d3fb4530e9502f247d93138f270cadd86fd10806f8b0d7d7a5252620cccaf3cb4644e2f1e50", 0x32, 0x4000000, &(0x7f00000001c0)={0x11, 0x3, r2, 0x1, 0x5, 0x6, @remote}, 0x14) r3 = getpid() ioprio_set$pid(0x3, r3, 0x1f) 17:49:05 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 374.338424] audit: type=1400 audit(1552844945.383:78): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A22142F656D307070703176626F786E6574302D75736572 pid=12304 comm="syz-executor.2" 17:49:05 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3", 0x1e}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 374.437467] audit: type=1400 audit(1552844945.413:79): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A22142F656D307070703176626F786E6574302D75736572 pid=12304 comm="syz-executor.2" 17:49:05 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) fsync(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000080)=@int=0x1, 0x4) 17:49:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r0, &(0x7f0000847f95), 0x0}, 0x18) 17:49:05 executing program 3: clone(0x20000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0xb) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, 0x0) 17:49:05 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3", 0x1e}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:05 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000000000)={0x6, 0x0, 0x3002, 0x7, 0x2, 0x3, 0xfffffffffffffffb}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r0, 0xd, 0x3}, 0x14) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7065826d70726f66696c65203a222f2f656d307070703176b068e574302d75736572000000000000000000000000000000"], 0x25) 17:49:06 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x10, r0) ptrace$setregs(0xf, r0, 0x0, 0x0) 17:49:06 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000500)="3e154869ee93ecfb98fc1840e71d8dc15c4d788cad1d4dda1c5e189ac4f73beacdbd7e86c80306943f5fbb45755bd6", 0x2f}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3", 0x1e}], 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:06 executing program 1: lsetxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', &(0x7f0000000140)='\x00', 0x1, 0x2) r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40043, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000080)=0x107) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 17:49:06 executing program 3: unshare(0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) sync() mount(0x0, 0x0, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000006c0)=0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) setpriority(0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x3ffffeb, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) 17:49:06 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=ANY=[@ANYBLOB='permprofile :\"//em0ppp1oxnet0-user\x00\x00\x00'], 0x25) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 17:49:06 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x10, r0) ptrace$getregset(0x4201, r0, 0x0, 0x0) 17:49:06 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:06 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) socket$inet(0x2, 0x80006, 0xfff) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x1f, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x80000001}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000140)={r3, 0x9f8, 0x9, 0x1622, 0xa82, 0xffffffffffffffff}, &(0x7f0000000180)=0x14) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000200)=0x1, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f00000001c0)=ANY=[@ANYBLOB="030000009e0100004573000000000000e1ffffffffffffff0000010000000000060000000000000002000000000000000700080000000000"]) 17:49:06 executing program 2: ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000040)={0x3, 0x5f1}) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) socket$key(0xf, 0x3, 0x2) r1 = semget(0x1, 0x3, 0x22) semctl$IPC_INFO(r1, 0x7, 0x3, &(0x7f0000000100)=""/168) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x3ff, 0x3, &(0x7f0000000000)=0xfd}) 17:49:06 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 17:49:06 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:06 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=@hat={'changehat ', 0x2, 0x5e, ['securityeth1\x00', 'permprofile ', '%vboxnet0\x00', ':\"//em0ppp1vboxnet0-user\x00', ':\"//em0ppp1vboxnet0-user\x00', '@\x00', ']:&)\\]/}nodev[security\\}!wlan0#-vmnet0\x00']}, 0x9b) 17:49:07 executing program 4: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="00010000683bd51f360604490fe4ce1ec2607713e075a6ce72f473004b3a0046e708000806007ab1279b86b0f2265dc5feebdbf17613072b19"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:49:07 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:07 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:07 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=ANY=[@ANYRES32=r0], 0x1) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x600, 0x0) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f00000002c0)='/dev/snapshot\x00', 0xe) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000280)={0x5, &(0x7f0000000200)=[{}, {}, {}, {}, {}]}) write$P9_RREADDIR(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="e4000000290200010100000002000000060000fbffffffff00000000000000000807002e2f66696c653040030000000800000000000000ffffff7f000000000107002e2f66696c653000080000000500000000000000f8ffffffffffffff0507002e2f66696c6530410400000004000000000000000500000000000000c507002e2f66696c65304004000000040000000000000000000000000000000007002e2f66696c65302800000000040000000000000005000000000000000907002e2f66696c653002000000000100000000000000ffff0000000000000007002e2f66696c6530"], 0xe4) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f00000000c0)={0x52d, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000400)='/dev/dsp#\x00', 0x401, 0x86040) 17:49:07 executing program 3: 17:49:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchmod(r0, 0x0) 17:49:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000580)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000005c0), 0x12) 17:49:07 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3, 0x208000) fstat(r1, &(0x7f0000000140)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f00000000c0)) syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x9, 0x80004) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f00000001c0)={0xe, @capture={0x1000, 0x0, {0x3, 0x5ce}, 0x6, 0x4}}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:07 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {0x0}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:08 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000000)=@hat={'permhat ', 0x4, 0x5e, [':\"//em0ppp1vboxnet0-user\x00']}, 0x34) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0', [{0x20, '/dev/mixer\x00'}, {0x20, '^cgroup!'}]}, 0x20) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x2000, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) 17:49:08 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {0x0}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:08 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = accept(r0, 0x0, &(0x7f0000000080)) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) r2 = semget$private(0x0, 0x2, 0x1) semctl$GETVAL(r2, 0x7, 0xc, &(0x7f0000000180)=""/191) r3 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) 17:49:08 executing program 3: 17:49:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f37, 0x5, 0x8, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:49:08 executing program 4: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x800000) lseek(r3, 0x0, 0x3) [ 377.238652] kauditd_printk_skb: 5 callbacks suppressed [ 377.238691] audit: type=1400 audit(1552844948.283:85): apparmor="DENIED" operation="setprocattr" info="current" error=-22 profile="unconfined" pid=12433 comm="syz-executor.2" [ 377.260161] audit: type=1400 audit(1552844948.283:86): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=12433 comm="syz-executor.2" 17:49:08 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {0x0}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:08 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:49:08 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x7, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:08 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000340), 0x4) socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x0, 0x68e9) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x4}, 0x28, 0x1) listxattr(&(0x7f0000000480)='./bus\x00', &(0x7f0000000680)=""/83, 0x53) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) accept$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141046, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) [ 377.537064] audit: type=1400 audit(1552844948.583:87): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12454 comm="syz-executor.2" 17:49:08 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000540)}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:08 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000380)='/dev/amidi#\x00', 0x6, 0x40) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000400)=0x8) socket$pptp(0x18, 0x1, 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x400, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x120, r2, 0x900, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1ff}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6bc}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA={0x90, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffb}]}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x40000}, 0x1) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x3ff, 0x0, 0x10002, 0x734}) ioctl$DRM_IOCTL_SG_ALLOC(r4, 0xc0106438, &(0x7f00000000c0)={0x6, r5}) write$apparmor_current(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="7065726d70726f66696c269b97f72f2f656d1a7070703176626f786e6574302d7573657200"], 0x25) [ 377.732700] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:49:08 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000540)}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:09 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000100)=""/183) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x4000c1, 0x0) syz_open_pts(r2, 0x200400) 17:49:09 executing program 5: syz_execute_func(&(0x7f00000002c0)="3666440fe8f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3356f") mknod(&(0x7f0000f80000)='./file0\x00', 0x10000000001040, 0x0) clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x4000000007, &(0x7f0000a9cff8)) r0 = getpid() execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ptrace(0x10, r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) accept(r1, 0x0, 0x0) ptrace(0x11, r0) 17:49:09 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000040)=[0x1, 0x2]) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="7065706d70726f66696c65203ad07a9fd447c8730af3ba222f2f656d307070703176006f786e657430007573657200"], 0x25) 17:49:09 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000540)}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 378.193066] audit: type=1400 audit(1552844949.233:88): apparmor="DENIED" operation="setprocattr" info="current" error=-22 profile="unconfined" pid=12485 comm="syz-executor.2" 17:49:09 executing program 4: 17:49:09 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x100000001, 0x200) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r1) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x9, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) 17:49:09 executing program 2: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000100)={0x2, 0x0, 0x10001, 0x80000001}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, r0, 0x0, 0xa, &(0x7f0000000200)='+security\x00', 0x0}, 0x30) fsync(r3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, r0, 0x0, 0x12, &(0x7f00000001c0)='/dev/loop-control\x00', r4}, 0x30) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x2, 0x7, 0x3}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000140)={0xfffffffffffff801, r1}) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000040)={'nr0\x00', 0x2}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x2000, 0x0) r5 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r5, &(0x7f0000000480)=ANY=[@ANYBLOB="7065726d00c06f66696c65203a222f2f656d307070703176626f786e6574302d7573657200"], 0x25) 17:49:09 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae3", 0x10}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:09 executing program 3: 17:49:09 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae3", 0x10}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:09 executing program 4: 17:49:09 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7065726d70726f66696c65203a222f2f656d307070703176626f786e6574302d7573657200fcfe2fb331f4972316d9c1d7fa40b77d8cc0d4f73d6529678aa3fadd24aa1e3bff3988f463b5115008db6430981221153998e87a5d3c083d0194d54b5fa62669ccdb96d258df64c6d71b3520d64eea442c655d54692e4c0c2e1b0aaacc0bef499af48013a55b9c76140ea64ec9b39116b15e3d2fa5c03b91611ee0f89b1896e7f334fee44342fb8495f8b10c5e7c50f01a12f6d31afb20c984bda190b1bd1d7dd42ce8c6efacb0b512b6fe2ba1cd0f9e5eec475f7d347a3723029db33d7b2d66ead4e289a16b"], 0xfffffffffffffe7d) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="21f67db2ece5b1f61a1a3793b8d3cea73ca8d0336ff1a4e432273324a94b8ce0eb9b", 0x22, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000080)=@assoc_value, &(0x7f0000000100)=0x8) 17:49:09 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in=@loopback, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e22, 0x7ff, 0x4e22, 0xffffffffffffffc0, 0xa, 0x20, 0x20, 0x2b, r1, r2}, {0x4, 0x9da4, 0xd53daa5, 0xfffffffffffffff9, 0x4, 0x9}, {0xfffffffffffffff5, 0x7, 0x8, 0x3f6}, 0x3f, 0x6e6bb4, 0x1, 0x0, 0x2, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d5, 0x3c}, 0x2, @in6=@remote, 0x0, 0x1, 0x1, 0xfffffffffffffffd, 0xffffffff, 0x1}}, 0xe8) r3 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) [ 378.860706] encrypted_key: insufficient parameters specified [ 378.934072] encrypted_key: insufficient parameters specified [ 378.955392] ptrace attach of "/root/syz-executor.5"[12483] was attempted by "/root/syz-executor.5"[12529] 17:49:10 executing program 5: 17:49:10 executing program 4: 17:49:10 executing program 3: 17:49:10 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae3", 0x10}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:10 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x1, 0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000080)=0x9) 17:49:10 executing program 3: 17:49:10 executing program 4: [ 379.279165] audit: type=1400 audit(1552844950.323:89): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12543 comm="syz-executor.2" [ 379.300989] audit: type=1400 audit(1552844950.323:90): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12543 comm="syz-executor.2" 17:49:10 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0xfffffffffffffffc, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x8001, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000180)={0x0, 0x1ff}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000200)={r2, 0x8}, &(0x7f0000000240)=0x8) r3 = socket$kcm(0xa, 0x6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, &(0x7f0000000080)={0x5f, @empty, 0x4e23, 0x4, 'rr\x00', 0x1, 0xfff, 0x53}, 0x2c) eventfd2(0x0, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x40400, 0x2) ioctl$VHOST_SET_LOG_FD(r5, 0x4004af07, &(0x7f0000000100)=r0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) 17:49:10 executing program 5: 17:49:10 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x10000) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000000080)=0x4) write$apparmor_current(r0, &(0x7f0000000480)=ANY=[@ANYBLOB='mprofile :\"//em0ppp1vboxnet0-user\x00'], 0x25) 17:49:10 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672", 0x18}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 379.587576] IPVS: set_ctl: invalid protocol: 95 0.0.0.0:20003 [ 379.621297] audit: type=1400 audit(1552844950.663:91): apparmor="DENIED" operation="setprocattr" info="current" error=-22 profile="unconfined" pid=12558 comm="syz-executor.2" 17:49:10 executing program 3: 17:49:10 executing program 4: [ 379.720836] IPVS: set_ctl: invalid protocol: 95 0.0.0.0:20003 17:49:10 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672", 0x18}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:10 executing program 2: setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f00000000c0)=@v1={0x2, "545e826471d2bd"}, 0x8, 0x3) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:49:10 executing program 5: 17:49:10 executing program 3: [ 379.893444] audit: type=1400 audit(1552844950.933:92): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12571 comm="syz-executor.2" 17:49:11 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='netdevsim0\x00') bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:11 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8000, 0x0) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f00000000c0)=0x401) write$apparmor_current(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7065726d70726f66696c65203a222f2f656d307070700200786e6574302d757322a2d1fc3d5a657200"], 0x25) 17:49:11 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672", 0x18}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:11 executing program 4: 17:49:11 executing program 3: 17:49:11 executing program 5: 17:49:11 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r1, 0xb, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 380.228486] audit: type=1400 audit(1552844951.273:93): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D3070707002 pid=12584 comm="syz-executor.2" 17:49:11 executing program 3: 17:49:11 executing program 4: 17:49:11 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf7037", 0x1c}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:11 executing program 3: 17:49:11 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:11 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000000c0)={r1, 0x9044, 0x7}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-generic\x00'}}, &(0x7f0000000180)="56c579461801ca2b93878cfa2af16fb3f3f47705a0dfa8316626a57d5de50b50995c7d717b64459dc994e978c74d0648f46fe4a8af9b9941023677d4ca212ef76373706c3cd57cfa524636ac18d527cc305c79f117cf4c2ebfe84e131043aba5a9a5ef9653e52d4143aa4ce76f5241d57dc11264970c0aea253f594d882b62321690bdb6cdbd95f59a842e39d375a7219ba131e33c", &(0x7f0000000240)=""/178) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:49:11 executing program 5: 17:49:11 executing program 4: 17:49:11 executing program 3: [ 380.757549] audit: type=1400 audit(1552844951.803:94): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12610 comm="syz-executor.2" 17:49:11 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf7037", 0x1c}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:12 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="70f6000000000000006c65203a222f2f656d30707070317662afe2c0736a5cac7d5887d26a0f5e70636f786e6574"], 0x25) 17:49:12 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x7fffffff, 0x10000) getsockname$netlink(r1, &(0x7f0000000100), &(0x7f0000000140)=0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x4, 0x0) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x1) 17:49:12 executing program 5: 17:49:12 executing program 3: 17:49:12 executing program 4: 17:49:12 executing program 5: 17:49:12 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x2, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000180)='self\'trustedkeyringkeyring}[\x00', 0x1d) r1 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@mcast1, @rand_addr="c79585c5ad596d70fa8a364bbfe8c90e", @rand_addr="32e6a3672a42e06073d43a4301e35016", 0x6, 0x10000, 0x3, 0x100, 0xc0, 0x0, r2}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000080)={'veth1_to_hsr\x00', {0x2, 0x4e22, @loopback}}) 17:49:12 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf7037", 0x1c}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:12 executing program 3: 17:49:12 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x14000, 0x0) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000040)) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:49:12 executing program 4: 17:49:12 executing program 5: 17:49:12 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3", 0x1e}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:12 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:12 executing program 3: 17:49:12 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}}, 0x1c) listen(r1, 0x4) write$apparmor_current(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="7065726d696c65ff64740000000000000000000000"], 0x25) 17:49:12 executing program 4: 17:49:12 executing program 5: 17:49:12 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3", 0x1e}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:13 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x400, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x84000, 0x0) socket$kcm(0x29, 0x5, 0x0) fanotify_mark(r1, 0x2, 0x28, r2, &(0x7f0000000100)='./file0\x00') ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:13 executing program 3: 17:49:13 executing program 5: 17:49:13 executing program 4: 17:49:13 executing program 2: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 17:49:13 executing program 3: 17:49:13 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000440)="0beecf944f299363bc969b9fe7273c102bf9dc7561c151a6f6dcb2a0b25a59ac54956096c5051f4efa70ff35fbed24926ba623aac917de64c3e6243e1b5952600ef8d52e33af778a42ce40d49da687db210d5f4f0873cadefbdbec9b54036fede6defb89da82e1af53108748bc3377abf6d16f32b5beeb15d76ac218568ed6008ddbec5f4685feea2853c471ae97aee5a28aaac9b671e9cd5479af72ac42c455", 0xa0}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3", 0x1e}], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:13 executing program 5: 17:49:13 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@md5={0x1, "5a7b3183861e7ec5c8caf95c74c02b34"}, 0x11, 0x2da1cbbfdd5a1d53) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x3, 0x500000000000}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r2, &(0x7f0000000140)=0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) write$P9_RLERROR(r0, &(0x7f0000000200)={0x16, 0x7, 0x2, {0xd, 'security.ima\x00'}}, 0x16) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x100, 0x0) ioctl$VIDIOC_S_AUDIO(r3, 0x40345622, &(0x7f0000000280)={0xe7, "77a1f89ec5d3690b1c0b7c78786da760ac78c61df51a0174b454e5a591ce0f31", 0x2, 0x1}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:13 executing program 3: 17:49:13 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x4384, 0x100) write$apparmor_current(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="6368616e6765686174203078303030503030303030303030303030305e75736572656d30290004289d5cd6872473b7c49a7bb2ee4f8924b8fe071f4f9c9a307b71e7c1c4e0923a7024017f3a2ce5bec24b8d426e79553ee6c789be36c824f19b86c2b37171adfb49ee34c28ed5ac05ecafa0e73861a8c53bc9a70ce907e71ad9e488faac10dc9c8dce144f1dda32453ed6f5a823c55d28e932499afb9f17cb46d679d173930e3779be10cfeb008cc63d8fd243c3b2424a79bf043f769936bdde880befc43e29a35d1233d84e4952e964d8"], 0x26) 17:49:13 executing program 4: 17:49:13 executing program 5: [ 382.661077] sctp: [Deprecated]: syz-executor.1 (pid 12694) Use of int in maxseg socket option. [ 382.661077] Use struct sctp_assoc_value instead 17:49:13 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 382.752449] AppArmor: change_hat: Invalid input '0x000P000000000000^userem0)' [ 382.816634] sctp: [Deprecated]: syz-executor.1 (pid 12694) Use of int in maxseg socket option. [ 382.816634] Use struct sctp_assoc_value instead 17:49:13 executing program 3: 17:49:13 executing program 4: 17:49:14 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="701e04416a65726d70726f66696c65203a222f2f656d307070703176626f786e7d657200"], 0x25) 17:49:14 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 17:49:14 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0/../file0\x00', 0x2000000, 0x19c) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x10) open$dir(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff6000/0x8000)=nil, 0x8000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@ipv4={[], [], @local}}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) llistxattr(0x0, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) 17:49:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x2000000110007e) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, "b4e6983e4fb1e1f6ead0174bd1b16414783f6794286ca146db5f9ca67ce1d40bd9bed600359f39b1f57bdf6af3437ef6fede6e603d31867726a7e4b201b11d1c", "c52d00b2b65ed68814b7ccc1a1e4679c755db8ef0dd7aefe2f64f730c1e50e0e24f06e735978463dae786b678d338e4a41f5a72371149feccdaba8d207b876d3", "62afa485f57bfb3816f0de66f001f8efb5b24a8e20ae85e07864d252552c8795"}) [ 383.116729] kauditd_printk_skb: 1 callbacks suppressed [ 383.116759] audit: type=1400 audit(1552844954.163:96): apparmor="DENIED" operation="setprocattr" info="current" error=-22 profile="unconfined" pid=12713 comm="syz-executor.2" [ 383.138022] audit: type=1400 audit(1552844954.163:97): apparmor="DENIED" operation="setprocattr" info="current" error=-22 profile="unconfined" pid=12713 comm="syz-executor.2" 17:49:14 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) r2 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) write$P9_RREAD(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="4b000000750200400000000c045ef53513b0ac63ab3ab5b8f8c6cd34a1af3627f2361b513fcb076f3dab185dc75d24d3358769f40ffec9af3bacf70f9c6fdb87fdb0e0c2d0767ccd8d727c642bf3abdf3e3d160effabaf14b82d8d81463a1c2f7a298bc497cad47e1e3af58113ecef74fd1b4ccd975937bd689ab468f6921670d7c7790080178613de747436f516e8263499e46ee250faf6527db395d5c78e34f77342a8ed3d4f208f1c9d80f5f6080505d6c1987a5ecebf9fbea569c6a3715fbb81b73f80b1fc5ef83f2a72"], 0x4b) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U+', 0x6}, 0x28, 0x2) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80000, 0x0) write$P9_RLCREATE(r3, &(0x7f00000000c0)={0x18, 0xf, 0x6, {{0x0, 0x3, 0x7}, 0xef24e61}}, 0x1032e) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 17:49:14 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:14 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x96140) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000040)=0x5) [ 383.266735] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:49:14 executing program 3: r0 = syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)) [ 383.460106] audit: type=1400 audit(1552844954.503:98): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12731 comm="syz-executor.2" [ 383.482033] audit: type=1400 audit(1552844954.503:99): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12731 comm="syz-executor.2" 17:49:14 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7165723524a265203a222f2f656d3070707f3176626f78b5535677563393cd9e97b10649de1a97f449bb6abcb96c36dcd2e6d6ff0f3e4e2e85a918fef75042acd8699fb87c2d92c2f8357e57351ddee90ef4a63f7928f87cbb138228f353d25846fd1d96e921f15cc724fa0e4cf025acf86d98c7eef041dbfbb67b4ea6053f203f59717195a2a4348fb9caaac3e0869fa851d305"], 0x25) 17:49:14 executing program 3: 17:49:14 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 383.697957] audit: type=1400 audit(1552844954.733:100): apparmor="DENIED" operation="setprocattr" info="current" error=-22 profile="unconfined" pid=12743 comm="syz-executor.2" 17:49:14 executing program 4: 17:49:14 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) prctl$PR_GET_SECUREBITS(0x1b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x501000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:17 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004fc0)=@known='user.syz\x00', 0x0, 0x0) 17:49:17 executing program 3: 17:49:17 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:49:17 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {0x0}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x4002011, r2, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:49:17 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x0, 0x10000) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f00000000c0)={0x6}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 386.569015] audit: type=1400 audit(1552844957.613:101): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12767 comm="syz-executor.2" 17:49:17 executing program 3: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x4002011, r2, 0x0) 17:49:17 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x200, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast1, @rand_addr=0xbb, 0x0, 0x3, [@multicast1, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}]}, 0x1c) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x20016d5) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) socket$inet(0x2, 0x80f, 0x7ff) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={r0}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x8082, 0x0) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000140)) 17:49:17 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000280)=@profile={'permprofile ', '/dev/dsp\x00'}, 0xfffffffffffffc3d) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000240)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f0000000040)={0x87, 0x2, &(0x7f00000000c0)="37cc36036e479bd634b27af8bc96081287615f73db5f0a32b9637c97b1996e29b93336b72d7132c6320b6b9f640b2b0f3f1034f173eded04bd569755453391d926a5616e3ce76aca22c3948e0fd845e0fa0c4e138b6ba7ff9e086ee556c90d63f7598ec3a9ba011cd4323db6145862fc7403d033ee14bfa7b7f7cae4788b583e4cdb6ec9375ec1a0acae09eaa6c5430642470ccbab", {0x6, 0x2870, 0x44495658, 0x7, 0x9, 0x6, 0xf}}) 17:49:17 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {0x0}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x4002011, r2, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:49:17 executing program 4: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c61, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x4a00440}, 0xc) getsockname$netlink(r0, 0x0, &(0x7f0000000080)) 17:49:18 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {0x0}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:18 executing program 1: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0xea04, 0x1) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) socket$tipc(0x1e, 0x5, 0x0) 17:49:18 executing program 3: 17:49:18 executing program 4: 17:49:18 executing program 3: 17:49:18 executing program 5: 17:49:18 executing program 4: 17:49:18 executing program 3: 17:49:19 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000540)}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:19 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x80) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f00000000c0)={0x0, @reserved}) socket$caif_stream(0x25, 0x1, 0x3) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) 17:49:19 executing program 5: 17:49:19 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x5}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000100)=r2, 0x4) 17:49:19 executing program 4: 17:49:19 executing program 3: 17:49:19 executing program 4: [ 388.205103] audit: type=1400 audit(1552844959.253:102): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12830 comm="syz-executor.2" 17:49:19 executing program 3: 17:49:19 executing program 5: 17:49:19 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) ioctl$LOOP_CLR_FD(r0, 0x4c01) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 17:49:19 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000540)}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 388.368259] audit: type=1400 audit(1552844959.333:103): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12830 comm="syz-executor.2" 17:49:19 executing program 4: 17:49:19 executing program 3: 17:49:19 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1f, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0xffffffffffffffff}, 0x30) write$FUSE_LK(r1, &(0x7f0000000100)={0x28, 0x0, 0x5, {{0x4, 0xffffffffffffff00, 0x0, r2}}}, 0x28) write$apparmor_current(r0, &(0x7f0000000140)=@hat={'permhat ', 0x4, 0x5e, ['permprofile ', 'o\x00', ':\"//em0ppp1vboxnet0-user\x00', 'permprofile ', 'permprofile ', 'permprofile ', '/proc/thread-self/attr/current\x00', 'permprofile ', '{\x00']}, 0x93) 17:49:19 executing program 5: 17:49:19 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000140)={r0}) 17:49:19 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000540)}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:19 executing program 3: [ 388.767725] audit: type=1400 audit(1552844959.813:104): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=12852 comm="syz-executor.2" 17:49:19 executing program 4: 17:49:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xd) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'irlan0\x00', {0x2, 0xc781, @remote}}) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:49:20 executing program 5: 17:49:20 executing program 3: 17:49:20 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae3", 0x10}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:20 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0xba1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, 0x80000000000, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x71ecd37e, 0x0, 0xffffffffffffffff, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0x4) fsetxattr$security_evm(r0, &(0x7f0000000400)='security.evm\x00', &(0x7f00000003c0)=ANY=[@ANYRESHEX=r0], 0x1, 0x2) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000100)) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') bind$rxrpc(r2, &(0x7f00000000c0)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0xfff, @local, 0x401}}, 0x24) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x18, r3, 0x501, 0x70bd26, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4041}, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000002c0)={0x6, 0x3, 0x3}) [ 389.150432] audit: type=1400 audit(1552844960.193:105): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12869 comm="syz-executor.2" 17:49:20 executing program 5: 17:49:20 executing program 4: [ 389.280523] audit: type=1400 audit(1552844960.323:106): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12869 comm="syz-executor.2" 17:49:20 executing program 5: 17:49:20 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae3", 0x10}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:20 executing program 2: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000000)=""/32) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:49:20 executing program 3: 17:49:20 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc7, 0x0, 0x0, 0x40043, @perf_config_ext={0xfffffffffffffffd, 0x6}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 389.647816] audit: type=1400 audit(1552844960.693:107): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12894 comm="syz-executor.2" 17:49:20 executing program 4: 17:49:20 executing program 5: 17:49:20 executing program 3: 17:49:20 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="70652e32726d686174203078303030303030303030303030303030315e3a222f2f656d307070703176626f786e6574302d7573657200766d6e6e70ff65743000402f5e230027002f70726f632f7468726561642d73656c662f617474722f6375727265"], 0x61) writev(r0, &(0x7f0000000200)=[{&(0x7f00000000c0)="9ff436e26eb764a6d542", 0xa}, {&(0x7f0000000100)="a65540ea047e27156053928dd93a9583523460c71af7a02ee5edc5986c86b30d976f7f060a4fe2ff2048ffa2927adccd9e4a94e04245bf8a2a97108871ba6341425d30a9cffdf0d294d40573fd7bbae20f1dea4473e9bfec83054bbd4cc96d9edbf0216544acc300109052ad684ade3cdc79344d3f743df0781c4f33ce03d597a87a3f036d5b2918206bb4aec1d67a7175d1c8d6247c9fb0f5d6b8c76cc45188f74327b860f72d8177aeb3d13eeecfc0ca969c62b706b52ec3728518f7b3f1fbdc34c4f79dddea7730", 0xc9}], 0x2) 17:49:21 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae3", 0x10}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 389.982757] audit: type=1400 audit(1552844961.023:108): apparmor="DENIED" operation="setprocattr" info="current" error=-22 profile="unconfined" pid=12910 comm="syz-executor.2" 17:49:21 executing program 3: [ 390.039983] audit: type=1400 audit(1552844961.053:109): apparmor="DENIED" operation="setprocattr" info="current" error=-22 profile="unconfined" pid=12910 comm="syz-executor.2" 17:49:21 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x109100, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000100)={0x7, 0x10000}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x2, 0x0) ioctl$BLKRRPART(r2, 0x125f, 0x0) 17:49:21 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000200)={@dev, 0x0}, &(0x7f0000000240)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000000280)={@multicast1, @initdev, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @remote}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000440)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000480)={@mcast1, 0x0}, &(0x7f00000004c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0xe4, r2, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0xbc, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xff}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x4}}]}, 0xe4}, 0x1, 0x0, 0x0, 0x4000000}, 0x2400c085) write$apparmor_current(r0, &(0x7f00000000c0)=@hat={'permhat ', 0x0, 0x5e, ['\x00', '*security+wlan1(keyring[^+${\x00', '/proc/thread-self/attr/current\x00', '\x00']}, 0x59) 17:49:21 executing program 5: 17:49:21 executing program 4: 17:49:21 executing program 3: 17:49:21 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672", 0x18}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:21 executing program 5: 17:49:21 executing program 3: 17:49:21 executing program 4: 17:49:21 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672", 0x18}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:21 executing program 2: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x40000) 17:49:21 executing program 5: 17:49:21 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x10380, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x3a2f}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000200)={r2, 0x6}, &(0x7f0000000240)=0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) modify_ldt$write2(0x11, &(0x7f0000000080)={0x8, 0x1000, 0x2000, 0x9, 0xd4a, 0x7fff, 0x200, 0x3, 0x0, 0x8}, 0x10) unlink(&(0x7f0000000100)='./file0\x00') ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r3, 0x111, 0x2, 0x0, 0x4) ioctl$VIDIOC_RESERVED(r4, 0x5601, 0x0) 17:49:21 executing program 3: 17:49:22 executing program 4: 17:49:22 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() wait4(r1, &(0x7f0000000000), 0x0, &(0x7f00000000c0)) migrate_pages(r1, 0x7, 0x0, &(0x7f00000001c0)=0x3) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r2, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:49:22 executing program 5: 17:49:22 executing program 3: 17:49:22 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0xb}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x200, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x52200, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0)) 17:49:22 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672", 0x18}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 390.374019] AppArmor: change_hat: Invalid input, NULL hat and NULL magic [ 391.205455] audit: type=1400 audit(1552844962.243:110): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=12955 comm="syz-executor.2" 17:49:22 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=@profile={'stack ', 'em0proccgroup\'*GPL\x00'}, 0x17) 17:49:22 executing program 3: 17:49:22 executing program 5: 17:49:22 executing program 4: [ 391.482994] audit: type=1400 audit(1552844962.523:111): apparmor="DENIED" operation="stack" info="label not found" error=-2 profile="unconfined" name="em0proccgroup'*GP" pid=12967 comm="syz-executor.2" 17:49:22 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x4, 0x400000) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) 17:49:22 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf7037", 0x1c}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:22 executing program 5: 17:49:22 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400002, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r1, 0xc0305615, &(0x7f0000000100)={0x0, {0x3fe, 0x96}}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x200000, 0x0) getpid() 17:49:22 executing program 3: 17:49:22 executing program 1: r0 = add_key(&(0x7f0000000080)='blacklist\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="dfaab90e95e84e55c796c2e55e94c6026ee1818fb2a23b3deb55", 0x1a, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x4010408) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 17:49:22 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf7037", 0x1c}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:22 executing program 4: 17:49:23 executing program 3: 17:49:23 executing program 5: 17:49:23 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x80000001) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:49:23 executing program 4: 17:49:23 executing program 5: 17:49:23 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf7037", 0x1c}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:23 executing program 3: 17:49:23 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40, 0x188) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000140)={0xd7, 0xc}) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x42000, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f00000000c0)={0x3, 0x6}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 17:49:23 executing program 4: 17:49:23 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xfff, 0x600000) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) 17:49:23 executing program 3: 17:49:23 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3", 0x1e}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 392.599694] Unknown ioctl -1072667636 17:49:23 executing program 4: [ 392.667583] Unknown ioctl -1072667636 17:49:23 executing program 5: 17:49:23 executing program 3: 17:49:23 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x4000000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xffffffffffffff35) syz_emit_ethernet(0xff27, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x43, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0xf0ffffffffffff, 0x0, 0x8}}}}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:23 executing program 5: 17:49:24 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f00000000c0)) write$apparmor_current(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="6368616e676570726f66496c65202d6d696d655f74797065fd8f945c69195d27ad5c5d00756c5d00c51a742495428e3f89aa4a85271d67174870f98c156232039c9c6a318e21b9150f136aab4e13134cb193d9135fa6ad8908d63cc0e856ba1e395fee7235f13f2270a6266442a0"], 0x2ad) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x4e23, @local}, @in={0x2, 0x4e21, @local}], 0x20) accept$inet6(r1, &(0x7f00000003c0), &(0x7f0000000400)=0x1c) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000340)=""/48, &(0x7f0000000380)=0x30) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f0000000300)) 17:49:24 executing program 4: 17:49:24 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3", 0x1e}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:24 executing program 5: 17:49:24 executing program 3: 17:49:24 executing program 4: 17:49:24 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) flock(r0, 0x1) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000080)=0x7) [ 393.217661] kauditd_printk_skb: 5 callbacks suppressed [ 393.217691] audit: type=1400 audit(1552844964.263:117): apparmor="DENIED" operation="setprocattr" info="current" error=-22 profile="unconfined" pid=13044 comm="syz-executor.2" 17:49:24 executing program 3: 17:49:24 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=ANY=[@ANYBLOB='permprofile :\"//em0ppp1vboes\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x25) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000040)=""/34, 0x4}) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000100)={0x6, 0x9239, 0x80000000, 0x10000, 0x1, 0xccf, 0x9}) 17:49:24 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="ccea147c851a40e660e7cd74f4159c071e443cc4b4f97b4f13b6d29a29b107bcdf5310c097c28acd44c5405e4b8a8424165c590b30f7a32f1e2ab8456a3ad0b77a43588741c87bbe9a531f88b04a49fee9574c852995ee00e560c424acc0f4b7dc98170283587ce9846e0d82d534fc78756d98e20d10a190838b", 0x7a}, {&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3", 0x1e}], 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:24 executing program 3: 17:49:24 executing program 5: 17:49:24 executing program 4: [ 393.561574] audit: type=1400 audit(1552844964.603:118): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F6573 pid=13063 comm="syz-executor.2" [ 393.581712] audit: type=1400 audit(1552844964.603:119): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F6573 pid=13063 comm="syz-executor.2" 17:49:24 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0xfffffffffffffff5, 0x6, {0x4c}}, 0x18) fcntl$getown(r0, 0x9) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) socket(0x0, 0x1, 0x80006) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) 17:49:24 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="706572696c65203a222f2f656d307070703176626f786e6574302de60065720000000000005ee79cc6f405b467482867d4350d22056f25c0b7cdb9bc2e2213a36481c87ad7aacc42810dce296bb2d2eb25ae9449401fbbd7c8c4aa335c9de01b258070"], 0x25) 17:49:24 executing program 3: 17:49:24 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:24 executing program 5: 17:49:24 executing program 4: [ 394.091108] audit: type=1400 audit(1552844965.133:120): apparmor="DENIED" operation="setprocattr" info="current" error=-22 profile="unconfined" pid=13088 comm="syz-executor.2" 17:49:25 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x10000, 0x0) name_to_handle_at(r1, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280), 0x1400) r2 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000080)=0x9) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) 17:49:25 executing program 4: 17:49:25 executing program 5: 17:49:25 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:25 executing program 3: 17:49:25 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x70, 0x100000000, 0x401, 0x1493, 0x9, 0x0, 0x3f, 0x2000, 0x1, 0x4, 0x100000000, 0x907, 0x1, 0x1ff, 0x3, 0x1, 0xec90, 0x8, 0x8, 0x4, 0x84c6, 0x81, 0x7, 0x1, 0x100000001, 0x1f, 0x8, 0xfffffffffffffeff, 0xfffffffffffffeff, 0x20, 0xbe, 0x100, 0x9, 0x3, 0x5, 0x400, 0x100000000, 0x0, 0xfff, 0x1, @perf_bp={&(0x7f0000000000), 0xf}, 0x80, 0x9, 0x7fff, 0x1682ef16e987efb3, 0x0, 0x200}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000140)={0x5, 0x70, 0xfff, 0x80000000, 0x2, 0x6, 0x0, 0x7, 0x100, 0x8, 0x0, 0x100, 0x4, 0xfff, 0x137b2b83, 0x9, 0x8, 0x879, 0xfcf6, 0x7, 0x9, 0x1, 0x6, 0x0, 0x80, 0x7, 0x8c, 0x3, 0x1, 0xffff, 0x1, 0x1000, 0x1, 0x6, 0x3, 0x5, 0x5, 0x5, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x4010, 0x200, 0x5, 0xe, 0x2, 0x26, 0x7ff}) write$apparmor_current(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7065726d70722f66696c6520a9a72f2f656d307070703176626f786e6574302d7573657f00e478846a346edb490e48ff7fa56338262bf5380b85965f21d0d1406b4a2663906e71f4e5ec410aff769717b78bbb44b39db9ff6a434d46d671d644c569a73a7f6b0a0000000000000000000000b5da83efd25ead5e01bb7dc397a91fa27e92e7a0c49a85b122dab2737e7ac98e1f2d2aaca2ad4554bf89e852931f87cbd631d23dc15c0b2140176a15c3e2a519f69e472020a6f49df4314914982e49460520b2418380e8b60094e51fc102c027c644f881d8d587cedee8b3fdb9020a8de3d3f6927fa4f6197436db18e80a74fd187bdedb3f78d8b2787dc96a3985cbda8a96943cc731852f144a0ad722023a4f07c58d66ddd63b3c2511d0309b96402a11a7bb9d4c2d978e033e62beab1d6cc12dd63e4a74000000003ff0a67cd76363"], 0x1) 17:49:25 executing program 4: 17:49:25 executing program 5: 17:49:25 executing program 1: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) setsockopt(r0, 0x8000, 0x2, &(0x7f0000000080)="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", 0x1000) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:25 executing program 3: 17:49:25 executing program 4: 17:49:25 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000140)=ANY=[], 0x0) clock_gettime(0x7, &(0x7f0000000140)={0x0, 0x0}) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={r1, r2+10000000}, &(0x7f00000000c0)=0x102, 0x1) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0xa0240, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000180)="c17c6d953f4b141a92472bbe0640f0267eecf6c1b7b700b0ff4fd57e8afe3b6810eb306d1e79882ca14fccd27654269964cf4d27ccf203504a2f9413b342805481280d19ebaeab7afc6bac5df6c2c205c0b29571a4ff98f88c8af87382b8db3243291936442e13af337ce4c67262026b6d9b6cfc162c76a79d0144476e486bfe028d215acee0f3670bd1cb0c41ab6453c57cfe7e9466c2bb251ca11527", &(0x7f0000000240)="d3ddf210"}, 0x20) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000002c0)={0x0, 0x101, 0x2, 0x100000001}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000340)={r4, 0x6}, &(0x7f0000000380)=0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000004c0)={r3, &(0x7f00000003c0)='bP?', &(0x7f0000000400)="446fbd6ffe3ec9a0618b2b85a80b0d631f368e6d9e0c9db654ac32f913e703c8d0035c1a526fb155d57a1d11c111ce939e1a6b91e6a722ae9bd1ec0347e8971e4125544a13a8b2100523e1551453b7d2f3da3de49bf20d49577716c1f7c37e3e5d4272c77ff04bbc74425dba0b9ee600c269c7f8d478433752528878cd9dda87985912", 0x3}, 0x20) 17:49:25 executing program 5: 17:49:25 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:25 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x400, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x117, 0x1006}}, 0xffffff82) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1000}, r1}}, 0x30) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x1c5) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4010641c, &(0x7f0000000180)={r3, &(0x7f0000000100)=""/77}) 17:49:26 executing program 4: 17:49:26 executing program 5: 17:49:26 executing program 3: 17:49:26 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{0x0}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:26 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x20280, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000140)={0x8, 0xb7, 0xfa00, {0x1, {0xffffffffffffffc1, 0x2, "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", 0xc7, 0x80000001, 0x985, 0xfad, 0x3, 0x8, 0x8165, 0x1}, r3}}, 0x41) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000400)={0x16, 0x98, 0xfa00, {&(0x7f00000003c0), 0x3, r3, 0x30, 0x1, @ib={0x1b, 0x0, 0xd56e, {"b8c5c56fd84adb79a76ddc3776b314df"}, 0x1f, 0x1, 0x7e1}}}, 0xa0) syz_open_pts(r2, 0x4882) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000300)=0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000002c0), &(0x7f0000000340)=0x4) ioctl$VIDIOC_ENUMINPUT(r2, 0xc050561a, &(0x7f00000004c0)={0x8, "c109e6670a5ff45fab079f7871920db855132a659aec1197a54360011dfa51cd", 0x1, 0x0, 0x3, 0x2400000, 0x1, 0x4}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x80, 0x0) fcntl$setown(r4, 0x8, r5) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f0000000280)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x1}) 17:49:26 executing program 5: 17:49:26 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000100)='\x00\x00\x02L\xd4\xdd\xce\xb9\xc6J\xfb+\x00\x00wr\x83\x1f^A\"%1A\xf0{\xcb\xcce\xff\xc1@\xbd\x00\x18\xc0\xee\xdb\x00\xabf\x1a\x04\x04_\xf4.M\x10\x14\xb2\x9f(\xaa\x02\x1c\xbc31Bj|\xf0g*\xa0\x1drY\x15b3\x98\x01\xf8\v\x86W5\x99U\xe7\xf7\x92\x8f\xf7\x8cp\xad\x1e\xcc\xe1\x88M0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{0x0}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:26 executing program 3: 17:49:26 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r0}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:26 executing program 5: 17:49:26 executing program 4: 17:49:26 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getgid() r1 = socket$inet6(0xa, 0x2, 0x10001) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x50) r3 = inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x40000000) inotify_rm_watch(r2, r3) 17:49:26 executing program 5: 17:49:27 executing program 4: [ 395.902986] audit: type=1400 audit(1552844966.943:121): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=13171 comm="syz-executor.2" 17:49:27 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{0x0}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 395.988254] audit: type=1400 audit(1552844966.973:122): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=13171 comm="syz-executor.2" 17:49:27 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$xdp(0x2c, 0x3, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:27 executing program 3: 17:49:27 executing program 2: 17:49:27 executing program 5: 17:49:27 executing program 4: 17:49:27 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000540)}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:27 executing program 3: 17:49:27 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) r1 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x4, 0x12000) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000200)="610423bb24971b7c5889d8") ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000080)={{0x3000, 0x4000, 0xf, 0x0, 0x1f, 0x9, 0xfffffffffffffffd, 0x4, 0x81, 0x4, 0x100, 0xf3a4}, {0x0, 0xf000, 0xe, 0x20, 0x80000001, 0x2, 0x3, 0x20, 0x7, 0x10c, 0x1000, 0x7}, {0x4000, 0x0, 0x10, 0xe02d, 0x2000, 0x6, 0x4, 0x100, 0x6, 0x1, 0x2, 0xffffffff}, {0x3002, 0x4, 0x4, 0x1, 0x3, 0x2, 0x6, 0x10, 0x3, 0xffffffffffffff55, 0x4, 0x8}, {0x4000, 0x0, 0xf, 0x8, 0x5, 0x1fffe0000, 0x6, 0x9, 0x9, 0x7f, 0x4, 0x4}, {0x0, 0x0, 0x10, 0x3f, 0x1000, 0x8, 0x6, 0x7, 0x3, 0x1, 0x400, 0x100}, {0x100001, 0xd000, 0xd, 0xffffffffffffff01, 0x100, 0x7, 0xf04, 0x6, 0xc9, 0x2e, 0x7, 0xfffffffffffffecf}, {0x0, 0x1, 0x13, 0xa932, 0x0, 0x232bcc8c, 0x5, 0x5, 0xff, 0x4, 0x8, 0xffffffffffff1b0f}, {0x0, 0x5001}, {0x1d004, 0xf000}, 0x20000000, 0x0, 0x7000, 0x10000, 0xb, 0x2900, 0xd000, [0xffff, 0x8, 0x4, 0x3ff]}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:27 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x10080) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)=0x0) fcntl$setownex(r0, 0xf, &(0x7f00000000c0)={0x1, r1}) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r2, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000100)={0x0, @bt={0x231f800, 0x3, 0x0, 0x1, 0x1, 0x1f, 0x6, 0x6, 0x1, 0x4, 0x200000000, 0x7, 0x5, 0x1, 0x1c, 0x32}}) sysinfo(&(0x7f00000001c0)=""/200) 17:49:27 executing program 5: 17:49:27 executing program 4: [ 396.652249] audit: type=1400 audit(1552844967.693:123): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=13204 comm="syz-executor.2" 17:49:27 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000540)}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:27 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:27 executing program 3: 17:49:27 executing program 5: 17:49:27 executing program 4: 17:49:28 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$inet_int(r1, 0x0, 0x3, &(0x7f0000000040)=0x5, 0x4) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000000)) splice(r0, &(0x7f00000000c0), r1, &(0x7f0000000100), 0x5, 0x8) write$apparmor_current(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0600726d70726f66696c65203a2211f589f28bc8a2c8fbf008722f2f656d30707070317662022586297747a9eb22f303c395ee3af2971687eccf9ff83d65ba141273dd3a79177cec070c96f100cdfc69bf7d5d27af1d067c6f053a404f756b6591d8da84c6b944c44cd6b8a9d361eb918f957f447beea69d69ea53fd2dabc7"], 0x25) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f00000001c0)=0x1645c00000000000) 17:49:28 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000540)}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:28 executing program 5: 17:49:28 executing program 3: 17:49:28 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x654, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000700)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000a40)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000082}, 0xc, &(0x7f0000000a80)={&(0x7f0000000740)={0x290, r3, 0x708, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x100, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x771d6302}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x38}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x83}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xcc}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x12}]}, @TIPC_NLA_LINK={0x84, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffff80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1f}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x200}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xa5d1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffd}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x703}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xc3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2bf0000000}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0x290}, 0x1, 0x0, 0x0, 0x40000}, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)={{0x1cf, 0x80, 0x8000, 0x110, 0x8c, 0x9, 0x2ab, 0x6}, "192139e8563c2eb050701ebdb470aa5e7edf90991caff23a", [[], [], [], [], [], []]}, 0x638) 17:49:28 executing program 4: 17:49:28 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) fchdir(r0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040)=0x1f, 0x8) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000140)=ANY=[@ANYRES64], 0x1) 17:49:28 executing program 5: 17:49:28 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae3", 0x10}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:28 executing program 4: 17:49:28 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x7, 0x0) 17:49:28 executing program 3: 17:49:28 executing program 5: 17:49:28 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae3", 0x10}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:28 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x8000, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0x0, 0x6, {0x8000}}, 0x18) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000000c0)) write$apparmor_current(r0, &(0x7f0000000480)=ANY=[@ANYBLOB='permprofile :\"//em0ppp0vboxnet0-user\x00'], 0x25) 17:49:28 executing program 4: 17:49:28 executing program 3: 17:49:28 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000280)) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl(r1, 0x7, &(0x7f0000000080)="2452812737231f5dc2367a58b7c48cc7eccd3d741ae388dd88efff1dc98e985663b6f7a725f48867ab1b29e89bd703af2667e21429c8c938a38f780eadd159fbc9e45969c655fc82509d43b2169a4977a9ba27724c9216741ac068a60aa353d8e2510113a86f3f63ce194f7c4554afb537b9ef804984dddeee9e398c311393102aec09ccb5ddfd7625b8c004e9") ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 397.885465] audit: type=1400 audit(1552844968.933:124): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703076626F786E6574302D75736572 pid=13258 comm="syz-executor.2" 17:49:29 executing program 5: r0 = memfd_create(&(0x7f0000000300)='\vemI\xc1\x8dO\xc0\xa3\\\xe2\xcb\xa2\xba\xcb\xf4\x97\xac#*\xff\xc0\xd0\xe7\x99y\x05\f\xb9\x15R8\xce1\xb3\xd6\xcf\xbf\xaa\x88\xcb\xf0\x1cw61\x9f\xc2\x85+\x87 \\\xde\xde\x0f0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10) 17:49:29 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x1, 0x0) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000001000)="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", 0x1000}], 0x1) 17:49:29 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000000)=@hat={'permhat ', 0x3, 0x5e, [':em0-\x00', '\x00', '\\\x00', '/proc/thread-self/attr/current\x00', '/proc/thread-self/attr/current\x00', 'permprofile ']}, 0x3af) 17:49:29 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae3", 0x10}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:29 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x800000000000009) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000f9000008000c800200000010b529ec1d07046f78b90a0be5c1a94d1c12153e75b59ab4acc60b25cc578506aa50e7a2810fdc92d7028162238bcffcf78fa54502c2289f54a8af0f222711c93c1af57bbdedf7bda187216e1bed3cee4b6f5c661729f61b8891"], 0x1}}, 0x0) 17:49:29 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672", 0x18}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 398.382691] audit: type=1400 audit(1552844969.423:125): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=13276 comm="syz-executor.2" 17:49:29 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x80000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f00000000c0)={r1}) 17:49:29 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0xffffffffffffffda, &(0x7f0000000180)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x6}]}, 0x30}}, 0x0) 17:49:29 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672", 0x18}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:29 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7065726d70726f66696c65203a222f31766204006e6574302d75736572009f4f13eca68779d766068b2fa625eed4dee54c522b00726cb097d3532ae663b8348a611ee72cc2dab6d38eb63bfb46ed9a42c5c0d9a587b79edb78ca3672d264410a42ed8f83598404adf33144ff"], 0x25) [ 398.604501] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 398.629610] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 398.636509] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:49:29 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672", 0x18}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 398.791986] audit: type=1400 audit(1552844969.833:126): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F31766204 pid=13300 comm="syz-executor.2" 17:49:29 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000001540)={0x0, 0x4}, &(0x7f0000001580)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000300)={r2, @in6={{0xa, 0x4e23, 0x2, @empty, 0x9bb5}}, 0x5, 0x5, 0xfffffffffffffeff, 0x2, 0x4}, &(0x7f00000003c0)=0x98) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000400)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000001440)=0x1008) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x1, 0x0) bind$rxrpc(r4, &(0x7f0000000180)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x0, 0x1ff, @remote, 0x43e}}, 0x24) ioctl$EVIOCGMASK(r4, 0x80104592, &(0x7f0000000140)={0x3, 0x78, &(0x7f00000000c0)="a6ca06bfe96e1cbeee25026067fc32c93933f6a84c42acd38fec3aa85465626a93fd93b854a0d143805862f5398a9e8b10a7f27c31b93736287f515261564ff903a581825ffe8be50510e3a42316e3e08d2dc6b8b39ed495a558c3ee3f53ecda11daccd19faea4ddd0a4fa18c2b197b404a130fe97b88aa6"}) r5 = socket$kcm(0xa, 0x6, 0x0) r6 = msgget$private(0x0, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, &(0x7f0000001480), &(0x7f00000014c0)=0x4) msgctl$IPC_RMID(r6, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001500)='/dev/vga_arbiter\x00', 0x80080, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$VIDIOC_ENUM_FREQ_BANDS(r4, 0xc0405665, &(0x7f00000001c0)={0x7, 0x5, 0x3ff, 0x410, 0x1, 0x80000000, 0x4}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x890b, &(0x7f0000000000)) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x70, 0x6, 0x5, 0x2, 0x5, 0x0, 0x2, 0x0, 0x8, 0x7, 0x10001, 0xdc16, 0x7, 0x1, 0xdc0a0bb, 0x800, 0x6c9d, 0xfffff00000000000, 0x10001, 0x2, 0x4, 0x242, 0x0, 0x9, 0x7, 0x6, 0x7, 0xba3, 0x1, 0x7fff, 0x9, 0x0, 0x2a, 0x8, 0x1, 0xfffffffffffffffb, 0x6, 0x0, 0x1000, 0x1, @perf_bp={&(0x7f0000000200), 0x4}, 0x2400, 0x0, 0xfffffffffffffffe, 0x9, 0x2, 0x80, 0x9}, r4, 0xf, r0, 0x8) socket$isdn_base(0x22, 0x3, 0x0) 17:49:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc) close(r0) 17:49:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20}, 0x2c) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000180)=""/184, 0xb8}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffca88}, 0x80, 0x0}, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x368, &(0x7f0000000680), 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x11) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x0, 0x31, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xd, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f00000000c0), 0x1802a140) 17:49:30 executing program 2: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 17:49:30 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f00000001c0)) socket$packet(0x11, 0x3, 0x300) socket$inet6(0xa, 0x3, 0x84) pselect6(0x40, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) 17:49:30 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf7037", 0x1c}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:30 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x20000, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x3ff, 0x1, 0x8bc, 0x7f, 0x0, 0x10001, 0x300, 0x3, 0x8, 0x0, 0x3, 0x8, 0x8000, 0x4, 0x1c48, 0x5, 0xfffffffffffffffa, 0x3, 0x10000, 0x3, 0x2, 0x5, 0x2, 0x3, 0x6, 0x0, 0x7, 0x9, 0x8000, 0x1, 0x5, 0x8, 0x711, 0x3, 0x8, 0x8, 0x0, 0x0, 0x1, @perf_config_ext={0xb2, 0x47}, 0x202, 0x7, 0x5, 0x0, 0x80000000, 0x10000, 0x8}, r2, 0x4, r0, 0xc) 17:49:30 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)={0x8000, 0x0, 0x2, 0x0, 0x0, [{}, {0xffffffffffffffff, 0x0, 0x7ff}]}) accept4$unix(r1, 0x0, 0x0, 0x0) 17:49:30 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf7037", 0x1c}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:30 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x40, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000240), 0x24, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @random="9d0e9222f1fe", 'veth0_to_bridge\x00'}}, 0x1e) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 17:49:30 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="706517be5a05fda74edcc6be79a703006b726f666d6c65203a222f2f656d307070703176626f786e6574302d7573657200f5616b5083bd1fcd1e6df329b077296632163e077316e94b499f861748f0f69bda7ea3eef9bb40f02941871829cd89bdf9bfeccccf9c49e887266ff50120d37dd8d5a42f87593707847a39ef9ad09e1061629b807c75ceb21463facf5908413b4355f84824b551875c4dac1da7962a84b86713475e3d86941fa8850c018bfee894b9461d0b761bb100b54907edf9853e10bb6313e31d412580b83c84c28f631eda4942129adace42"], 0x25) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x1ff, 0x2, 0x1, 0x4, 0x1, [{0x5, 0x3, 0x4, 0x0, 0x0, 0x2}]}) 17:49:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e00000031008182e45ae087185082cf0224b0eba06ef9075b3f00169148790700d90080e2300000000000000000", 0x2e}], 0x1}, 0x0) [ 399.705739] protocol 88fb is buggy, dev hsr_slave_0 [ 399.711566] protocol 88fb is buggy, dev hsr_slave_1 [ 399.749249] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. 17:49:30 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf7037", 0x1c}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:30 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000040)={'veth0_to_bridge\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}) [ 399.939242] audit: type=1400 audit(1552844970.983:127): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=13357 comm="syz-executor.2" [ 400.045745] audit: type=1400 audit(1552844971.033:128): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=13357 comm="syz-executor.2" 17:49:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) read(r1, 0x0, 0x0) 17:49:31 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000600000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 17:49:31 executing program 1: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x758054c4}, 0xffffffffffffffff, 0x0, r0, 0x0) r1 = socket$kcm(0xa, 0x40000001006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000080)=0x1000000, 0x4) 17:49:31 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3", 0x1e}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:31 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x448042, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="7065726d70726f66696c65203a222f15656d307070703176626e09000000302d7573657200"], 0x25) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0x1, 0x3, 0x1, 0x6, 0x7, 0xffff, 0x7, 0x0, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={r2, @in={{0x2, 0x4e22, @remote}}, 0x0, 0x3, 0x2, 0x4c, 0x3}, 0x98) 17:49:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='I'], 0x1) write$cgroup_type(r3, &(0x7f00000002c0)='threaded\x00', 0xd0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000000000), 0xfffffea6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x42, 0x0, &(0x7f0000000200)="3b414e4c99c5332fb2f2672ce39ed94eb88dc4080d1bca94c8cac4f734bb860d31e3a0faf701662e175d7ad685834c354a826812910c7667fdda578b661b142c2e53", 0x0, 0xad0}, 0x28) [ 400.581076] audit: type=1400 audit(1552844971.623:129): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F15656D307070703176626E pid=13372 comm="syz-executor.2" 17:49:31 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3", 0x1e}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:31 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x20000000040400, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x8, 0x4) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000240)={0xf, 0x6, 0xfffffffffffffffc, 0x80000, r1}) write$apparmor_current(r0, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)=""/113, &(0x7f0000000140)=""/54, &(0x7f0000000180)=""/75, 0x1}) 17:49:31 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\x00\x00\x02L\xd4\xdd\xce\xb9\xc6J\xfb+\x00\x00wr\x83\x1f^A\"%1A\xf0{\xcb\xcce\xff\xc1@\xbd\x00\x18\xc0\xee\xdb\x00\xabf\x1a\x04\x04_\xf4.M\x10\x14\xb2\x9f(\xaa\x02\x1c\xbc31Bj|\xf0g*\xa0\x1drY\x15b3\x98\x01\xf8\v\x86W5\x99U\xe7\xf7\x92\x8f\xf7\x8cp\xad\x1e\xcc\xe1\x88M0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3", 0x1e}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) 17:49:32 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter6\x00') bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={0x0, r1, 0xb, 0x1}, 0x3) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000140)={r3, 0x9}, 0x8) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_proto_private(r4, 0x89ea, &(0x7f0000000180)="e5104910ee47b24832ef36dfdb5c75be7323312592fce10667063ffe122083ea5669833068753d621aed709dab30cdd8df100abdd41e98b2fc7ccc231ba763662089f2c3e5b5447be7c0bdfd9960b9c737642a184c6fcbdff6ef9e531d63e05079311ac9361ee2e1867e1326bb42a29e1c340324a429a38a9a31751e9a5d73b296e73cf54508cc75b3133a7711d415e7e83cbf67dc31c02e7ff87e28288bbbb562734e59ffdd77b0f8530ea131b093aecfe7b65faae0f360ec8ffec2f04e63d409b0b4ed9a99f51f8bcf6a74") 17:49:32 executing program 2: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 17:49:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x40, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000000)=0x1000) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x200000, 0xfffffffffffffffd, 0x2012, r0, 0x0) 17:49:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) [ 401.362471] ================================================================== [ 401.369916] BUG: KMSAN: uninit-value in mpol_rebind_task+0x1b2/0x250 [ 401.376424] CPU: 0 PID: 13427 Comm: syz-executor.3 Not tainted 5.0.0+ #15 [ 401.383363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.392731] Call Trace: [ 401.395344] dump_stack+0x173/0x1d0 [ 401.399019] kmsan_report+0x12e/0x2a0 [ 401.402854] __msan_warning+0x82/0xf0 [ 401.406708] mpol_rebind_task+0x1b2/0x250 17:49:32 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xc04, 0x105001) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r2, 0xf, 0x1}, 0x279) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 17:49:32 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="7065726d70726f66696c65203a222f2f656d307870703176626f786e57e1791b6574302d75"], 0x25) 17:49:32 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000540)="96cdc121c05881d22b6fcadfcdc2eae32cee4837500fb672becf703713c3c6", 0x1f}], 0x1) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x200, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0}, &(0x7f00000008c0)=0x36c) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000840)={0x8, 0x5, r4, 0x0, r5, 0x0, 0xffffffff, 0x1ff}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffdda) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000240)={0x3, 0xa8, &(0x7f0000000180)="3e683e6257b340047e6f4a4d37582aef1f5190474eea87d551cf5f6f8b4b5bf6e130d29337f7042c2adff37f48e9616e4cf3dcbaa06d247ced858a4f4e1a535965abb165a9a7212dbdd30ff10f40908c2ff19b9dc3a5537439dff7ddc238d74f422f8379ebfad4a2c30dbb21b58d5e0a4b8b52ce0e989b05e0ead13c43c53b773dd5bd928f61d85ca6fb4c32350b1cb56c1534fe67a9575ba449367f9f2e4cb9d99af6eca56c64a4"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f00000002c0)="011c5ae39652222e823a884f0ec092a1c65c3419518a6209ffc7d85f70cce1bb51bc8959caa8cc84a0ecf825ba4f5151ce2c55612296a28ba312af72425ea24c9b7c5b649ca09654668d2796b6d077b2e398abd537f26cfc5166bed94a4c6123362f90b6c9e8bfaedd6c86b26e42239540c57d3aa7dcca7363d6a4b378dff56f04242ec2249c8908"}, 0x10) [ 401.410915] cpuset_attach+0x670/0x12c0 [ 401.414943] ? cpuset_cancel_attach+0x140/0x140 [ 401.419623] cgroup_migrate_execute+0xbbd/0x1b00 [ 401.424421] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 401.429826] cgroup_attach_task+0x642/0x10d0 [ 401.434265] ? kmsan_internal_memset_shadow+0x14c/0x430 [ 401.439675] __cgroup1_procs_write+0x53b/0x670 [ 401.444292] cgroup1_procs_write+0x9b/0xb0 [ 401.448549] ? cgroup_pidlist_stop+0x1e0/0x1e0 [ 401.453150] cgroup_file_write+0x44a/0x8e0 [ 401.457424] ? cgroup_seqfile_stop+0x150/0x150 [ 401.462061] kernfs_fop_write+0x569/0x840 [ 401.466254] ? kernfs_fop_read+0x9a0/0x9a0 [ 401.470506] __vfs_write+0x1e2/0xc20 [ 401.474263] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 401.479638] ? __sb_start_write+0x10c/0x230 [ 401.483986] vfs_write+0x481/0x920 [ 401.487576] __se_sys_write+0x17a/0x370 [ 401.491596] __x64_sys_write+0x4a/0x70 [ 401.495503] do_syscall_64+0xbc/0xf0 [ 401.499245] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 401.504468] RIP: 0033:0x458079 [ 401.507687] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 401.526613] RSP: 002b:00007f35b13d1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 401.534339] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458079 [ 401.541633] RDX: 0000000000000012 RSI: 0000000020000180 RDI: 0000000000000004 [ 401.548906] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 401.556215] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35b13d26d4 [ 401.563495] R13: 00000000004c7456 R14: 00000000004dd000 R15: 00000000ffffffff [ 401.570772] [ 401.572382] Uninit was created at: [ 401.575918] kmsan_internal_poison_shadow+0x92/0x150 [ 401.581034] kmsan_kmalloc+0xa6/0x130 [ 401.584849] kmem_cache_alloc+0x585/0xb60 [ 401.589028] do_set_mempolicy+0x353/0xad0 [ 401.593191] __se_sys_set_mempolicy+0x216/0x2a0 [ 401.597852] __x64_sys_set_mempolicy+0x4a/0x70 [ 401.602448] do_syscall_64+0xbc/0xf0 [ 401.606192] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 401.611358] ================================================================== [ 401.618791] Disabling lock debugging due to kernel taint [ 401.624224] Kernel panic - not syncing: panic_on_warn set ... [ 401.630108] CPU: 0 PID: 13427 Comm: syz-executor.3 Tainted: G B 5.0.0+ #15 [ 401.638416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.647770] Call Trace: [ 401.650412] dump_stack+0x173/0x1d0 [ 401.654044] panic+0x3d1/0xb01 [ 401.657260] kmsan_report+0x293/0x2a0 [ 401.661063] __msan_warning+0x82/0xf0 [ 401.664862] mpol_rebind_task+0x1b2/0x250 [ 401.669040] cpuset_attach+0x670/0x12c0 [ 401.673026] ? cpuset_cancel_attach+0x140/0x140 [ 401.677699] cgroup_migrate_execute+0xbbd/0x1b00 [ 401.682449] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 401.687813] cgroup_attach_task+0x642/0x10d0 [ 401.692214] ? kmsan_internal_memset_shadow+0x14c/0x430 [ 401.697618] __cgroup1_procs_write+0x53b/0x670 [ 401.702246] cgroup1_procs_write+0x9b/0xb0 [ 401.706510] ? cgroup_pidlist_stop+0x1e0/0x1e0 [ 401.711095] cgroup_file_write+0x44a/0x8e0 [ 401.715349] ? cgroup_seqfile_stop+0x150/0x150 [ 401.719949] kernfs_fop_write+0x569/0x840 [ 401.724122] ? kernfs_fop_read+0x9a0/0x9a0 [ 401.728368] __vfs_write+0x1e2/0xc20 [ 401.732130] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 401.737502] ? __sb_start_write+0x10c/0x230 [ 401.741820] vfs_write+0x481/0x920 [ 401.745369] __se_sys_write+0x17a/0x370 [ 401.749363] __x64_sys_write+0x4a/0x70 [ 401.753254] do_syscall_64+0xbc/0xf0 [ 401.757106] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 401.762312] RIP: 0033:0x458079 [ 401.765507] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 401.784395] RSP: 002b:00007f35b13d1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 401.792100] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458079 [ 401.799378] RDX: 0000000000000012 RSI: 0000000020000180 RDI: 0000000000000004 [ 401.806658] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 401.813914] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35b13d26d4 [ 401.821177] R13: 00000000004c7456 R14: 00000000004dd000 R15: 00000000ffffffff [ 401.829304] Kernel Offset: disabled [ 401.832934] Rebooting in 86400 seconds..