c, r5, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1000}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x101}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x10000}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20044081}, 0x8000) (async) 17:41:00 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = socket$packet(0x11, 0x3, 0x300) (async) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @local}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000200)={r3, 0x1, 0x6, @broadcast}, 0x10) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some'}, 0x2f) (async) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) 17:41:00 executing program 5: syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x2) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', '#\x00'}, 0x8) 17:41:00 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e95f28fb0beeb6fa29dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a7909000000bc24dc258d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e915d60a9328d4097a16c2e5a1dce9216631b4e0e7e16ba1444260d155f965311e7a512f3f17ec34aa940a36abad685c96d09e40657845a55d6ab5457108ad85d490c0594ebc0221ee4a179ff4a4a4a0f94efcf6c23ee5dbdbf1933"], 0x83) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000380)) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000640)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000240)={0x0, 0xfffffffe, 0x4, 0x1}) 17:41:00 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:00 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', '-^\'!&/-!:\x00'}, 0x10) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='exec /5proc/threself/attr/exec\x00'], 0x21) write$apparmor_exec(r0, &(0x7f00000001c0)=ANY=[], 0x8) ioctl$int_out(r0, 0x1, &(0x7f0000000140)) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x210, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80000}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, r1, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x4000800) [ 2245.856599] device syz_tun entered promiscuous mode 17:41:00 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e95f28fb0beeb6fa29dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a7909000000bc24dc258d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e915d60a9328d4097a16c2e5a1dce9216631b4e0e7e16ba1444260d155f965311e7a512f3f17ec34aa940a36abad685c96d09e40657845a55d6ab5457108ad85d490c0594ebc0221ee4a179ff4a4a4a0f94efcf6c23ee5dbdbf1933"], 0x83) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000380)) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000640)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000240)={0x0, 0xfffffffe, 0x4, 0x1}) 17:41:00 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000000)) write$cgroup_pressure(r1, &(0x7f0000000080)={'full', 0x20, 0x7fff, 0x20, 0x4}, 0xfffffffffffffdd7) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) 17:41:00 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x66, &(0x7f00000003c0)={@broadcast, @link_local, @void, {@mpls_mc={0x8848, {[], @ipv6=@icmpv6={0x0, 0x6, "57ea46", 0x30, 0x3a, 0x0, @dev, @loopback, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, '8y\v', 0x0, 0x0, 0x0, @private2, @ipv4={'\x00', '\xff\xff', @multicast2}}}}}}}}}, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000540)={0x0, 0x1, 0x6, @multicast}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00', 0x0}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) socketpair(0x29, 0x3, 0x5, &(0x7f0000000300)) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xef}, [@exit, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8fff}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffcf, 0x0, 0x0, 0x0, 0x80000000}]}, &(0x7f0000000340)='syzkaller\x00', 0x8, 0x21, &(0x7f00000000c0)=""/33, 0x41000, 0xa, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x10c, 0x7fffffff, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, r3, 0x1, 0x1, r4]}, 0x80) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x4c, r5, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1000}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x101}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x10000}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20044081}, 0x8000) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) socket$packet(0x11, 0x2, 0x300) (async) syz_emit_ethernet(0x66, &(0x7f00000003c0)={@broadcast, @link_local, @void, {@mpls_mc={0x8848, {[], @ipv6=@icmpv6={0x0, 0x6, "57ea46", 0x30, 0x3a, 0x0, @dev, @loopback, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, '8y\v', 0x0, 0x0, 0x0, @private2, @ipv4={'\x00', '\xff\xff', @multicast2}}}}}}}}}, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000540)={0x0, 0x1, 0x6, @multicast}, 0x10) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00'}) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) socketpair(0x29, 0x3, 0x5, &(0x7f0000000300)) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xef}, [@exit, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8fff}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffcf, 0x0, 0x0, 0x0, 0x80000000}]}, &(0x7f0000000340)='syzkaller\x00', 0x8, 0x21, &(0x7f00000000c0)=""/33, 0x41000, 0xa, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x10c, 0x7fffffff, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, r3, 0x1, 0x1, r4]}, 0x80) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r4) (async) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x4c, r5, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1000}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x101}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x10000}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20044081}, 0x8000) (async) 17:41:00 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some', 0x20, 0x0, 0x20, 0x1000000002}, 0x2f) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) [ 2245.879090] device syz_tun left promiscuous mode 17:41:00 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:00 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', '-^\'!&/-!:\x00'}, 0x10) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='exec /5proc/threself/attr/exec\x00'], 0x21) write$apparmor_exec(r0, &(0x7f00000001c0)=ANY=[], 0x8) ioctl$int_out(r0, 0x1, &(0x7f0000000140)) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x210, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80000}, 0x0) 17:41:00 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000000)) write$cgroup_pressure(r1, &(0x7f0000000080)={'full', 0x20, 0x7fff, 0x20, 0x4}, 0xfffffffffffffdd7) (async) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) 17:41:00 executing program 5: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wpan4\x00'}) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_KEY(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)={0x28, r2, 0x62b, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x364, r2, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0xd8, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x74, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x80}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x4}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x4c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0x100}}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}]}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x3}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x3}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "e5ea0883ef4042b6726fefa6ab80496e15f02b6cc60a2686dbefb5147509903f"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x1}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "176774a0ce4df8f126120582dc1ad0dd8e3bac29a78f3009c1c135c2303d2424"}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_SEC_KEY={0xc0, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x3f}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "1fa3e8b20e4721e494dd9ed9c37d1951"}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "8929bde6a939f1a4f1e0be540e443b87e4fdc1ed299a40c5e4227de07a0fd7a8"}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "d035a633044d59dbd82d8719f24e2deee712a215f3bd68c75287aae8c48f8523"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x4}, @NL802154_KEY_ATTR_ID={0x50, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x6}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x56be}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x1000}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x3}]}]}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x20}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x1}, @NL802154_KEY_ATTR_ID={0x20, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0xfd}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x401}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}]}]}, @NL802154_ATTR_SEC_KEY={0xa0, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x7f}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x1}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "0353a775d687a930de39087b8a50dd93"}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "567a8f812cbad7d5cc235a9fdfc3dac889f17bef350149dc81f558c8ba5e95e0"}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "acb50bbb1da7d8bde2916d5186154c0353a2e9ec3978235764820521caf6a31e"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "c09bd8238885ed67ea1a400569bb2b9d"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "11d2708de229de83957d24c4fa142dfc"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x81}]}, @NL802154_ATTR_SEC_KEY={0xc4, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "2bbf99a70227c3d01be41c6bbaccf777829c7c580622797a94afa8d73db871a4"}, @NL802154_KEY_ATTR_ID={0x40, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}, @NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0xffffffe1}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x693}, @NL802154_KEY_ID_ATTR_IMPLICIT={0xc, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}]}]}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "e197ab94129ec9bd9510cf1c3dd2fd18d2105394f612fd832b4c0ba62332b0d1"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x81}, @NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x10000}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x20}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "d76173caaf72fbb874b3adc572634e69"}]}]}, 0x364}, 0x1, 0x0, 0x0, 0x40}, 0x4000040) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000100)={'stack ', '#\x00'}, 0x8) 17:41:00 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e95f28fb0beeb6fa29dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a7909000000bc24dc258d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e915d60a9328d4097a16c2e5a1dce9216631b4e0e7e16ba1444260d155f965311e7a512f3f17ec34aa940a36abad685c96d09e40657845a55d6ab5457108ad85d490c0594ebc0221ee4a179ff4a4a4a0f94efcf6c23ee5dbdbf1933"], 0x83) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000380)) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000640)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000240)={0x0, 0xfffffffe, 0x4, 0x1}) 17:41:00 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x800}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) 17:41:00 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', '-^\'!&/-!:\x00'}, 0x10) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='exec /5proc/threself/attr/exec\x00'], 0x21) write$apparmor_exec(r0, &(0x7f00000001c0)=ANY=[], 0x8) ioctl$int_out(r0, 0x1, &(0x7f0000000140)) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) 17:41:00 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:41:00 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="73ffffff7fbeb708"], 0x47) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x20, &(0x7f0000000000)={&(0x7f0000000140)=""/4096, 0x1000, 0x0, &(0x7f0000001140)=""/158, 0x9e}}, 0x10) 17:41:00 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x800}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x800}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) (async) 17:41:01 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0xca001, 0x0) bind$rxrpc(r1, &(0x7f0000000080)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e20, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x42}}, 0x24) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:01 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000000)) write$cgroup_pressure(r1, &(0x7f0000000080)={'full', 0x20, 0x7fff, 0x20, 0x4}, 0xfffffffffffffdd7) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000000)) (async) write$cgroup_pressure(r1, &(0x7f0000000080)={'full', 0x20, 0x7fff, 0x20, 0x4}, 0xfffffffffffffdd7) (async) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) (async) 17:41:01 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', '-^\'!&/-!:\x00'}, 0x10) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='exec /5proc/threself/attr/exec\x00'], 0x21) write$apparmor_exec(r0, &(0x7f00000001c0)=ANY=[], 0x8) ioctl$int_out(r0, 0x1, &(0x7f0000000140)) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) 17:41:01 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:41:01 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x800}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) 17:41:01 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvtap0\x00'}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some'}, 0x2f) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[], 0x8) 17:41:01 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0xca001, 0x0) bind$rxrpc(r1, &(0x7f0000000080)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e20, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x42}}, 0x24) (async) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:01 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:41:01 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000000), 0x3, 0x200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000200)) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some'}, 0x2f) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[], 0x8) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000040)={0x11, 0xd, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, 0x0, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}]}, 0x50}, 0x1, 0x0, 0x0, 0x24000000}, 0x10) 17:41:01 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', '-^\'!&/-!:\x00'}, 0x10) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='exec /5proc/threself/attr/exec\x00'], 0x21) write$apparmor_exec(r0, &(0x7f00000001c0)=ANY=[], 0x8) ioctl$int_out(r0, 0x1, &(0x7f0000000140)) 17:41:01 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[], 0x47) 17:41:01 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvtap0\x00'}) (async) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some'}, 0x2f) (async) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[], 0x8) 17:41:01 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x3, 0x800) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f00000000c0)={0x0, 0xfffffffffffff801, 0xfffffffffffff773, 0x1}) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some', 0x20, 0x7, 0x20, 0x1}, 0xfffffffffffffea2) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000980)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000940)={&(0x7f0000000b00)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="050425bd7000ffdbdf251200000008003a000300000008000b0009000000"], 0x24}, 0x1, 0x0, 0x0, 0x895}, 0x40000) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r3, 0x84009422, &(0x7f00000004c0)={0x0, 0x0, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r2, 0x942e, 0x0) 17:41:01 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r4) r5 = dup2(r0, r0) write$tun(r5, &(0x7f0000000080)={@val, @val, @eth={@random="893874d32f70", @local, @void, {@generic={0x0, '{'}}}}, 0x1d) 17:41:01 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[], 0x47) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[], 0x47) (async) 17:41:01 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvtap0\x00'}) (async) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some'}, 0x2f) (async) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[], 0x8) 17:41:01 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0xca001, 0x0) bind$rxrpc(r1, &(0x7f0000000080)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e20, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x42}}, 0x24) (async) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:01 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some'}, 0x2f) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000001600), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001680)={&(0x7f0000001640)={0x2c, r1, 0x8, 0x70bd26, 0x25dfcbfc, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0xff}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x8000) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000001700), 0x88080, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000001740)={r2}, 0x8) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f00000013c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r3 = socket$nl_audit(0x10, 0x3, 0x9) pwritev(r3, &(0x7f0000001340)=[{&(0x7f00000000c0)="f1a9464d487cd633bb03fe972918cfe9855e598a3c523f6cfaec81a5c34960a70ac7b2da0e77c93cc0c6805e79e9c9a9475db8b483c5a074cc20623d52fe431bd646e068716172", 0x47}, {&(0x7f0000000140)="e01b4e362836035272bdb8ff7215aa6a629783cbdd487081f90edb97612c1aeb9aafbd8d7ce016b675a60ff54962807ba3a99904dfc50d71c1d3ed5b307edbc3dbfea11cf557f2e2c34bb0491cb3de56383dd928b2d87c8fb67d3473847abe94687f8678fcfd0042bb3a15fa7898f989e2aca7ebee40c3eb3a0673c6fe75891c021e749c6a7c6eb8fb08b1de5fc633d273751a33d0acb8b8d3c5e9564518d8df3a465ee07b36ba5f6c505d462276876eb6dc17fb423f8bb003f332dea9811ae4c95d", 0xc2}, {&(0x7f0000000240)="d053aa9183b14556f7e4c4fd25741a115b54aee7dd5cf3901fe7e2a30a0139a330857d3c28b824ba17e358c7466f4bfe28d0490376b4219c4661575575810000002b250f9f243b10721db208", 0x4c}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="c92e7f54d9ba9095520cda67250076924582d9e93a00d4b2c041c98f2bb905b719e5e5eb93fbcc80a6488d33d6c5a96eed09ee8751496b15568ebc071de6ac92ae586f0a56b403e323b6eb470f38", 0x4e}], 0x5, 0x5, 0x7fffffff) 17:41:01 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', '-^\'!&/-!:\x00'}, 0x10) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='exec /5proc/threself/attr/exec\x00'], 0x21) ioctl$int_out(r0, 0x1, &(0x7f0000000140)) 17:41:01 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[], 0x47) 17:41:01 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some'}, 0x2f) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x400, 0x70bd26, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8081}, 0x44000) 17:41:01 executing program 5: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e24}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x24000010) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(0xffffffffffffffff, 0x80286722, &(0x7f0000000380)={&(0x7f0000000280)=""/220, 0xdc, 0xee26, 0x933}) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000240), 0x735182, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$int_out(r1, 0x2, &(0x7f0000000180)) 17:41:01 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000240)={{0x3ff, 0xfffffffd}, 0x100, './file0\x00'}) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:01 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x3}, 0x2) 17:41:01 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:01 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000240)={{0x3ff, 0xfffffffd}, 0x100, './file0\x00'}) (async) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:01 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000240)={{0x3ff, 0xfffffffd}, 0x100, './file0\x00'}) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:01 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', '-^\'!&/-!:\x00'}, 0x10) ioctl$int_out(r0, 0x1, &(0x7f0000000140)) 17:41:01 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x3}, 0x2) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x3}, 0x2) (async) [ 2246.325086] kauditd_printk_skb: 381 callbacks suppressed [ 2246.325093] audit: type=1400 audit(1660326061.275:1406): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=3909 comm="syz-executor.4" 17:41:01 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20a1da5e330ae24e}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x3f7, 0x100, 0x70bd29, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24004004}, 0x4000) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f00000000c0)={&(0x7f0000000000)=""/47, 0x2f, 0x9, 0x7}) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some'}, 0x2f) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000100)=0x8) 17:41:01 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b242380"], 0x47) 17:41:01 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000240)={{0x3ff, 0xfffffffd}, 0x100, './file0\x00'}) (async) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:01 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:01 executing program 4: sendmsg$AUDIT_SIGNAL_INFO(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1b833740d12189bb}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f2, 0x800, 0x70bd29, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4084}, 0x400cc50) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', '#\x00'}, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x1c1100, 0x0) 17:41:01 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, &(0x7f0000000140)) 17:41:01 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = dup2(r0, r0) write$tun(r1, &(0x7f0000000080)={@val, @val, @eth={@random="893874d32f70", @local, @void, {@generic={0x0, '{'}}}}, 0x1d) ioctl$int_out(r0, 0x0, &(0x7f0000000000)) r2 = dup2(r0, r0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f00000000c0)=0x80000000, 0x4) 17:41:01 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x3}, 0x2) 17:41:01 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some'}, 0x2f) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) [ 2246.430704] audit: type=1400 audit(1660326061.285:1407): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=2314E95F28FB16EEB6FA29DD1A3192441A734B50F9B170C6B9286795577EDFBAB1FF160D2E61EB05A087E81287246A88785A4E734F40A3 pid=3936 comm="syz-executor.2" 17:41:01 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x220000, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)={'stack ', '\xfe\x94\xd9\xf6`\x9b}\xfcXX\x0eSp\xda\xde\xf5j\x98\xc1\x88\x92\xe0j\xbec\x1fx\xffo\xe7\xc5_\xce\x91\xd5i2\xf8\xd8):W&\x9d\xfd6\xe5\xd3\x92w\xfa\xd9\x939\xe2#\x86{5\x90\xef#RE\x06\xa6/\x81\xee\x15J\xa1\x15\xc92\xe5\xccU\x18'}, 0x55) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r2, r0) 17:41:01 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000000), 0x101, 0x2) syz_open_dev$loop(&(0x7f00000000c0), 0x5, 0x200000) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x85\xec'}, 0x8) r3 = dup2(r1, 0xffffffffffffffff) ioctl$RNDADDTOENTCNT(r3, 0x40045201, &(0x7f0000000140)=0x5d09) 17:41:01 executing program 1: ioctl$int_out(0xffffffffffffffff, 0x1, &(0x7f0000000140)) 17:41:01 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:01 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="73746160fab52aebdd636b2023c565b7728a1fc34376d3f264b6125f43e23b4c3e171c14aee7b652f7"], 0x47) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, r2, 0x20, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1f}]}, 0x34}, 0x1, 0x0, 0x0, 0x80000}, 0x800) openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x200000, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB(r3, 0xc400941b, &(0x7f0000000f00)={0x0, 0x8, 0x6, 0x1}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000001300)={0x5, 0x2, {0x8000000000000000, @usage=0x8c, 0x0, 0x1000, 0x401, 0x7ff, 0x7, 0x40, 0x6b, @usage=0x8001, 0x1, 0x800, [0x4, 0xffffffffffffffff, 0x8, 0x4, 0x0, 0x7]}, {0x5, @struct={0x6, 0x80000001}, 0x0, 0x7, 0x1ff, 0x9, 0x5, 0x6ff, 0x10, @struct={0x8, 0xffffff1f}, 0x3, 0x4, [0x2000000000000, 0x9, 0x9, 0x1f, 0x3ff, 0x72d9]}, {0x100000001, @usage=0x1, r4, 0x101, 0x2, 0x10000, 0x4, 0x81, 0x8, @usage=0x5, 0x1, 0x6, [0x7, 0x3, 0x1, 0x0, 0x3, 0x3]}, {0x3, 0x6, 0x1f}}) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r3, 0xc0487c04, &(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000340), 0x5, 0x0, &(0x7f0000000080)=[{}, {}, {}, {}, {}], 0x0, 0x0, &(0x7f0000000680)}) 17:41:01 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x20400, 0x0) write$cgroup_pressure(r1, &(0x7f00000000c0)={'some', 0x20, 0xcb9}, 0x2f) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000100)={0x0, {}, 0x0, {}, 0x2, 0x4, 0x1d, 0x4, "0c47eea556a07c2f7e40af2ba9f3fc7de9d9831472e6ca031cf984e9aafe3e4f7efada9e0a951737f13c7b4062c4a368c2502fef02832bab9c7b231a1e579f6b", "21d74ae4eb9c19c89bc4c009d28b1c736cca82d240c15c1305be4cd915667347", [0x80000000, 0x4]}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x7fffffff}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xf125}]}, 0x4c}, 0x1, 0x0, 0x0, 0x50}, 0x4000005) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) 17:41:01 executing program 0: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x18, r0, 0x1, 0xff, 0x6, @broadcast}, 0x14) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x0, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x4004010) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) 17:41:01 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 17:41:01 executing program 1: ioctl$int_out(0xffffffffffffffff, 0x1, &(0x7f0000000140)) 17:41:01 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) (async) [ 2246.563257] audit: type=1400 audit(1660326061.295:1408): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=2380 pid=3940 comm="syz-executor.0" 17:41:01 executing program 5: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'exec ', '#\'&&[\x00'}, 0xb) r0 = getuid() setresuid(r0, 0x0, 0xee01) r1 = geteuid() r2 = getuid() setresuid(r2, 0x0, 0xee01) setresuid(r0, r1, r2) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = dup2(r3, r3) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r5, 0x0, 0x0, 0x0, 0x0, 0x0) write$tun(r4, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r5], 0x1d) 17:41:01 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:01 executing program 0: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x18, r0, 0x1, 0xff, 0x6, @broadcast}, 0x14) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x0, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x4004010) (async) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) 17:41:01 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 'p#*\x91\xb6\xd1\x12sa\xb6Jt\x92#\x1a\x95\'y'}, 0xffffffffffffffb6) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000080)={&(0x7f0000000200)="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", 0x1000, 0x0}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(0xffffffffffffffff, 0xc01064ac, &(0x7f0000000000)={r1, 0xfffffffffffffcf9, &(0x7f0000000140)=""/167}) 17:41:01 executing program 1: ioctl$int_out(0xffffffffffffffff, 0x1, &(0x7f0000000140)) 17:41:01 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000140)={0x0, 0x5, 0x89}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000540)={0x10, 0x2, {0x9, @struct={0x2, 0x5}, 0x0, 0x1, 0x7fffffff, 0x6d78, 0xe0, 0x9, 0x2, @usage=0x8, 0x721, 0x7fff, [0x3ff, 0x7e4f, 0xa18e, 0xc4de, 0x5, 0x4c5b]}, {0xd50, @struct={0x4, 0x1000}, 0x0, 0xa8a1, 0x10001, 0x200, 0x7f, 0xf29b, 0x42d, @usage, 0xe2, 0x7, [0x7, 0xd0, 0x8, 0x1, 0x4, 0x4]}, {0x2, @struct={0x3, 0x10001}, r1, 0x10000, 0x9, 0x4, 0x7, 0x2, 0x21, @usage=0x3ff, 0x1f, 0x9, [0x8, 0x4, 0xd33, 0x0, 0x6, 0x101]}, {0x60, 0x6, 0xe3}}) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) [ 2246.662409] audit: type=1400 audit(1660326061.325:1409): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=3932 comm="syz-executor.3" 17:41:01 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_out(r0, 0x1, &(0x7f0000000140)) 17:41:01 executing program 2: ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(0xffffffffffffffff, 0x942e, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a793a7f0729bc24dc060000000155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e91"], 0x83) 17:41:01 executing program 5: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r0, 0x4, 0x70bd28, 0x25dfdbfc, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x885}, 0x200000c0) sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x20, 0x3fa, 0x800, 0x70bd2a, 0x25dfdbfd, {0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000800}, 0x48000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some'}, 0x2f) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[], 0x8) 17:41:01 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x7, 0x1, 0xd, 0x14, "4eaa07c4404151ecabf960636f8ad8209322adc194531b68a8db13c2cf79fb69f745b60df83188ca4aadc557926cef795c871f06c7b5b2c123eb865b80370031", "ab78bd3f8d1c6fd9e0817004f6fbd0d4eaff2b6d9fc794ca2b04452622f8ac99", [0xfb, 0x80]}) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', '#\x00'}, 0x8) 17:41:01 executing program 0: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x18, r0, 0x1, 0xff, 0x6, @broadcast}, 0x14) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x0, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x4004010) (async) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) 17:41:01 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'full', 0x20, 0xffff, 0x20, 0x3}, 0x2f) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[], 0x8) close(r0) 17:41:01 executing program 2: ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(0xffffffffffffffff, 0x942e, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a793a7f0729bc24dc060000000155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e91"], 0x83) [ 2246.715517] audit: type=1400 audit(1660326061.335:1410): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=2314E95F28FB16EEB6FA29DD1A3192441A734B50F9B170C6B9286795577EDFBAB1FF160D2E61EB05A087E81287246A88785A4E734F40A3 pid=3942 comm="syz-executor.5" 17:41:01 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_out(r0, 0x1, &(0x7f0000000140)) 17:41:01 executing program 5: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x40100, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0xd, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) r3 = syz_open_dev$loop(&(0x7f00000000c0), 0x5, 0x80000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x100000000) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x2}}, '.\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x19, 0x6873, 0x100, 0x9, 0x1000, 0x1, 0x4911, '\x00', r2, r4, 0x4, 0x5}, 0x48) r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$MEDIA_IOC_ENUM_ENTITIES(0xffffffffffffffff, 0xc1007c01, &(0x7f0000000140)) write$apparmor_exec(r5, &(0x7f0000000100)={'exec ', '#\x00'}, 0x7) 17:41:01 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xff\x0f\x00\x00\x00\x00\x00\x00P\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xff}}, './file0\x00'}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r1) 17:41:01 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80c0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x24000, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x8001, 0x12, 0x1a, 0x4, "6af5f1ae868f92bb28c4eb92ac4da52e5d0d3b6c9a84947af102d8c8ed1b599e53f7210cb8fbfef0a5e62bf812acdbd532d0a0d5151d7ba7614618f9e1d592e5", "f25db7845fb899911b258cf4cf17c1ba19fc841e94cb400e61b3abb771e84c57", [0xed83, 0x1]}) write$apparmor_exec(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="73746163ebca5853682ad608389212673f90c752dd65272777cd8a527758871ef1bca891278b727f91fb932baba7ba333d2a3ec77bbfc8252a0c5354d5f885a3409648e2ebe82faca2be0000000000"], 0x47) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000200)) 17:41:01 executing program 2: ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(0xffffffffffffffff, 0x942e, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a793a7f0729bc24dc060000000155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e91"], 0x83) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(0xffffffffffffffff, 0x942e, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a793a7f0729bc24dc060000000155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e91"], 0x83) (async) 17:41:01 executing program 4: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000240)={'exec ', '#\x16\xe9_(\xfb\x16\xee\xb6\xfai\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\x1c\t\xd8\r\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1a\xa5py:\x7f\a)\xbc$\xdc%\x8dc\x88\x01UM8\'!;7(y7K\xf81d*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe1b\xe13\xd5bWwWGc\xff\xff\xff\x00\x00\x00\x00\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\x00\x00\x00\x00\x00\x00\x00\x00\xb1\xc5\xafR\xe8%\b_9\xfd_\t\xe2ik\xa0b\x89\xe7\x19\x94\xaaO\x93\x8e\x95\x7fH\x1c\xb5\xa3\xb6\x05\xf8\x16c\xfa\xbb\xfa\xf7D\xfe$x\xdd\x9b\xba:?C\x9d4k6\x81\xbc\xf0\xe0\x89R(\x0f&\xbd\x9anS\x80\xe6+0aq/U\xd9\xb11\xa2[\xac\xa7A\x96A\xde\xb8n\xbe\xda)j\x9b\xf6VC +'}, 0xf1) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 17:41:01 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_out(r0, 0x1, &(0x7f0000000140)) 17:41:01 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000480)={0x0, 0x7, 0x8, 0x1}) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x989, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000e80)={0x0, 0x4, 0x1, [0x9, 0x0, 0x2, 0x6, 0x7], [0x444f024a, 0xfff, 0x9, 0x4, 0x8, 0x7, 0x4, 0x7, 0x3, 0x3, 0xff, 0x4, 0x1, 0x9, 0x8, 0x2, 0x4, 0x0, 0x8, 0x200, 0xb7, 0x8, 0x60, 0x8001, 0x6, 0xfffffffffffffffb, 0x8000000000000001, 0x1, 0x6, 0x7, 0x2, 0x1, 0x7, 0x81, 0x0, 0x0, 0xffffffffffffabd7, 0x9, 0x2, 0x9, 0x7f, 0x8, 0x2, 0x2, 0xe26, 0x2, 0x2, 0x6, 0x1, 0xfff, 0x1, 0x3e, 0x2, 0x81, 0x2, 0x101, 0x362, 0x418a, 0xfffffffffffffffc, 0xfffffffffffffc01, 0x1, 0x3, 0x2f2, 0x1f0, 0x4, 0xac7, 0x0, 0x1, 0x10001, 0x0, 0x4, 0x5, 0x3, 0x2, 0xff, 0x16b, 0x9, 0x9, 0x9, 0x4b9, 0x1ff, 0x7, 0x7, 0x7f, 0x80000000, 0x1, 0x8000, 0x7, 0x2, 0x0, 0x3, 0x8000000000000000, 0x96, 0x5, 0x401, 0x7ef, 0xb487, 0x7fff, 0x9, 0x8, 0x7, 0x9, 0x7, 0x80000001, 0x80, 0x0, 0x7d47, 0x6, 0x3, 0xf54, 0x3, 0x5, 0x9, 0x3, 0x200, 0x0, 0x7fffffffffffffff, 0x7fffffffffffffff, 0x8, 0x6, 0x80000000]}) socket$rxrpc(0x21, 0x2, 0xa) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r4, 0xc400941d, &(0x7f0000000080)={r3, 0x100000001, 0x20000004000006, 0x1}) 17:41:01 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 17:41:01 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80c0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x24000, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x8001, 0x12, 0x1a, 0x4, "6af5f1ae868f92bb28c4eb92ac4da52e5d0d3b6c9a84947af102d8c8ed1b599e53f7210cb8fbfef0a5e62bf812acdbd532d0a0d5151d7ba7614618f9e1d592e5", "f25db7845fb899911b258cf4cf17c1ba19fc841e94cb400e61b3abb771e84c57", [0xed83, 0x1]}) write$apparmor_exec(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="73746163ebca5853682ad608389212673f90c752dd65272777cd8a527758871ef1bca891278b727f91fb932baba7ba333d2a3ec77bbfc8252a0c5354d5f885a3409648e2ebe82faca2be0000000000"], 0x47) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000200)) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80c0, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x24000, 0x0) (async) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x8001, 0x12, 0x1a, 0x4, "6af5f1ae868f92bb28c4eb92ac4da52e5d0d3b6c9a84947af102d8c8ed1b599e53f7210cb8fbfef0a5e62bf812acdbd532d0a0d5151d7ba7614618f9e1d592e5", "f25db7845fb899911b258cf4cf17c1ba19fc841e94cb400e61b3abb771e84c57", [0xed83, 0x1]}) (async) write$apparmor_exec(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="73746163ebca5853682ad608389212673f90c752dd65272777cd8a527758871ef1bca891278b727f91fb932baba7ba333d2a3ec77bbfc8252a0c5354d5f885a3409648e2ebe82faca2be0000000000"], 0x47) (async) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000200)) (async) [ 2246.837558] audit: type=1400 audit(1660326061.365:1411): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="-^'!&/-!:" pid=3949 comm="syz-executor.1" 17:41:01 executing program 5: write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some'}, 0x2f) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000340)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_pressure(r0, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$ptys(0xc, 0x3, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f00000001c0)) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r2, 0x80286722, &(0x7f0000000000)={&(0x7f00000000c0)=""/134, 0x86, 0x1, 0x1}) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000b00)=ANY=[@ANYBLOB="bf7f1ec358269b20143b629eda69da566129d8ea500ab6c66f8d877bfb76471c6361c72b786435376ce07be83e93368ce14e468deddbe0df38ad5c6a4e21fb91ef16da900af592c66e86264d37af511a8d58492da2625f585f88f6f56fc19d8385b8572fc8dc310f473cd726a3dc217a4ef3e8d81de44d2c1960b1978b10abc128e8ef2f68eac69d50a3f8cd10b73774a79bc409f9d4aa817cf3d7c20ce70c7097c5a485b5eca733ffced018994c9be68a1db56b2d73b29c6bb823d0fa90059deb443e7dfeb6f440d1c12ed4ac8a831624c3e7140baa3512002dc8059803f043b303f76e4263153cd0fd2b87007fd724", @ANYRESDEC=r1, @ANYRES32=r1, @ANYRES64=r1, @ANYRESHEX, @ANYBLOB="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", @ANYBLOB="890eac1a317a9093056de45caf6f4686bb53039c3ca90d52e39114e5ec5c233211cabdc2d16b5a001545c4a902e99e24eff00f80b30e327d26d544db3fa5ebfad4d1572d09fad90b54846cd275979df1ef39a9a04aeed3c368289e856691352bc4b7997df907157ced42c5fa31d95cd4a086249ef7673307351d88275f9e5d43240b03d2b9c34a6c32b1f2f25606c0a7964d4c9e381c03b2d30ed45c81cb77f752de765632ed63ab72"], 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000040)=0x2) 17:41:01 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x1, &(0x7f0000000140)) 17:41:01 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) r1 = dup2(r0, r0) bind$rds(r1, &(0x7f0000000000)={0x2, 0x4e21, @loopback}, 0x10) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 17:41:01 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 17:41:01 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000480)={0x0, 0x7, 0x8, 0x1}) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x989, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000e80)={0x0, 0x4, 0x1, [0x9, 0x0, 0x2, 0x6, 0x7], [0x444f024a, 0xfff, 0x9, 0x4, 0x8, 0x7, 0x4, 0x7, 0x3, 0x3, 0xff, 0x4, 0x1, 0x9, 0x8, 0x2, 0x4, 0x0, 0x8, 0x200, 0xb7, 0x8, 0x60, 0x8001, 0x6, 0xfffffffffffffffb, 0x8000000000000001, 0x1, 0x6, 0x7, 0x2, 0x1, 0x7, 0x81, 0x0, 0x0, 0xffffffffffffabd7, 0x9, 0x2, 0x9, 0x7f, 0x8, 0x2, 0x2, 0xe26, 0x2, 0x2, 0x6, 0x1, 0xfff, 0x1, 0x3e, 0x2, 0x81, 0x2, 0x101, 0x362, 0x418a, 0xfffffffffffffffc, 0xfffffffffffffc01, 0x1, 0x3, 0x2f2, 0x1f0, 0x4, 0xac7, 0x0, 0x1, 0x10001, 0x0, 0x4, 0x5, 0x3, 0x2, 0xff, 0x16b, 0x9, 0x9, 0x9, 0x4b9, 0x1ff, 0x7, 0x7, 0x7f, 0x80000000, 0x1, 0x8000, 0x7, 0x2, 0x0, 0x3, 0x8000000000000000, 0x96, 0x5, 0x401, 0x7ef, 0xb487, 0x7fff, 0x9, 0x8, 0x7, 0x9, 0x7, 0x80000001, 0x80, 0x0, 0x7d47, 0x6, 0x3, 0xf54, 0x3, 0x5, 0x9, 0x3, 0x200, 0x0, 0x7fffffffffffffff, 0x7fffffffffffffff, 0x8, 0x6, 0x80000000]}) socket$rxrpc(0x21, 0x2, 0xa) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r4, 0xc400941d, &(0x7f0000000080)={r3, 0x100000001, 0x20000004000006, 0x1}) 17:41:01 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80c0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x24000, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x8001, 0x12, 0x1a, 0x4, "6af5f1ae868f92bb28c4eb92ac4da52e5d0d3b6c9a84947af102d8c8ed1b599e53f7210cb8fbfef0a5e62bf812acdbd532d0a0d5151d7ba7614618f9e1d592e5", "f25db7845fb899911b258cf4cf17c1ba19fc841e94cb400e61b3abb771e84c57", [0xed83, 0x1]}) write$apparmor_exec(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="73746163ebca5853682ad608389212673f90c752dd65272777cd8a527758871ef1bca891278b727f91fb932baba7ba333d2a3ec77bbfc8252a0c5354d5f885a3409648e2ebe82faca2be0000000000"], 0x47) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000200)) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80c0, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x24000, 0x0) (async) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x8001, 0x12, 0x1a, 0x4, "6af5f1ae868f92bb28c4eb92ac4da52e5d0d3b6c9a84947af102d8c8ed1b599e53f7210cb8fbfef0a5e62bf812acdbd532d0a0d5151d7ba7614618f9e1d592e5", "f25db7845fb899911b258cf4cf17c1ba19fc841e94cb400e61b3abb771e84c57", [0xed83, 0x1]}) (async) write$apparmor_exec(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="73746163ebca5853682ad608389212673f90c752dd65272777cd8a527758871ef1bca891278b727f91fb932baba7ba333d2a3ec77bbfc8252a0c5354d5f885a3409648e2ebe82faca2be0000000000"], 0x47) (async) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000200)) (async) [ 2246.908345] audit: type=1400 audit(1660326061.365:1412): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=2314E95F28FB16EEB6FA29DD1A3192441A734B50F9B170C6B9286795577EDFBAB1FF160D2E61EB05A087E81287246A88785A4E734F40A3 pid=3948 comm="syz-executor.4" 17:41:01 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 17:41:01 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000240)={{0x7, 0xc5}, 0x100, './file0\x00'}) [ 2246.988442] audit: type=1400 audit(1660326061.365:1413): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=2380 pid=3950 comm="syz-executor.0" [ 2247.043147] audit: type=1400 audit(1660326061.405:1414): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=3953 comm="syz-executor.3" [ 2247.059426] audit: type=1400 audit(1660326061.455:1415): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="#" pid=3967 comm="syz-executor.4" 17:41:02 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x1, &(0x7f0000000140)) 17:41:02 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some'}, 0x2f) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_service_time\x00', 0x0, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, &(0x7f0000000680)={0x0, 0x1, 0x0, &(0x7f0000000200)=[{}], 0x5, 0x0, &(0x7f0000000280)=[{}, {}, {}, {}, {}], 0x5, 0x0, &(0x7f00000004c0)=[{0x0, 0x80000000}, {}, {}, {}, {}], 0x5, 0x0, &(0x7f0000000580)=[{}, {}, {}, {}, {}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000007c0)={0x80000000, &(0x7f0000000700), &(0x7f0000000740)=[{}, {{0x80000000, 0x0}}]}) ioctl$MEDIA_IOC_SETUP_LINK(r0, 0xc0347c03, &(0x7f0000000800)={{r1, r2, 0xc, [0x7f, 0x9]}, {0x80000000, 0x0, 0x1, [0x6, 0xffffffff]}, 0x4, [0x80000001, 0x2]}) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000009c0)={0x0, 0x7723b103, 0x1, [0x9, 0x3, 0x1, 0x7, 0x1000], [0xa7ea, 0x81, 0xff, 0x9e, 0x8, 0x8, 0x5, 0x1, 0x3, 0x0, 0x5, 0xfffffffffffffeff, 0x80, 0x9, 0x8000000000000000, 0x200, 0x10001, 0x0, 0x6, 0xffffffffffffffff, 0x5, 0xbe3d, 0x0, 0x20, 0x2f, 0x800, 0xca88, 0x7, 0x5, 0x3, 0xffffffffffffffba, 0xff, 0x10001, 0x1000, 0x1, 0x5, 0x9, 0x10001, 0x9, 0x10001, 0x4, 0x40, 0x2, 0xdc0000000000000, 0x0, 0x7, 0x5, 0x6, 0x100000000, 0x7ddf, 0x9, 0x2, 0xa70, 0x8, 0xbf5, 0x8000000000000000, 0x800, 0x1, 0x100000000, 0x1, 0x7, 0x9, 0xfff, 0x8, 0x8000, 0x7, 0x2000000000, 0x7, 0x8, 0x5, 0x0, 0x2, 0x5, 0x800, 0x100000000, 0x6, 0x5, 0x2, 0x80, 0x2c, 0x1, 0xfffffffffffffffe, 0x7c8, 0x1, 0x3f, 0x4, 0x401, 0x0, 0x0, 0x60, 0x0, 0x8c4, 0x9, 0x9e1, 0x4, 0x9, 0x7ff, 0x3f, 0x5, 0x6, 0xffff, 0x8001, 0xb4c, 0xfffffffffffffffe, 0x3, 0xff, 0x0, 0x6, 0x65ee, 0x7, 0x4, 0x800, 0x2, 0x80000000, 0x3ff, 0x10001, 0x4, 0x8f, 0x7, 0x1, 0x9]}) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000840), 0x2, 0x0) pwritev(r3, &(0x7f0000000980)=[{&(0x7f0000000880)="6946ddaf3e5c7d17f0d68bd813a70d371d485d2bc13abbdb4cf78c17fff5502339049aa8c2c47101ceb7527a02572c4b606f5e0ac3d7f6c15fa1b4d98ddd7d71e0b6502567a80eb17e152ef8ae69b7bd47f6f30b00b7341651472ca990e475a6a1eabb49cc102f11cc2749600a6558adb7e0846ec0a950b85dc051b2016a085b8dca18001f431f1074f25b60626562f2117a45213d01bdf84cf883542cce1f7364f57d51fa29f500a89b0474c7d9b60e8ba36b929723b4c7c9bafcdc9a50638d7d10c897e9902a0879b07719bdb9", 0xce}], 0x1, 0x5, 0x80) bind$rds(r0, &(0x7f00000000c0)={0x2, 0x4e21, @rand_addr=0x64010101}, 0x10) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x4102, 0x0) r4 = openat$cgroup_ro(r0, &(0x7f0000000140)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) connect$nfc_llcp(r4, &(0x7f0000000180)={0x27, 0x1, 0x1, 0x3, 0x9, 0x8, "3289152a7af7cdeeaec89b1a0e3736c6359d98c55bb658557b65a7e41064e3efc7635dc4f1a3b6c1d7f9e5561c844000d280facf45534db21cb2f4870cf3f2", 0x12}, 0x60) 17:41:02 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 17:41:02 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000140)={0x200, 0x7f, "9aa777ebae1d87bb3c2921ae4b4a4a25bc07ac3e9dbb10b25405b0ee671ba41a6f6b2849d7143e5e84a1ef9f38c1fe54a603e97d94b247b3510baf062716b634b801303ddd73f54949e5a01b8ab142b2bc11033fed521d1610c11266b2a59c7720b87abe8f8778691a67d4d04e848d6158562df8015430ed5504bc6f3685e3"}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000000200)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000600)={r3, 0x4, 0x0, [0xffffffff, 0x2, 0x4, 0x4, 0x5], [0x4c, 0xcf, 0x0, 0x9, 0x3, 0x7, 0x52, 0xb8, 0x1, 0x5, 0x53, 0x8, 0x4, 0xffffffffffffffff, 0x6, 0x10000, 0x7ff, 0xd6, 0x7, 0x5, 0x0, 0x6, 0x0, 0x3, 0xff, 0xe19, 0x5d17, 0x80, 0x2, 0x0, 0xffffffffffffff80, 0x7, 0x6, 0x1000, 0x2, 0x2, 0xffff, 0x7, 0x2, 0x8000000000000000, 0x0, 0x6, 0x20, 0x7fffffff, 0x8, 0x3, 0x5, 0x51, 0x2, 0x9, 0xe82, 0x4, 0x3ec, 0x1000, 0x64, 0x0, 0x7, 0x800, 0x1, 0x5, 0x4, 0x7fffffff, 0x100000001, 0x7, 0x8, 0x6, 0x7, 0x9, 0x7, 0x7, 0x2, 0x7fff, 0x6, 0x7671, 0x100, 0x1, 0x7, 0x7fffffffffffffff, 0x7, 0x3e, 0x0, 0x6, 0x9, 0x7, 0x1e7, 0x2, 0x5, 0x100000000, 0x6, 0x9, 0xfffffffffffffff9, 0x1, 0x9000000000000000, 0xd8df, 0xfab, 0x4, 0x0, 0x5, 0x6, 0x4, 0x6c86, 0x1, 0xffffffffffffffff, 0x0, 0x6, 0x4e8e, 0xffff, 0x85, 0x7ff, 0x8, 0x0, 0x0, 0x100, 0x1, 0x0, 0x8, 0x7f, 0x9, 0x5, 0xffff, 0xcb0f]}) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f0000000a80)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000a40)={&(0x7f00000000c0)={0x10, 0x3f2, 0x400, 0x70bd2d, 0x25dfdbfb, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x50}, 0x8001) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) 17:41:02 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x1, &(0x7f0000000140)) 17:41:02 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000480)={0x0, 0x7, 0x8, 0x1}) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x989, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000e80)={0x0, 0x4, 0x1, [0x9, 0x0, 0x2, 0x6, 0x7], [0x444f024a, 0xfff, 0x9, 0x4, 0x8, 0x7, 0x4, 0x7, 0x3, 0x3, 0xff, 0x4, 0x1, 0x9, 0x8, 0x2, 0x4, 0x0, 0x8, 0x200, 0xb7, 0x8, 0x60, 0x8001, 0x6, 0xfffffffffffffffb, 0x8000000000000001, 0x1, 0x6, 0x7, 0x2, 0x1, 0x7, 0x81, 0x0, 0x0, 0xffffffffffffabd7, 0x9, 0x2, 0x9, 0x7f, 0x8, 0x2, 0x2, 0xe26, 0x2, 0x2, 0x6, 0x1, 0xfff, 0x1, 0x3e, 0x2, 0x81, 0x2, 0x101, 0x362, 0x418a, 0xfffffffffffffffc, 0xfffffffffffffc01, 0x1, 0x3, 0x2f2, 0x1f0, 0x4, 0xac7, 0x0, 0x1, 0x10001, 0x0, 0x4, 0x5, 0x3, 0x2, 0xff, 0x16b, 0x9, 0x9, 0x9, 0x4b9, 0x1ff, 0x7, 0x7, 0x7f, 0x80000000, 0x1, 0x8000, 0x7, 0x2, 0x0, 0x3, 0x8000000000000000, 0x96, 0x5, 0x401, 0x7ef, 0xb487, 0x7fff, 0x9, 0x8, 0x7, 0x9, 0x7, 0x80000001, 0x80, 0x0, 0x7d47, 0x6, 0x3, 0xf54, 0x3, 0x5, 0x9, 0x3, 0x200, 0x0, 0x7fffffffffffffff, 0x7fffffffffffffff, 0x8, 0x6, 0x80000000]}) socket$rxrpc(0x21, 0x2, 0xa) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r4, 0xc400941d, &(0x7f0000000080)={r3, 0x100000001, 0x20000004000006, 0x1}) 17:41:02 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:02 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (fail_nth: 1) 17:41:02 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000140)={0x200, 0x7f, "9aa777ebae1d87bb3c2921ae4b4a4a25bc07ac3e9dbb10b25405b0ee671ba41a6f6b2849d7143e5e84a1ef9f38c1fe54a603e97d94b247b3510baf062716b634b801303ddd73f54949e5a01b8ab142b2bc11033fed521d1610c11266b2a59c7720b87abe8f8778691a67d4d04e848d6158562df8015430ed5504bc6f3685e3"}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000000200)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000600)={r3, 0x4, 0x0, [0xffffffff, 0x2, 0x4, 0x4, 0x5], [0x4c, 0xcf, 0x0, 0x9, 0x3, 0x7, 0x52, 0xb8, 0x1, 0x5, 0x53, 0x8, 0x4, 0xffffffffffffffff, 0x6, 0x10000, 0x7ff, 0xd6, 0x7, 0x5, 0x0, 0x6, 0x0, 0x3, 0xff, 0xe19, 0x5d17, 0x80, 0x2, 0x0, 0xffffffffffffff80, 0x7, 0x6, 0x1000, 0x2, 0x2, 0xffff, 0x7, 0x2, 0x8000000000000000, 0x0, 0x6, 0x20, 0x7fffffff, 0x8, 0x3, 0x5, 0x51, 0x2, 0x9, 0xe82, 0x4, 0x3ec, 0x1000, 0x64, 0x0, 0x7, 0x800, 0x1, 0x5, 0x4, 0x7fffffff, 0x100000001, 0x7, 0x8, 0x6, 0x7, 0x9, 0x7, 0x7, 0x2, 0x7fff, 0x6, 0x7671, 0x100, 0x1, 0x7, 0x7fffffffffffffff, 0x7, 0x3e, 0x0, 0x6, 0x9, 0x7, 0x1e7, 0x2, 0x5, 0x100000000, 0x6, 0x9, 0xfffffffffffffff9, 0x1, 0x9000000000000000, 0xd8df, 0xfab, 0x4, 0x0, 0x5, 0x6, 0x4, 0x6c86, 0x1, 0xffffffffffffffff, 0x0, 0x6, 0x4e8e, 0xffff, 0x85, 0x7ff, 0x8, 0x0, 0x0, 0x100, 0x1, 0x0, 0x8, 0x7f, 0x9, 0x5, 0xffff, 0xcb0f]}) (async, rerun: 32) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f0000000a80)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000a40)={&(0x7f00000000c0)={0x10, 0x3f2, 0x400, 0x70bd2d, 0x25dfdbfb, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x50}, 0x8001) (async, rerun: 32) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) 17:41:02 executing program 2: ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000640)={0x0, 0x6, 0x0, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x3, 0x0, &(0x7f0000000400)=[{}, {}, {}], 0x1, 0x0, &(0x7f0000000580)=[{}], 0x3, 0x0, &(0x7f00000005c0)=[{}, {}, {}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, &(0x7f0000000980)={0x0, 0x2, 0x0, &(0x7f00000007c0)=[{}, {}], 0x7, 0x0, &(0x7f0000000b00)=[{}, {}, {}, {}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000880)=[{}], 0x4, 0x0, &(0x7f00000008c0)=[{}, {}, {}, {}]}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f00000006c0)={'stack ', '%!@[\x00'}, 0xb) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000a00), 0x4) accept$nfc_llcp(r2, &(0x7f0000000700), &(0x7f0000000780)=0x60) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r2, &(0x7f0000000000)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb61a05dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a793a7f0729bc24dc258d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e9177d64f6a42e6e527faad3a8adc6b15ec49b353198f3eb3caddfd8cbf6a88c3b9d343e69ff9bf51ac97e0a45dd12ab40194ee8d40f879af74172cabad16e7c6e68dc95ddd7f949bee5d401198"], 0x83) write$apparmor_exec(r1, &(0x7f0000000180)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 17:41:02 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x0, &(0x7f0000000140)) 17:41:02 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:02 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000480)={0x0, 0x7, 0x8, 0x1}) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x989, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000e80)={0x0, 0x4, 0x1, [0x9, 0x0, 0x2, 0x6, 0x7], [0x444f024a, 0xfff, 0x9, 0x4, 0x8, 0x7, 0x4, 0x7, 0x3, 0x3, 0xff, 0x4, 0x1, 0x9, 0x8, 0x2, 0x4, 0x0, 0x8, 0x200, 0xb7, 0x8, 0x60, 0x8001, 0x6, 0xfffffffffffffffb, 0x8000000000000001, 0x1, 0x6, 0x7, 0x2, 0x1, 0x7, 0x81, 0x0, 0x0, 0xffffffffffffabd7, 0x9, 0x2, 0x9, 0x7f, 0x8, 0x2, 0x2, 0xe26, 0x2, 0x2, 0x6, 0x1, 0xfff, 0x1, 0x3e, 0x2, 0x81, 0x2, 0x101, 0x362, 0x418a, 0xfffffffffffffffc, 0xfffffffffffffc01, 0x1, 0x3, 0x2f2, 0x1f0, 0x4, 0xac7, 0x0, 0x1, 0x10001, 0x0, 0x4, 0x5, 0x3, 0x2, 0xff, 0x16b, 0x9, 0x9, 0x9, 0x4b9, 0x1ff, 0x7, 0x7, 0x7f, 0x80000000, 0x1, 0x8000, 0x7, 0x2, 0x0, 0x3, 0x8000000000000000, 0x96, 0x5, 0x401, 0x7ef, 0xb487, 0x7fff, 0x9, 0x8, 0x7, 0x9, 0x7, 0x80000001, 0x80, 0x0, 0x7d47, 0x6, 0x3, 0xf54, 0x3, 0x5, 0x9, 0x3, 0x200, 0x0, 0x7fffffffffffffff, 0x7fffffffffffffff, 0x8, 0x6, 0x80000000]}) socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 17:41:02 executing program 2: ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000640)={0x0, 0x6, 0x0, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x3, 0x0, &(0x7f0000000400)=[{}, {}, {}], 0x1, 0x0, &(0x7f0000000580)=[{}], 0x3, 0x0, &(0x7f00000005c0)=[{}, {}, {}]}) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, &(0x7f0000000980)={0x0, 0x2, 0x0, &(0x7f00000007c0)=[{}, {}], 0x7, 0x0, &(0x7f0000000b00)=[{}, {}, {}, {}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000880)=[{}], 0x4, 0x0, &(0x7f00000008c0)=[{}, {}, {}, {}]}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f00000006c0)={'stack ', '%!@[\x00'}, 0xb) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000a00), 0x4) (async) accept$nfc_llcp(r2, &(0x7f0000000700), &(0x7f0000000780)=0x60) (async) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r2, &(0x7f0000000000)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb61a05dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a793a7f0729bc24dc258d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e9177d64f6a42e6e527faad3a8adc6b15ec49b353198f3eb3caddfd8cbf6a88c3b9d343e69ff9bf51ac97e0a45dd12ab40194ee8d40f879af74172cabad16e7c6e68dc95ddd7f949bee5d401198"], 0x83) write$apparmor_exec(r1, &(0x7f0000000180)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) [ 2247.331423] FAULT_INJECTION: forcing a failure. [ 2247.331423] name failslab, interval 1, probability 0, space 0, times 0 17:41:02 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:02 executing program 4: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:02 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000140)={0x200, 0x7f, "9aa777ebae1d87bb3c2921ae4b4a4a25bc07ac3e9dbb10b25405b0ee671ba41a6f6b2849d7143e5e84a1ef9f38c1fe54a603e97d94b247b3510baf062716b634b801303ddd73f54949e5a01b8ab142b2bc11033fed521d1610c11266b2a59c7720b87abe8f8778691a67d4d04e848d6158562df8015430ed5504bc6f3685e3"}) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000000200)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000600)={r3, 0x4, 0x0, [0xffffffff, 0x2, 0x4, 0x4, 0x5], [0x4c, 0xcf, 0x0, 0x9, 0x3, 0x7, 0x52, 0xb8, 0x1, 0x5, 0x53, 0x8, 0x4, 0xffffffffffffffff, 0x6, 0x10000, 0x7ff, 0xd6, 0x7, 0x5, 0x0, 0x6, 0x0, 0x3, 0xff, 0xe19, 0x5d17, 0x80, 0x2, 0x0, 0xffffffffffffff80, 0x7, 0x6, 0x1000, 0x2, 0x2, 0xffff, 0x7, 0x2, 0x8000000000000000, 0x0, 0x6, 0x20, 0x7fffffff, 0x8, 0x3, 0x5, 0x51, 0x2, 0x9, 0xe82, 0x4, 0x3ec, 0x1000, 0x64, 0x0, 0x7, 0x800, 0x1, 0x5, 0x4, 0x7fffffff, 0x100000001, 0x7, 0x8, 0x6, 0x7, 0x9, 0x7, 0x7, 0x2, 0x7fff, 0x6, 0x7671, 0x100, 0x1, 0x7, 0x7fffffffffffffff, 0x7, 0x3e, 0x0, 0x6, 0x9, 0x7, 0x1e7, 0x2, 0x5, 0x100000000, 0x6, 0x9, 0xfffffffffffffff9, 0x1, 0x9000000000000000, 0xd8df, 0xfab, 0x4, 0x0, 0x5, 0x6, 0x4, 0x6c86, 0x1, 0xffffffffffffffff, 0x0, 0x6, 0x4e8e, 0xffff, 0x85, 0x7ff, 0x8, 0x0, 0x0, 0x100, 0x1, 0x0, 0x8, 0x7f, 0x9, 0x5, 0xffff, 0xcb0f]}) (async) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f0000000a80)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000a40)={&(0x7f00000000c0)={0x10, 0x3f2, 0x400, 0x70bd2d, 0x25dfdbfb, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x50}, 0x8001) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) [ 2247.388706] CPU: 1 PID: 4132 Comm: syz-executor.5 Not tainted 4.14.290-syzkaller #0 [ 2247.396563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2247.406570] Call Trace: [ 2247.409188] dump_stack+0x1b2/0x281 [ 2247.412831] should_fail.cold+0x10a/0x149 [ 2247.416984] should_failslab+0xd6/0x130 [ 2247.420983] __kmalloc_track_caller+0x2bc/0x400 [ 2247.425654] ? proc_pid_attr_write+0x16c/0x320 [ 2247.430239] memdup_user+0x22/0xa0 [ 2247.433775] proc_pid_attr_write+0x16c/0x320 17:41:02 executing program 4: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:02 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x8, 0x80, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[], 0x47) [ 2247.438184] __vfs_write+0xe4/0x630 [ 2247.441804] ? proc_pid_wchan+0xf0/0xf0 [ 2247.445771] ? __handle_mm_fault+0x80f/0x4620 [ 2247.450292] ? kernel_read+0x110/0x110 [ 2247.454190] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2247.459644] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2247.464659] vfs_write+0x17f/0x4d0 [ 2247.468203] SyS_write+0xf2/0x210 [ 2247.471658] ? SyS_read+0x210/0x210 [ 2247.475277] ? __do_page_fault+0x159/0xad0 [ 2247.479509] ? do_syscall_64+0x4c/0x640 [ 2247.483502] ? SyS_read+0x210/0x210 [ 2247.487129] do_syscall_64+0x1d5/0x640 [ 2247.491018] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2247.496198] RIP: 0033:0x7f986e994279 [ 2247.500541] RSP: 002b:00007f986d309168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2247.508246] RAX: ffffffffffffffda RBX: 00007f986eaa6f80 RCX: 00007f986e994279 [ 2247.515513] RDX: 0000000000000097 RSI: 0000000020000140 RDI: 0000000000000003 [ 2247.522789] RBP: 00007f986d3091d0 R08: 0000000000000000 R09: 0000000000000000 [ 2247.530057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 17:41:02 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (fail_nth: 2) 17:41:02 executing program 4: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:02 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x8, 0x80, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[], 0x47) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x8, 0x80, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[], 0x47) (async) 17:41:02 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x0, &(0x7f0000000140)) 17:41:02 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000480)={0x0, 0x7, 0x8, 0x1}) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x989, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000e80)={0x0, 0x4, 0x1, [0x9, 0x0, 0x2, 0x6, 0x7], [0x444f024a, 0xfff, 0x9, 0x4, 0x8, 0x7, 0x4, 0x7, 0x3, 0x3, 0xff, 0x4, 0x1, 0x9, 0x8, 0x2, 0x4, 0x0, 0x8, 0x200, 0xb7, 0x8, 0x60, 0x8001, 0x6, 0xfffffffffffffffb, 0x8000000000000001, 0x1, 0x6, 0x7, 0x2, 0x1, 0x7, 0x81, 0x0, 0x0, 0xffffffffffffabd7, 0x9, 0x2, 0x9, 0x7f, 0x8, 0x2, 0x2, 0xe26, 0x2, 0x2, 0x6, 0x1, 0xfff, 0x1, 0x3e, 0x2, 0x81, 0x2, 0x101, 0x362, 0x418a, 0xfffffffffffffffc, 0xfffffffffffffc01, 0x1, 0x3, 0x2f2, 0x1f0, 0x4, 0xac7, 0x0, 0x1, 0x10001, 0x0, 0x4, 0x5, 0x3, 0x2, 0xff, 0x16b, 0x9, 0x9, 0x9, 0x4b9, 0x1ff, 0x7, 0x7, 0x7f, 0x80000000, 0x1, 0x8000, 0x7, 0x2, 0x0, 0x3, 0x8000000000000000, 0x96, 0x5, 0x401, 0x7ef, 0xb487, 0x7fff, 0x9, 0x8, 0x7, 0x9, 0x7, 0x80000001, 0x80, 0x0, 0x7d47, 0x6, 0x3, 0xf54, 0x3, 0x5, 0x9, 0x3, 0x200, 0x0, 0x7fffffffffffffff, 0x7fffffffffffffff, 0x8, 0x6, 0x80000000]}) socket$rxrpc(0x21, 0x2, 0xa) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) [ 2247.537320] R13: 00007ffd8567a8cf R14: 00007f986d309300 R15: 0000000000022000 17:41:02 executing program 2: ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000640)={0x0, 0x6, 0x0, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x3, 0x0, &(0x7f0000000400)=[{}, {}, {}], 0x1, 0x0, &(0x7f0000000580)=[{}], 0x3, 0x0, &(0x7f00000005c0)=[{}, {}, {}]}) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, &(0x7f0000000980)={0x0, 0x2, 0x0, &(0x7f00000007c0)=[{}, {}], 0x7, 0x0, &(0x7f0000000b00)=[{}, {}, {}, {}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000880)=[{}], 0x4, 0x0, &(0x7f00000008c0)=[{}, {}, {}, {}]}) (async) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f00000006c0)={'stack ', '%!@[\x00'}, 0xb) (async, rerun: 64) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (rerun: 64) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000a00), 0x4) (async) accept$nfc_llcp(r2, &(0x7f0000000700), &(0x7f0000000780)=0x60) (async) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) write$apparmor_exec(r2, &(0x7f0000000000)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) (rerun: 32) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb61a05dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a793a7f0729bc24dc258d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e9177d64f6a42e6e527faad3a8adc6b15ec49b353198f3eb3caddfd8cbf6a88c3b9d343e69ff9bf51ac97e0a45dd12ab40194ee8d40f879af74172cabad16e7c6e68dc95ddd7f949bee5d401198"], 0x83) (async) write$apparmor_exec(r1, &(0x7f0000000180)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 17:41:02 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000480)={0x0, 0x7, 0x8, 0x1}) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x989, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000e80)={0x0, 0x4, 0x1, [0x9, 0x0, 0x2, 0x6, 0x7], [0x444f024a, 0xfff, 0x9, 0x4, 0x8, 0x7, 0x4, 0x7, 0x3, 0x3, 0xff, 0x4, 0x1, 0x9, 0x8, 0x2, 0x4, 0x0, 0x8, 0x200, 0xb7, 0x8, 0x60, 0x8001, 0x6, 0xfffffffffffffffb, 0x8000000000000001, 0x1, 0x6, 0x7, 0x2, 0x1, 0x7, 0x81, 0x0, 0x0, 0xffffffffffffabd7, 0x9, 0x2, 0x9, 0x7f, 0x8, 0x2, 0x2, 0xe26, 0x2, 0x2, 0x6, 0x1, 0xfff, 0x1, 0x3e, 0x2, 0x81, 0x2, 0x101, 0x362, 0x418a, 0xfffffffffffffffc, 0xfffffffffffffc01, 0x1, 0x3, 0x2f2, 0x1f0, 0x4, 0xac7, 0x0, 0x1, 0x10001, 0x0, 0x4, 0x5, 0x3, 0x2, 0xff, 0x16b, 0x9, 0x9, 0x9, 0x4b9, 0x1ff, 0x7, 0x7, 0x7f, 0x80000000, 0x1, 0x8000, 0x7, 0x2, 0x0, 0x3, 0x8000000000000000, 0x96, 0x5, 0x401, 0x7ef, 0xb487, 0x7fff, 0x9, 0x8, 0x7, 0x9, 0x7, 0x80000001, 0x80, 0x0, 0x7d47, 0x6, 0x3, 0xf54, 0x3, 0x5, 0x9, 0x3, 0x200, 0x0, 0x7fffffffffffffff, 0x7fffffffffffffff, 0x8, 0x6, 0x80000000]}) socket$rxrpc(0x21, 0x2, 0xa) 17:41:02 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:02 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x0, &(0x7f0000000140)) [ 2247.627180] FAULT_INJECTION: forcing a failure. [ 2247.627180] name failslab, interval 1, probability 0, space 0, times 0 [ 2247.649336] CPU: 1 PID: 4174 Comm: syz-executor.5 Not tainted 4.14.290-syzkaller #0 [ 2247.657152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2247.666504] Call Trace: [ 2247.669090] dump_stack+0x1b2/0x281 [ 2247.672726] should_fail.cold+0x10a/0x149 17:41:02 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) [ 2247.676882] should_failslab+0xd6/0x130 [ 2247.680863] __kmalloc+0x2c1/0x400 [ 2247.684417] ? apparmor_setprocattr+0x115/0xa80 [ 2247.689080] ? lock_acquire+0x170/0x3f0 [ 2247.693059] apparmor_setprocattr+0x115/0xa80 [ 2247.697562] ? apparmor_cred_free+0x70/0x70 [ 2247.701883] ? aa_file_perm+0x2dd/0xab0 [ 2247.705859] ? proc_pid_attr_write+0x1c0/0x320 [ 2247.710450] ? __might_fault+0x177/0x1b0 [ 2247.714509] security_setprocattr+0x74/0xb0 [ 2247.718831] proc_pid_attr_write+0x22b/0x320 [ 2247.723268] __vfs_write+0xe4/0x630 17:41:02 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x8, 0x80, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[], 0x47) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x8, 0x80, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[], 0x47) (async) 17:41:02 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000480)={0x0, 0x7, 0x8, 0x1}) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x989, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000e80)={0x0, 0x4, 0x1, [0x9, 0x0, 0x2, 0x6, 0x7], [0x444f024a, 0xfff, 0x9, 0x4, 0x8, 0x7, 0x4, 0x7, 0x3, 0x3, 0xff, 0x4, 0x1, 0x9, 0x8, 0x2, 0x4, 0x0, 0x8, 0x200, 0xb7, 0x8, 0x60, 0x8001, 0x6, 0xfffffffffffffffb, 0x8000000000000001, 0x1, 0x6, 0x7, 0x2, 0x1, 0x7, 0x81, 0x0, 0x0, 0xffffffffffffabd7, 0x9, 0x2, 0x9, 0x7f, 0x8, 0x2, 0x2, 0xe26, 0x2, 0x2, 0x6, 0x1, 0xfff, 0x1, 0x3e, 0x2, 0x81, 0x2, 0x101, 0x362, 0x418a, 0xfffffffffffffffc, 0xfffffffffffffc01, 0x1, 0x3, 0x2f2, 0x1f0, 0x4, 0xac7, 0x0, 0x1, 0x10001, 0x0, 0x4, 0x5, 0x3, 0x2, 0xff, 0x16b, 0x9, 0x9, 0x9, 0x4b9, 0x1ff, 0x7, 0x7, 0x7f, 0x80000000, 0x1, 0x8000, 0x7, 0x2, 0x0, 0x3, 0x8000000000000000, 0x96, 0x5, 0x401, 0x7ef, 0xb487, 0x7fff, 0x9, 0x8, 0x7, 0x9, 0x7, 0x80000001, 0x80, 0x0, 0x7d47, 0x6, 0x3, 0xf54, 0x3, 0x5, 0x9, 0x3, 0x200, 0x0, 0x7fffffffffffffff, 0x7fffffffffffffff, 0x8, 0x6, 0x80000000]}) [ 2247.726892] ? proc_pid_wchan+0xf0/0xf0 [ 2247.730868] ? __handle_mm_fault+0x80f/0x4620 [ 2247.735375] ? kernel_read+0x110/0x110 [ 2247.739275] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2247.744722] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2247.749739] vfs_write+0x17f/0x4d0 [ 2247.753280] SyS_write+0xf2/0x210 [ 2247.756737] ? SyS_read+0x210/0x210 [ 2247.760362] ? __do_page_fault+0x159/0xad0 [ 2247.764596] ? do_syscall_64+0x4c/0x640 [ 2247.768573] ? SyS_read+0x210/0x210 [ 2247.772202] do_syscall_64+0x1d5/0x640 [ 2247.776093] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2247.781282] RIP: 0033:0x7f986e994279 [ 2247.784982] RSP: 002b:00007f986d309168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2247.792688] RAX: ffffffffffffffda RBX: 00007f986eaa6f80 RCX: 00007f986e994279 [ 2247.799957] RDX: 0000000000000097 RSI: 0000000020000140 RDI: 0000000000000003 [ 2247.807221] RBP: 00007f986d3091d0 R08: 0000000000000000 R09: 0000000000000000 [ 2247.814485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 17:41:02 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (fail_nth: 3) 17:41:02 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000480)={0x0, 0x7, 0x8, 0x1}) syz_open_dev$dri(&(0x7f0000000000), 0x989, 0x800) 17:41:02 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000140)={0x0, 0x2, 0xa2}) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) 17:41:02 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000480)={0x0, 0x7, 0x8, 0x1}) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x989, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000e80)={0x0, 0x4, 0x1, [0x9, 0x0, 0x2, 0x6, 0x7], [0x444f024a, 0xfff, 0x9, 0x4, 0x8, 0x7, 0x4, 0x7, 0x3, 0x3, 0xff, 0x4, 0x1, 0x9, 0x8, 0x2, 0x4, 0x0, 0x8, 0x200, 0xb7, 0x8, 0x60, 0x8001, 0x6, 0xfffffffffffffffb, 0x8000000000000001, 0x1, 0x6, 0x7, 0x2, 0x1, 0x7, 0x81, 0x0, 0x0, 0xffffffffffffabd7, 0x9, 0x2, 0x9, 0x7f, 0x8, 0x2, 0x2, 0xe26, 0x2, 0x2, 0x6, 0x1, 0xfff, 0x1, 0x3e, 0x2, 0x81, 0x2, 0x101, 0x362, 0x418a, 0xfffffffffffffffc, 0xfffffffffffffc01, 0x1, 0x3, 0x2f2, 0x1f0, 0x4, 0xac7, 0x0, 0x1, 0x10001, 0x0, 0x4, 0x5, 0x3, 0x2, 0xff, 0x16b, 0x9, 0x9, 0x9, 0x4b9, 0x1ff, 0x7, 0x7, 0x7f, 0x80000000, 0x1, 0x8000, 0x7, 0x2, 0x0, 0x3, 0x8000000000000000, 0x96, 0x5, 0x401, 0x7ef, 0xb487, 0x7fff, 0x9, 0x8, 0x7, 0x9, 0x7, 0x80000001, 0x80, 0x0, 0x7d47, 0x6, 0x3, 0xf54, 0x3, 0x5, 0x9, 0x3, 0x200, 0x0, 0x7fffffffffffffff, 0x7fffffffffffffff, 0x8, 0x6, 0x80000000]}) 17:41:02 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nfc_llcp(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x27, 0x1, 0x1, 0x5, 0x5, 0x40, "ab46226b4718a28cc5d8c6177665599f60630154b4dbfb6793cc113b572eda28022a6c293a66b8a8544af5af2c6efea69583434a834b74b213be7e177de5c8", 0xe}, 0x60, &(0x7f0000000000)=[{&(0x7f0000000200)="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", 0x1000}], 0x1, &(0x7f0000001300)=ANY=[@ANYBLOB="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"], 0xf0}, 0x4044801) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fb29dd1a3192441a734b50f9b070c6b9286795577edfbab1ff160d2e6140a30032f91a793a7f0729bc24dc318d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720f7f1b41a37b6aaed43dee43bb572bab74b38b9bbb30217fd500f"], 0x83) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000040)={0x11, 0xd, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmsg$FOU_CMD_GET(r2, &(0x7f0000001480)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x60, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @dev={0xac, 0x14, 0x14, 0x37}}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0xac9615ca901052a7}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}]}, 0x60}, 0x1, 0x0, 0x0, 0xc}, 0x8000) openat$cgroup_pressure(r1, &(0x7f0000000140)='cpu.pressure\x00', 0x2, 0x0) 17:41:02 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) [ 2247.821753] R13: 00007ffd8567a8cf R14: 00007f986d309300 R15: 0000000000022000 17:41:02 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:02 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000480)={0x0, 0x7, 0x8, 0x1}) 17:41:02 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000140)={0x0, 0x2, 0xa2}) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000140)={0x0, 0x2, 0xa2}) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) [ 2247.900402] FAULT_INJECTION: forcing a failure. [ 2247.900402] name failslab, interval 1, probability 0, space 0, times 0 [ 2247.932463] CPU: 1 PID: 4212 Comm: syz-executor.5 Not tainted 4.14.290-syzkaller #0 [ 2247.940286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 17:41:02 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000480)={0x0, 0x7, 0x8, 0x1}) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x989, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000e80)={0x0, 0x4, 0x1, [0x9, 0x0, 0x2, 0x6, 0x7], [0x444f024a, 0xfff, 0x9, 0x4, 0x8, 0x7, 0x4, 0x7, 0x3, 0x3, 0xff, 0x4, 0x1, 0x9, 0x8, 0x2, 0x4, 0x0, 0x8, 0x200, 0xb7, 0x8, 0x60, 0x8001, 0x6, 0xfffffffffffffffb, 0x8000000000000001, 0x1, 0x6, 0x7, 0x2, 0x1, 0x7, 0x81, 0x0, 0x0, 0xffffffffffffabd7, 0x9, 0x2, 0x9, 0x7f, 0x8, 0x2, 0x2, 0xe26, 0x2, 0x2, 0x6, 0x1, 0xfff, 0x1, 0x3e, 0x2, 0x81, 0x2, 0x101, 0x362, 0x418a, 0xfffffffffffffffc, 0xfffffffffffffc01, 0x1, 0x3, 0x2f2, 0x1f0, 0x4, 0xac7, 0x0, 0x1, 0x10001, 0x0, 0x4, 0x5, 0x3, 0x2, 0xff, 0x16b, 0x9, 0x9, 0x9, 0x4b9, 0x1ff, 0x7, 0x7, 0x7f, 0x80000000, 0x1, 0x8000, 0x7, 0x2, 0x0, 0x3, 0x8000000000000000, 0x96, 0x5, 0x401, 0x7ef, 0xb487, 0x7fff, 0x9, 0x8, 0x7, 0x9, 0x7, 0x80000001, 0x80, 0x0, 0x7d47, 0x6, 0x3, 0xf54, 0x3, 0x5, 0x9, 0x3, 0x200, 0x0, 0x7fffffffffffffff, 0x7fffffffffffffff, 0x8, 0x6, 0x80000000]}) 17:41:02 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) [ 2247.949640] Call Trace: [ 2247.952231] dump_stack+0x1b2/0x281 [ 2247.955867] should_fail.cold+0x10a/0x149 [ 2247.960018] should_failslab+0xd6/0x130 [ 2247.963991] kmem_cache_alloc+0x40/0x3c0 [ 2247.968052] audit_log_start.part.0+0x20e/0x650 [ 2247.972720] ? kauditd_thread+0x630/0x630 [ 2247.976869] ? audit_filter+0x2a6/0x960 [ 2247.980852] ? audit_compare_dname_path+0x90/0x90 [ 2247.985688] ? trace_hardirqs_on+0x10/0x10 [ 2247.989919] ? aa_lookupn_profile+0x120/0x950 [ 2247.994414] ? __aafs_ns_mkdir+0x9d0/0x9d0 17:41:03 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2247.998644] audit_log_start+0x45/0x70 [ 2248.002530] ? audit_file_mask+0x110/0x110 [ 2248.006758] common_lsm_audit+0xb2/0x1a70 [ 2248.010905] ? ipv6_skb_to_auditdata+0xcb0/0xcb0 [ 2248.015661] ? aa_lookupn_profile+0x151/0x950 [ 2248.020166] aa_audit+0x1cb/0x620 [ 2248.023612] ? audit_file_mask+0x110/0x110 [ 2248.027847] aa_audit_file+0x2c0/0x540 [ 2248.031734] ? file_audit_cb+0x670/0x670 [ 2248.035793] ? aa_label_parse+0x512/0xa20 [ 2248.039945] ? kasan_kmalloc+0xeb/0x160 [ 2248.043923] aa_change_profile+0xcd3/0x2440 [ 2248.048247] ? trace_hardirqs_on_caller+0x4c1/0x580 [ 2248.053264] ? kernel_poison_pages+0x1b/0x250 [ 2248.057759] ? aa_change_hat+0xf60/0xf60 [ 2248.061832] ? depot_save_stack+0x10d/0x3f0 [ 2248.066156] ? fs_reclaim_release+0xd0/0x110 [ 2248.070568] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2248.076023] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2248.081031] ? __kmalloc+0x3a4/0x400 [ 2248.084729] ? apparmor_setprocattr+0x115/0xa80 [ 2248.089395] apparmor_setprocattr+0x98c/0xa80 [ 2248.093896] ? apparmor_cred_free+0x70/0x70 [ 2248.098214] ? aa_file_perm+0x2dd/0xab0 [ 2248.102269] ? proc_pid_attr_write+0x1c0/0x320 [ 2248.106845] ? __might_fault+0x177/0x1b0 [ 2248.110886] security_setprocattr+0x74/0xb0 [ 2248.115192] proc_pid_attr_write+0x22b/0x320 [ 2248.119582] __vfs_write+0xe4/0x630 [ 2248.123188] ? proc_pid_wchan+0xf0/0xf0 [ 2248.127145] ? __handle_mm_fault+0x80f/0x4620 [ 2248.131686] ? kernel_read+0x110/0x110 [ 2248.135559] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2248.140989] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2248.145987] vfs_write+0x17f/0x4d0 [ 2248.149510] SyS_write+0xf2/0x210 [ 2248.152945] ? SyS_read+0x210/0x210 [ 2248.156557] ? __do_page_fault+0x159/0xad0 [ 2248.160773] ? do_syscall_64+0x4c/0x640 [ 2248.164725] ? SyS_read+0x210/0x210 [ 2248.168358] do_syscall_64+0x1d5/0x640 [ 2248.172228] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2248.177396] RIP: 0033:0x7f986e994279 [ 2248.181085] RSP: 002b:00007f986d309168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2248.188772] RAX: ffffffffffffffda RBX: 00007f986eaa6f80 RCX: 00007f986e994279 17:41:03 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (fail_nth: 4) 17:41:03 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:03 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) 17:41:03 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000480)={0x0, 0x7, 0x8, 0x1}) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x989, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000e80)={0x0, 0x4, 0x1, [0x9, 0x0, 0x2, 0x6, 0x7], [0x444f024a, 0xfff, 0x9, 0x4, 0x8, 0x7, 0x4, 0x7, 0x3, 0x3, 0xff, 0x4, 0x1, 0x9, 0x8, 0x2, 0x4, 0x0, 0x8, 0x200, 0xb7, 0x8, 0x60, 0x8001, 0x6, 0xfffffffffffffffb, 0x8000000000000001, 0x1, 0x6, 0x7, 0x2, 0x1, 0x7, 0x81, 0x0, 0x0, 0xffffffffffffabd7, 0x9, 0x2, 0x9, 0x7f, 0x8, 0x2, 0x2, 0xe26, 0x2, 0x2, 0x6, 0x1, 0xfff, 0x1, 0x3e, 0x2, 0x81, 0x2, 0x101, 0x362, 0x418a, 0xfffffffffffffffc, 0xfffffffffffffc01, 0x1, 0x3, 0x2f2, 0x1f0, 0x4, 0xac7, 0x0, 0x1, 0x10001, 0x0, 0x4, 0x5, 0x3, 0x2, 0xff, 0x16b, 0x9, 0x9, 0x9, 0x4b9, 0x1ff, 0x7, 0x7, 0x7f, 0x80000000, 0x1, 0x8000, 0x7, 0x2, 0x0, 0x3, 0x8000000000000000, 0x96, 0x5, 0x401, 0x7ef, 0xb487, 0x7fff, 0x9, 0x8, 0x7, 0x9, 0x7, 0x80000001, 0x80, 0x0, 0x7d47, 0x6, 0x3, 0xf54, 0x3, 0x5, 0x9, 0x3, 0x200, 0x0, 0x7fffffffffffffff, 0x7fffffffffffffff, 0x8, 0x6, 0x80000000]}) 17:41:03 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000140)={0x0, 0x2, 0xa2}) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000140)={0x0, 0x2, 0xa2}) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) 17:41:03 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$nfc_llcp(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x27, 0x1, 0x1, 0x5, 0x5, 0x40, "ab46226b4718a28cc5d8c6177665599f60630154b4dbfb6793cc113b572eda28022a6c293a66b8a8544af5af2c6efea69583434a834b74b213be7e177de5c8", 0xe}, 0x60, &(0x7f0000000000)=[{&(0x7f0000000200)="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", 0x1000}], 0x1, &(0x7f0000001300)=ANY=[@ANYBLOB="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"], 0xf0}, 0x4044801) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fb29dd1a3192441a734b50f9b070c6b9286795577edfbab1ff160d2e6140a30032f91a793a7f0729bc24dc318d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720f7f1b41a37b6aaed43dee43bb572bab74b38b9bbb30217fd500f"], 0x83) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000040)={0x11, 0xd, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) (async) sendmsg$FOU_CMD_GET(r2, &(0x7f0000001480)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x60, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @dev={0xac, 0x14, 0x14, 0x37}}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0xac9615ca901052a7}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}]}, 0x60}, 0x1, 0x0, 0x0, 0xc}, 0x8000) (async) openat$cgroup_pressure(r1, &(0x7f0000000140)='cpu.pressure\x00', 0x2, 0x0) [ 2248.196016] RDX: 0000000000000097 RSI: 0000000020000140 RDI: 0000000000000003 [ 2248.203263] RBP: 00007f986d3091d0 R08: 0000000000000000 R09: 0000000000000000 [ 2248.210512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2248.217758] R13: 00007ffd8567a8cf R14: 00007f986d309300 R15: 0000000000022000 17:41:03 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000480)={0x0, 0x7, 0x8, 0x1}) syz_open_dev$dri(&(0x7f0000000000), 0x989, 0x800) 17:41:03 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) 17:41:03 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) [ 2248.315759] FAULT_INJECTION: forcing a failure. [ 2248.315759] name failslab, interval 1, probability 0, space 0, times 0 [ 2248.340633] CPU: 1 PID: 4249 Comm: syz-executor.5 Not tainted 4.14.290-syzkaller #0 [ 2248.348457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2248.357807] Call Trace: [ 2248.360398] dump_stack+0x1b2/0x281 17:41:03 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000480)={0x0, 0x7, 0x8, 0x1}) 17:41:03 executing program 3: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) [ 2248.364031] should_fail.cold+0x10a/0x149 [ 2248.368182] should_failslab+0xd6/0x130 [ 2248.372160] kmem_cache_alloc_node+0x54/0x410 [ 2248.376660] __alloc_skb+0x5c/0x510 [ 2248.380300] audit_log_start.part.0+0x233/0x650 [ 2248.384970] ? kauditd_thread+0x630/0x630 [ 2248.389120] ? audit_filter+0x2a6/0x960 [ 2248.393097] ? audit_compare_dname_path+0x90/0x90 [ 2248.397935] ? trace_hardirqs_on+0x10/0x10 [ 2248.402631] ? aa_lookupn_profile+0x120/0x950 [ 2248.407124] ? __aafs_ns_mkdir+0x9d0/0x9d0 [ 2248.411358] audit_log_start+0x45/0x70 17:41:03 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2248.415244] ? audit_file_mask+0x110/0x110 [ 2248.419475] common_lsm_audit+0xb2/0x1a70 [ 2248.423625] ? ipv6_skb_to_auditdata+0xcb0/0xcb0 [ 2248.428474] ? aa_lookupn_profile+0x151/0x950 [ 2248.432981] aa_audit+0x1cb/0x620 [ 2248.436428] ? audit_file_mask+0x110/0x110 [ 2248.440660] aa_audit_file+0x2c0/0x540 [ 2248.444542] ? file_audit_cb+0x670/0x670 [ 2248.448600] ? aa_label_parse+0x512/0xa20 [ 2248.452756] ? kasan_kmalloc+0xeb/0x160 [ 2248.456738] aa_change_profile+0xcd3/0x2440 [ 2248.461105] ? trace_hardirqs_on_caller+0x4c1/0x580 [ 2248.466122] ? kernel_poison_pages+0x1b/0x250 [ 2248.470621] ? aa_change_hat+0xf60/0xf60 [ 2248.474677] ? depot_save_stack+0x10d/0x3f0 [ 2248.479003] ? fs_reclaim_release+0xd0/0x110 [ 2248.483417] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2248.488866] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2248.493876] ? __kmalloc+0x3a4/0x400 [ 2248.497584] ? apparmor_setprocattr+0x115/0xa80 [ 2248.502495] apparmor_setprocattr+0x98c/0xa80 [ 2248.506980] ? apparmor_cred_free+0x70/0x70 [ 2248.511413] ? aa_file_perm+0x2dd/0xab0 [ 2248.515369] ? proc_pid_attr_write+0x1c0/0x320 [ 2248.519938] ? __might_fault+0x177/0x1b0 [ 2248.523981] security_setprocattr+0x74/0xb0 [ 2248.528286] proc_pid_attr_write+0x22b/0x320 [ 2248.532673] __vfs_write+0xe4/0x630 [ 2248.536283] ? proc_pid_wchan+0xf0/0xf0 [ 2248.540245] ? __handle_mm_fault+0x80f/0x4620 [ 2248.544741] ? kernel_read+0x110/0x110 [ 2248.548620] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2248.554061] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2248.559061] vfs_write+0x17f/0x4d0 [ 2248.562581] SyS_write+0xf2/0x210 [ 2248.566019] ? SyS_read+0x210/0x210 [ 2248.569650] ? __do_page_fault+0x159/0xad0 [ 2248.573888] ? do_syscall_64+0x4c/0x640 [ 2248.577858] ? SyS_read+0x210/0x210 [ 2248.581470] do_syscall_64+0x1d5/0x640 [ 2248.585343] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2248.590520] RIP: 0033:0x7f986e994279 [ 2248.594209] RSP: 002b:00007f986d309168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2248.601950] RAX: ffffffffffffffda RBX: 00007f986eaa6f80 RCX: 00007f986e994279 [ 2248.609200] RDX: 0000000000000097 RSI: 0000000020000140 RDI: 0000000000000003 17:41:03 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (fail_nth: 5) 17:41:03 executing program 3: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) 17:41:03 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) 17:41:03 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x47) r1 = dup2(0xffffffffffffffff, r0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000000)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) connect$rxrpc(r3, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1f}}}, 0x24) syz_open_dev$ptys(0xc, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 17:41:03 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:41:03 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$nfc_llcp(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x27, 0x1, 0x1, 0x5, 0x5, 0x40, "ab46226b4718a28cc5d8c6177665599f60630154b4dbfb6793cc113b572eda28022a6c293a66b8a8544af5af2c6efea69583434a834b74b213be7e177de5c8", 0xe}, 0x60, &(0x7f0000000000)=[{&(0x7f0000000200)="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", 0x1000}], 0x1, &(0x7f0000001300)=ANY=[@ANYBLOB="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"], 0xf0}, 0x4044801) (async) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fb29dd1a3192441a734b50f9b070c6b9286795577edfbab1ff160d2e6140a30032f91a793a7f0729bc24dc318d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720f7f1b41a37b6aaed43dee43bb572bab74b38b9bbb30217fd500f"], 0x83) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000040)={0x11, 0xd, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) (async) sendmsg$FOU_CMD_GET(r2, &(0x7f0000001480)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x60, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @dev={0xac, 0x14, 0x14, 0x37}}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0xac9615ca901052a7}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}]}, 0x60}, 0x1, 0x0, 0x0, 0xc}, 0x8000) (async) openat$cgroup_pressure(r1, &(0x7f0000000140)='cpu.pressure\x00', 0x2, 0x0) [ 2248.616464] RBP: 00007f986d3091d0 R08: 0000000000000000 R09: 0000000000000000 [ 2248.623726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2248.630971] R13: 00007ffd8567a8cf R14: 00007f986d309300 R15: 0000000000022000 17:41:03 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) 17:41:03 executing program 3: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) 17:41:03 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:41:03 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 32) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (rerun: 32) write$apparmor_exec(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x47) r1 = dup2(0xffffffffffffffff, r0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000000)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) connect$rxrpc(r3, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1f}}}, 0x24) (async) syz_open_dev$ptys(0xc, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) (async) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 17:41:03 executing program 1: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) 17:41:03 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) [ 2248.785245] FAULT_INJECTION: forcing a failure. [ 2248.785245] name failslab, interval 1, probability 0, space 0, times 0 [ 2248.811231] CPU: 1 PID: 4294 Comm: syz-executor.5 Not tainted 4.14.290-syzkaller #0 [ 2248.819052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2248.828401] Call Trace: [ 2248.830988] dump_stack+0x1b2/0x281 [ 2248.834623] should_fail.cold+0x10a/0x149 [ 2248.838778] should_failslab+0xd6/0x130 [ 2248.842751] kmem_cache_alloc_node_trace+0x58/0x400 [ 2248.847782] __kmalloc_node_track_caller+0x38/0x70 [ 2248.852714] __alloc_skb+0x96/0x510 [ 2248.856347] audit_log_start.part.0+0x233/0x650 [ 2248.861020] ? kauditd_thread+0x630/0x630 [ 2248.865166] ? audit_filter+0x2a6/0x960 [ 2248.872432] ? audit_compare_dname_path+0x90/0x90 [ 2248.877253] ? trace_hardirqs_on+0x10/0x10 [ 2248.881467] ? aa_lookupn_profile+0x120/0x950 [ 2248.885940] ? __aafs_ns_mkdir+0x9d0/0x9d0 [ 2248.890170] audit_log_start+0x45/0x70 [ 2248.894035] ? audit_file_mask+0x110/0x110 [ 2248.898246] common_lsm_audit+0xb2/0x1a70 [ 2248.902390] ? ipv6_skb_to_auditdata+0xcb0/0xcb0 [ 2248.907122] ? aa_lookupn_profile+0x151/0x950 [ 2248.911598] aa_audit+0x1cb/0x620 [ 2248.915028] ? audit_file_mask+0x110/0x110 [ 2248.919250] aa_audit_file+0x2c0/0x540 [ 2248.923117] ? file_audit_cb+0x670/0x670 [ 2248.927155] ? aa_label_parse+0x512/0xa20 [ 2248.931286] ? kasan_kmalloc+0xeb/0x160 [ 2248.935256] aa_change_profile+0xcd3/0x2440 [ 2248.939584] ? trace_hardirqs_on_caller+0x4c1/0x580 [ 2248.944581] ? kernel_poison_pages+0x1b/0x250 [ 2248.949051] ? aa_change_hat+0xf60/0xf60 [ 2248.953089] ? depot_save_stack+0x10d/0x3f0 [ 2248.957389] ? fs_reclaim_release+0xd0/0x110 [ 2248.961780] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2248.967205] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2248.972199] ? __kmalloc+0x3a4/0x400 [ 2248.975890] ? apparmor_setprocattr+0x115/0xa80 [ 2248.980802] apparmor_setprocattr+0x98c/0xa80 [ 2248.985278] ? apparmor_cred_free+0x70/0x70 [ 2248.989576] ? aa_file_perm+0x2dd/0xab0 [ 2248.993527] ? proc_pid_attr_write+0x1c0/0x320 [ 2248.998115] ? __might_fault+0x177/0x1b0 [ 2249.002155] security_setprocattr+0x74/0xb0 [ 2249.006457] proc_pid_attr_write+0x22b/0x320 [ 2249.010844] __vfs_write+0xe4/0x630 [ 2249.014445] ? proc_pid_wchan+0xf0/0xf0 [ 2249.018397] ? __handle_mm_fault+0x80f/0x4620 [ 2249.022870] ? kernel_read+0x110/0x110 [ 2249.026738] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2249.032168] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2249.037161] vfs_write+0x17f/0x4d0 [ 2249.040679] SyS_write+0xf2/0x210 [ 2249.044109] ? SyS_read+0x210/0x210 [ 2249.047712] ? __do_page_fault+0x159/0xad0 [ 2249.051925] ? do_syscall_64+0x4c/0x640 [ 2249.055876] ? SyS_read+0x210/0x210 [ 2249.059504] do_syscall_64+0x1d5/0x640 [ 2249.063391] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2249.068559] RIP: 0033:0x7f986e994279 [ 2249.072250] RSP: 002b:00007f986d309168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 17:41:04 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (fail_nth: 6) 17:41:04 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) 17:41:04 executing program 1: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) 17:41:04 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:04 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x47) r1 = dup2(0xffffffffffffffff, r0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000000)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) connect$rxrpc(r3, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1f}}}, 0x24) syz_open_dev$ptys(0xc, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x47) (async) dup2(0xffffffffffffffff, r0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$cgroup_ro(r1, &(0x7f0000000000)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) (async) connect$rxrpc(r3, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1f}}}, 0x24) (async) syz_open_dev$ptys(0xc, 0x3, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) (async) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) (async) 17:41:04 executing program 4: ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000640)={0x0, 0x6, 0x0, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x3, 0x0, &(0x7f0000000400)=[{}, {}, {}], 0x1, 0x0, &(0x7f0000000580)=[{}], 0x3, 0x0, &(0x7f00000005c0)=[{}, {}, {}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, &(0x7f0000000980)={0x0, 0x2, 0x0, &(0x7f00000007c0)=[{}, {}], 0x7, 0x0, &(0x7f0000000b00)=[{}, {}, {}, {}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000880)=[{}], 0x4, 0x0, &(0x7f00000008c0)=[{}, {}, {}, {}]}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f00000006c0)={'stack ', '%!@[\x00'}, 0xb) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000a00), 0x4) accept$nfc_llcp(r2, &(0x7f0000000700), &(0x7f0000000780)=0x60) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r2, &(0x7f0000000000)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb61a05dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a793a7f0729bc24dc258d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e9177d64f6a42e6e527faad3a8adc6b15ec49b353198f3eb3caddfd8cbf6a88c3b9d343e69ff9bf51ac97e0a45dd12ab40194ee8d40f879af74172cabad16e7c6e68dc95ddd7f949bee5d401198"], 0x83) write$apparmor_exec(r1, &(0x7f0000000180)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) [ 2249.079937] RAX: ffffffffffffffda RBX: 00007f986eaa6f80 RCX: 00007f986e994279 [ 2249.087193] RDX: 0000000000000097 RSI: 0000000020000140 RDI: 0000000000000003 [ 2249.094531] RBP: 00007f986d3091d0 R08: 0000000000000000 R09: 0000000000000000 [ 2249.101778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2249.109028] R13: 00007ffd8567a8cf R14: 00007f986d309300 R15: 0000000000022000 17:41:04 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x101}}, './file0\x00'}) write$cgroup_pressure(r1, &(0x7f0000000080)={'some', 0x20, 0x9, 0x20, 0x6}, 0x2f) 17:41:04 executing program 1: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) 17:41:04 executing program 4: ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000640)={0x0, 0x6, 0x0, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x3, 0x0, &(0x7f0000000400)=[{}, {}, {}], 0x1, 0x0, &(0x7f0000000580)=[{}], 0x3, 0x0, &(0x7f00000005c0)=[{}, {}, {}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, &(0x7f0000000980)={0x0, 0x2, 0x0, &(0x7f00000007c0)=[{}, {}], 0x7, 0x0, &(0x7f0000000b00)=[{}, {}, {}, {}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000880)=[{}], 0x4, 0x0, &(0x7f00000008c0)=[{}, {}, {}, {}]}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f00000006c0)={'stack ', '%!@[\x00'}, 0xb) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000a00), 0x4) accept$nfc_llcp(r2, &(0x7f0000000700), &(0x7f0000000780)=0x60) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r2, &(0x7f0000000000)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb61a05dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a793a7f0729bc24dc258d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e9177d64f6a42e6e527faad3a8adc6b15ec49b353198f3eb3caddfd8cbf6a88c3b9d343e69ff9bf51ac97e0a45dd12ab40194ee8d40f879af74172cabad16e7c6e68dc95ddd7f949bee5d401198"], 0x83) write$apparmor_exec(r1, &(0x7f0000000180)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 17:41:04 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) 17:41:04 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:04 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x101}}, './file0\x00'}) write$cgroup_pressure(r1, &(0x7f0000000080)={'some', 0x20, 0x9, 0x20, 0x6}, 0x2f) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x101}}, './file0\x00'}) (async) write$cgroup_pressure(r1, &(0x7f0000000080)={'some', 0x20, 0x9, 0x20, 0x6}, 0x2f) (async) 17:41:04 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) r1 = semget$private(0x0, 0x3, 0x8) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000002680)=""/46) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000200)=""/247) 17:41:04 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) 17:41:04 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) 17:41:04 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (fail_nth: 1) 17:41:04 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:04 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) 17:41:04 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) r1 = semget$private(0x0, 0x3, 0x8) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000002680)=""/46) (async) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000200)=""/247) 17:41:04 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x101}}, './file0\x00'}) write$cgroup_pressure(r1, &(0x7f0000000080)={'some', 0x20, 0x9, 0x20, 0x6}, 0x2f) 17:41:04 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000100)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 17:41:04 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) 17:41:04 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) socketpair(0x1, 0x4, 0x448, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'bridge_slave_0\x00', 0x0}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r2, 0x100, 0x70bd2b, 0x2, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x2c}, @FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_AF={0x5, 0x2, 0xa}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008010}, 0x8040) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x47) 17:41:04 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) 17:41:04 executing program 2: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b928679557100af35ce221c87edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a793a7f0729bc24dc258d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b59676432b8d79642da8e91"], 0x83) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x78, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) 17:41:04 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) r1 = semget$private(0x0, 0x3, 0x8) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000002680)=""/46) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000200)=""/247) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) semget$private(0x0, 0x3, 0x8) (async) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000002680)=""/46) (async) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000200)=""/247) (async) 17:41:04 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) 17:41:04 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000100)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000100)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) 17:41:04 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) socketpair(0x1, 0x4, 0x448, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'bridge_slave_0\x00', 0x0}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r2, 0x100, 0x70bd2b, 0x2, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x2c}, @FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_AF={0x5, 0x2, 0xa}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008010}, 0x8040) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x47) 17:41:04 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) 17:41:04 executing program 2: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b928679557100af35ce221c87edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a793a7f0729bc24dc258d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b59676432b8d79642da8e91"], 0x83) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x78, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b928679557100af35ce221c87edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a793a7f0729bc24dc258d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b59676432b8d79642da8e91"], 0x83) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x78}, 0x8) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) (async) 17:41:04 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[], 0x97) getsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f00000002c0)=""/185, &(0x7f0000000080)=0xb9) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="17003269ee0b998bec6e880000", @ANYRES16=0x0, @ANYBLOB="00042bbd05000000000006002800000000000800320007000000050038000100000008002c0081ffffff00000000"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x80) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000380)="fcd8165d8f66b86e3258bfebd6ca6946317e379b19197db879f0e9343878e7bc40c6088cfac21f676a5895ee9f15665b8da0f3232c26c0f3828a89fdc091988df443b5d88498b07e69296f757352087ea689fe40494c6e999084022f11e6e2d665f7ed73c8b97e319713680f00170e7fcb5ca46144e9e9810a3462477184f9e8ae58fc9f45f1bc8254f5483db2bf585a074d0329a779fda861fb4f7d1868f42a2eaf65fd916681aa040495c332c8f681f2781debc00961b62297d38edd5d72caacb61535a5b4eedbf0911b287e5564262c250105d4a701d9bce4894c6ecaa5cfc05948a12619519674cb502002c533b901c3feef50abc650c5ab8d45d150a725") ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendto$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) 17:41:04 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000100)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000100)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) 17:41:04 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) 17:41:04 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) 17:41:04 executing program 2: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b928679557100af35ce221c87edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a793a7f0729bc24dc258d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b59676432b8d79642da8e91"], 0x83) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x78, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) 17:41:04 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) socketpair(0x1, 0x4, 0x448, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'bridge_slave_0\x00', 0x0}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r2, 0x100, 0x70bd2b, 0x2, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x2c}, @FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_AF={0x5, 0x2, 0xa}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008010}, 0x8040) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x47) 17:41:04 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563209250b288c92fb513e5f82358a08af71a8fc8a23a433665ea1200000000000e00000000ca757597a33828bac818315cc4cc7cb2cee5c42da288fa0000000000"], 0x44) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x401, 0xce, "9b6816bf4f439c5e99f0dd23e0bf73bd2ddbca4ba9b348bc667d47996e527df21b2a48427019d1887b384cc31e50bab008e7c8ebc03b2abbc3304f9ebbc222f1caa895389fa94d1628803935815acc8927391055c27f94d3352335cc72f3f48bf93ac18fc14dd83e3c5074b169de85e43a6b0f3de41500d385dad7137d13cf320ca0c92733a1653b88ab5df5b34e0a9aa182c20a39a3486c70f9c31af0470358fbf46353c31fb1b7c988ce2da466362fcf4112f10a0fd8781bda20caf859446cabdabb4d78df89772d0fa7d0c686"}) 17:41:04 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[], 0x97) (async) getsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f00000002c0)=""/185, &(0x7f0000000080)=0xb9) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="17003269ee0b998bec6e880000", @ANYRES16=0x0, @ANYBLOB="00042bbd05000000000006002800000000000800320007000000050038000100000008002c0081ffffff00000000"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x80) (async) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000380)="fcd8165d8f66b86e3258bfebd6ca6946317e379b19197db879f0e9343878e7bc40c6088cfac21f676a5895ee9f15665b8da0f3232c26c0f3828a89fdc091988df443b5d88498b07e69296f757352087ea689fe40494c6e999084022f11e6e2d665f7ed73c8b97e319713680f00170e7fcb5ca46144e9e9810a3462477184f9e8ae58fc9f45f1bc8254f5483db2bf585a074d0329a779fda861fb4f7d1868f42a2eaf65fd916681aa040495c332c8f681f2781debc00961b62297d38edd5d72caacb61535a5b4eedbf0911b287e5564262c250105d4a701d9bce4894c6ecaa5cfc05948a12619519674cb502002c533b901c3feef50abc650c5ab8d45d150a725") (async) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendto$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) 17:41:04 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) 17:41:04 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) 17:41:04 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:41:04 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="293811f728c0d7ec640a1610bc1f2821815e74fc6a6cf998c6b62147e0c16ab518f43cbaec34af16505c3a044f497bbd3a6b5098ef0b96c5dbc6eea00b7e95fad68021308237fa602f20b8be6f380c21f53033085abc191562c7f302f303afec7ebf4540142c42a68dc98f85f66516a3780947f61f3067020b2d18e593f03d8cef4f669b56115cecb1ef30a762295024cbe33fb3c2565d094a64e9db704bf2194a80cbee9be40685d4abe0a59713a65f80fae041c163641624c74f4f45afa2acd3ac48409a7c4ae0c63a231b1dedd576c0187ebb284f868f96333e8328b8f68f0b46fb9218de01f8f2afa1495783dc03ff4d943de0471e64ff2aa6021cb12f2a") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000001440), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000001240), &(0x7f00000012c0)=0x60) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000001300)={{0x1, 0x1, 0x18, r2}, '.\x00'}) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000001400)={&(0x7f0000001340)=""/175, 0xaf, 0x40000000, 0xfff}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(0xffffffffffffffff, 0xc01064ac, &(0x7f0000000000)={0x2, 0x1000, &(0x7f0000000240)=""/4096}) 17:41:04 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563209250b288c92fb513e5f82358a08af71a8fc8a23a433665ea1200000000000e00000000ca757597a33828bac818315cc4cc7cb2cee5c42da288fa0000000000"], 0x44) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x401, 0xce, "9b6816bf4f439c5e99f0dd23e0bf73bd2ddbca4ba9b348bc667d47996e527df21b2a48427019d1887b384cc31e50bab008e7c8ebc03b2abbc3304f9ebbc222f1caa895389fa94d1628803935815acc8927391055c27f94d3352335cc72f3f48bf93ac18fc14dd83e3c5074b169de85e43a6b0f3de41500d385dad7137d13cf320ca0c92733a1653b88ab5df5b34e0a9aa182c20a39a3486c70f9c31af0470358fbf46353c31fb1b7c988ce2da466362fcf4112f10a0fd8781bda20caf859446cabdabb4d78df89772d0fa7d0c686"}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563209250b288c92fb513e5f82358a08af71a8fc8a23a433665ea1200000000000e00000000ca757597a33828bac818315cc4cc7cb2cee5c42da288fa0000000000"], 0x44) (async) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x401, 0xce, "9b6816bf4f439c5e99f0dd23e0bf73bd2ddbca4ba9b348bc667d47996e527df21b2a48427019d1887b384cc31e50bab008e7c8ebc03b2abbc3304f9ebbc222f1caa895389fa94d1628803935815acc8927391055c27f94d3352335cc72f3f48bf93ac18fc14dd83e3c5074b169de85e43a6b0f3de41500d385dad7137d13cf320ca0c92733a1653b88ab5df5b34e0a9aa182c20a39a3486c70f9c31af0470358fbf46353c31fb1b7c988ce2da466362fcf4112f10a0fd8781bda20caf859446cabdabb4d78df89772d0fa7d0c686"}) (async) 17:41:04 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[], 0x97) getsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f00000002c0)=""/185, &(0x7f0000000080)=0xb9) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="17003269ee0b998bec6e880000", @ANYRES16=0x0, @ANYBLOB="00042bbd05000000000006002800000000000800320007000000050038000100000008002c0081ffffff00000000"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x80) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000380)="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") ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendto$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[], 0x97) (async) getsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f00000002c0)=""/185, &(0x7f0000000080)=0xb9) (async) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="17003269ee0b998bec6e880000", @ANYRES16=0x0, @ANYBLOB="00042bbd05000000000006002800000000000800320007000000050038000100000008002c0081ffffff00000000"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x80) (async) socket$packet(0x11, 0x2, 0x300) (async) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000380)="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") (async) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00'}) (async) sendto$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) 17:41:04 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:41:04 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:41:04 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) 17:41:04 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="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") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000001440), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000001240), &(0x7f00000012c0)=0x60) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000001300)={{0x1, 0x1, 0x18, r2}, '.\x00'}) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000001400)={&(0x7f0000001340)=""/175, 0xaf, 0x40000000, 0xfff}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(0xffffffffffffffff, 0xc01064ac, &(0x7f0000000000)={0x2, 0x1000, &(0x7f0000000240)=""/4096}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="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") (async) openat$zero(0xffffffffffffff9c, &(0x7f0000001440), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000001240), &(0x7f00000012c0)=0x60) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000001300)={{0x1, 0x1, 0x18, r2}, '.\x00'}) (async) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) (async) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000001400)={&(0x7f0000001340)=""/175, 0xaf, 0x40000000, 0xfff}) (async) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(0xffffffffffffffff, 0xc01064ac, &(0x7f0000000000)={0x2, 0x1000, &(0x7f0000000240)=""/4096}) (async) 17:41:04 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563209250b288c92fb513e5f82358a08af71a8fc8a23a433665ea1200000000000e00000000ca757597a33828bac818315cc4cc7cb2cee5c42da288fa0000000000"], 0x44) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x401, 0xce, "9b6816bf4f439c5e99f0dd23e0bf73bd2ddbca4ba9b348bc667d47996e527df21b2a48427019d1887b384cc31e50bab008e7c8ebc03b2abbc3304f9ebbc222f1caa895389fa94d1628803935815acc8927391055c27f94d3352335cc72f3f48bf93ac18fc14dd83e3c5074b169de85e43a6b0f3de41500d385dad7137d13cf320ca0c92733a1653b88ab5df5b34e0a9aa182c20a39a3486c70f9c31af0470358fbf46353c31fb1b7c988ce2da466362fcf4112f10a0fd8781bda20caf859446cabdabb4d78df89772d0fa7d0c686"}) 17:41:04 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000200)="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") write$apparmor_exec(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x97) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) 17:41:04 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:41:04 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:41:04 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', 'E&,\x03`\xb9\xf7;\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x13\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\x81\x00\xb2\xce\xe5\xc4-\xa2\x88\xfa\x12\x7f\xc3W\xbb\xf7/)\r4\xc4\xba\xed\x8e\x15\xe4&\xce\xed%\xf3\xbd\x82j|\x00\x1c\b\x80.e)\x14\xdb^\xdfo\x81k\x19\xb9Pt\xdaXi6k\xbe\xeeZ\xc4\xc0_\xf5\xb7Uu_\xb0\xca\xc8\xb7%|\xea\x1b\xa0\x12\xe7\xfa\xa2\xea\x17#\x8b\x0136\x81\x80E\x15\xcf*\x9b\xde\xbc\x13s\xbf#\xfa\xa1\xb7\xa8n\x94Z\xf2w\x02\x14\x8aW\x01\v\xf1\x98\xacet2\xbd\xf3\xfb3\x10\xc2\xe7\xb4\xd4Vj.\xe8=83>\x10\xeb(\x02[\x9f\x1aD\xd1\xa8\xb5\x1a\xb1\x81\x84\xecz\x84P]+\xfe \xba\x85\xb4\xb9\x9d\xb3\xe3y\xcc\xbafs\xf9\xb2\xa1F,\x1fw\x8f\vB\x05}\xf3\aL\x1e\x13\xd1\a\x00\xe2e\x80\x99:'}, 0x103) 17:41:04 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) 17:41:04 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="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") (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000001440), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000001240), &(0x7f00000012c0)=0x60) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000001300)={{0x1, 0x1, 0x18, r2}, '.\x00'}) (async) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000001400)={&(0x7f0000001340)=""/175, 0xaf, 0x40000000, 0xfff}) (async) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(0xffffffffffffffff, 0xc01064ac, &(0x7f0000000000)={0x2, 0x1000, &(0x7f0000000240)=""/4096}) 17:41:05 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000200)="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") (async) write$apparmor_exec(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x97) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) 17:41:05 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:41:05 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', 'E&,\x03`\xb9\xf7;\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x13\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\x81\x00\xb2\xce\xe5\xc4-\xa2\x88\xfa\x12\x7f\xc3W\xbb\xf7/)\r4\xc4\xba\xed\x8e\x15\xe4&\xce\xed%\xf3\xbd\x82j|\x00\x1c\b\x80.e)\x14\xdb^\xdfo\x81k\x19\xb9Pt\xdaXi6k\xbe\xeeZ\xc4\xc0_\xf5\xb7Uu_\xb0\xca\xc8\xb7%|\xea\x1b\xa0\x12\xe7\xfa\xa2\xea\x17#\x8b\x0136\x81\x80E\x15\xcf*\x9b\xde\xbc\x13s\xbf#\xfa\xa1\xb7\xa8n\x94Z\xf2w\x02\x14\x8aW\x01\v\xf1\x98\xacet2\xbd\xf3\xfb3\x10\xc2\xe7\xb4\xd4Vj.\xe8=83>\x10\xeb(\x02[\x9f\x1aD\xd1\xa8\xb5\x1a\xb1\x81\x84\xecz\x84P]+\xfe \xba\x85\xb4\xb9\x9d\xb3\xe3y\xcc\xbafs\xf9\xb2\xa1F,\x1fw\x8f\vB\x05}\xf3\aL\x1e\x13\xd1\a\x00\xe2e\x80\x99:'}, 0x103) 17:41:05 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7374616355202380"], 0x47) 17:41:05 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000200)="6eeba473b63814ef507392c3ae27272a1e9d1e253a27c90beb79cecc4216fccd62db74413bd7254efc5bbb024033c7f481e0296f3909eb756f5e36cb4f1225036f966864cacae9b8b921342bd89a1407c9f91076ec6fdbd8cd13a63868ce3f1a1ad5da451ba1bb588d72cd4815d8889f291923ccfcd592f1a85437174394ed4118e3449967764f96efa1a3699d2e27b0704215a5ed7e7ce282ab7bffdca095e9645cd91f93c9aff234d3e259bb1c449d84b6a55aa6515dec2c03f710df2afe8e5164e0d5259eb38b0138169b049633defb3f45db275459332efd2b5ce8a6d7398801ab7f26afcb2493f7f28214b45b5e367ab45ac005505de286b8ce5f3e8c3f") (async) write$apparmor_exec(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x97) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) 17:41:05 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1m\x80\x8b>a\xb35\xc6p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r\x0ea\xeb\x05\xa0\x87\xe8\x12\x87\x1ay:\x7f\a)\xbc$\xdc,\x8dc\x88*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89{\x19gd2\xb8\xd7\x96B\xda\x8e\x91\x00'/126}, 0x83) 17:41:05 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354ef68495fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a4609dbd4f5ea9e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcd042338d440ab4e782bd4ec2bcf920f4826"], 0x97) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r2, &(0x7f0000000080)={'exec ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xefhI_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\xa9\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\x04#8\xd4@\xabNx+\xd4\xec+\xcf\x92\x0fH&\x06\x80\xa2'}, 0x96) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f0000000140)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000380)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f0000000840)=0x101) 17:41:05 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', 'E&,\x03`\xb9\xf7;\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x13\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\x81\x00\xb2\xce\xe5\xc4-\xa2\x88\xfa\x12\x7f\xc3W\xbb\xf7/)\r4\xc4\xba\xed\x8e\x15\xe4&\xce\xed%\xf3\xbd\x82j|\x00\x1c\b\x80.e)\x14\xdb^\xdfo\x81k\x19\xb9Pt\xdaXi6k\xbe\xeeZ\xc4\xc0_\xf5\xb7Uu_\xb0\xca\xc8\xb7%|\xea\x1b\xa0\x12\xe7\xfa\xa2\xea\x17#\x8b\x0136\x81\x80E\x15\xcf*\x9b\xde\xbc\x13s\xbf#\xfa\xa1\xb7\xa8n\x94Z\xf2w\x02\x14\x8aW\x01\v\xf1\x98\xacet2\xbd\xf3\xfb3\x10\xc2\xe7\xb4\xd4Vj.\xe8=83>\x10\xeb(\x02[\x9f\x1aD\xd1\xa8\xb5\x1a\xb1\x81\x84\xecz\x84P]+\xfe \xba\x85\xb4\xb9\x9d\xb3\xe3y\xcc\xbafs\xf9\xb2\xa1F,\x1fw\x8f\vB\x05}\xf3\aL\x1e\x13\xd1\a\x00\xe2e\x80\x99:'}, 0x103) 17:41:05 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7374616355202380"], 0x47) 17:41:05 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1m\x80\x8b>a\xb35\xc6p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r\x0ea\xeb\x05\xa0\x87\xe8\x12\x87\x1ay:\x7f\a)\xbc$\xdc,\x8dc\x88*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89{\x19gd2\xb8\xd7\x96B\xda\x8e\x91\x00'/126}, 0x83) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1m\x80\x8b>a\xb35\xc6p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r\x0ea\xeb\x05\xa0\x87\xe8\x12\x87\x1ay:\x7f\a)\xbc$\xdc,\x8dc\x88*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89{\x19gd2\xb8\xd7\x96B\xda\x8e\x91\x00'/126}, 0x83) (async) 17:41:05 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354ef68495fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a4609dbd4f5ea9e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcd042338d440ab4e782bd4ec2bcf920f4826"], 0x97) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r2, &(0x7f0000000080)={'exec ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xefhI_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\xa9\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\x04#8\xd4@\xabNx+\xd4\xec+\xcf\x92\x0fH&\x06\x80\xa2'}, 0x96) (async, rerun: 64) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f0000000140)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (rerun: 64) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000380)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (rerun: 64) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f0000000840)=0x101) 17:41:05 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7374616355202380"], 0x47) 17:41:05 executing program 4: ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000100)={0x3, 0x1, {0xfffffffffffffffc, @usage=0x6, 0x0, 0x8000, 0x200, 0x4, 0x7, 0xffffffffffffffff, 0x4c6cf9f4dc5c603d, @usage=0x3aa, 0x4, 0x9, [0x6b243420, 0x81, 0x3, 0x2, 0x401, 0xb45]}, {0x22, @struct={0x7, 0x2}, 0x0, 0x9, 0x7fffffffffffffff, 0x1, 0x6, 0x2, 0x22, @struct={0xb203, 0xf9df}, 0x10000, 0x8001, [0x7fffffff, 0x7fffffff, 0x76, 0x4, 0x2, 0x3]}, {0x5, @struct={0x6d, 0x635}, 0x0, 0x7fffffffffffffff, 0x9, 0x6, 0x1, 0x4, 0x14, @usage=0x7, 0x0, 0x9, [0x5, 0x1, 0x8, 0x3, 0x5, 0x49]}, {0x8000000000000000, 0x5, 0x9}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000500)={r0, 0x2, 0x1}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x4, 0x2040) pwritev(r2, &(0x7f0000001900)=[{&(0x7f0000000900)="eca4973daea98eb755534d55fd65abfb6433084e397debfaa8fb10b91f64a259a30efad12ad405be009f325ee02220b36b6d30a42bccde9b3333d724c0d23aeeedb9823de80b1784b87714cda0deab25e8957a5afc8b4bc230c856a7555c3fb7bf1d2b9b6b30dd49e245504d8f051955251b2ec7a2080ab3b75f8c8120af9975d12141ab714114f11dc958a63eedbc13319c558dc0465b9441a5047b10beda1578b7672830331935b25b323395b25b2c944b78d7b200dde8f1107cd1691af902113cecf49daadf977bc219ac1a17106f47e58f20f482841bd2e78b062a6f6cbe78f4681546973ae5b7e3073b7173532a852ce92d173122576ae55862cebb1322355919be849e86412e10e1962182ab2343f61657f744fd89aa2c0a6ecddeee253f36953f22ad5363a9e8692f23e93468443e5b22588307528b65c3bf89334314502c6c2a73f96e02958fe6964d1154f6c9b29f5fc94e3a1752100409a7028fcadc40675a57b2320098e64f2bbae37801db42a0c4c3b94a8fef535cc1110d4a628612a49726c701c24d8088a7bf91bee9c470618d2d9c28d6f77619889e18d2b5befc764b2c9ecaed98508c5091fad773453b9579cd3c8768d8e5eabba2d930d0b414542b53f111a2e37c352526d4e84422ed96993cd1d162cca4121a9d9cb55852bb3f32b36932ecd92153a0ac51134a381276ec76b698528ae57e0a72659d0aef82336bbd5b3f838cbf7115198249cf8c1d0aca9b8ba00855ebe979234c9d63e1451ee3bbd964ae9da4297776972264bd64d8d10c1a70fddc08fb81f1e114d0e26314b944d7ab0db4b894dd5a4eff8849c3ad2d4ae783b4f9d08c73c43f4a409b60f04d0858068f6b9f65016e52fdf3fee58ea1d743addbfca89f6f905d3c1c10d513cb98c8784a2e21b13de332c0b5d0b7b6d064046335f525a5497af980aba347ad49994521e04e0b44b9664a3dbb4b395772d67761fbb5eff8e2acd1b1979170d601a9aa856aae29327ac1bc2f55ebe3dbf7335ea4c90270fe55d5bf4aba65649807da51c3ee2c254b510759afe7f5a849ff790efd7492de9c645e87668b029f3aa72090eb4aadbd1814bdce9132556759e56c9a4431930990da3013845b0c7912a7747a231bcb6f97049134bbe548706512653ff4379629ab54e7e2559b5926791e6946ff28e0e4436cf4440b99fccb912bea662e15f20d1a63986d7035e1638232cbd029b2c4db67aef66f628d37b1b7e79205e2b0bc760e32e05c773c2a9325b14f2ba657c365d7c358c4c5815b6bf86c4fa01a03b0f2e03a70274711e23ce129c9d207f8c5dbbbf25acef0495e42a67698d35d73f05215ebbcf6141afcb393ae250977fae1051bb2c525d28dda31359abaf33a74bd0aeb44870b1fb5688f7a02be3520f24a8b18bde793a90f2ac7f2c6a30327ba6545adea6ad90f6de46bf3759e44fc96c51e2e2e5e36faacc7971808e3a8f9c4309878bbeded9e4546aa92add77e3c28aec82fb6af1958a748a3124f7946ddefc0dd8934a0468d0ea188a3187c982cce58e9c958a6fa2d8dadcf13efd401988a0d5eefb6d2924ffa1c2f374e872aeabbd4632334e5e13cfd53ec2d1dbd6cd97f9dad548afa94d244d2569572c1f6b47f55e5ed85ca02c135a0026431cbc028835fbfe7c9a46d94a7e46f243d43faadcfbc44d03b8970af91d48f6a2b114d8601c9524f7f31a40f8ba94e8fafcf9e63c8135654833ebaea13ff8a546bf2d2e474a28174ab100141e263eefdce62333e69956e47cf7648c1ef6c1e5fdf06216a1618f0d492b7673e4c56d7108b0bc5e476c6aaff1434a7955ba63bdecaec003fb186bd00dbff10ce8b1c9d98c1b36812a7ee62123a771d43892921a1c50c7b483f99ac1e0476f9d3be0ce0aaeda03c340a140c2f908e4f2e82b7ea881d277a0dbeacf54d28df0c862f2de8763380c04b46472573ac8463c5a4617615a3e8cc5c7dc4653e54486a3d49776594a298e188a4ee35b1e5bfb67a1bb43768fab2b62d4aa9013ad467209e1a5c1a21cd78cbe80867a22cdb0eb0069173769b0fa47110a0ddd7a768a8faa591f557c135fc3b004bdc300045ef9431473d613622b5b14f1f3e218935e0b6f714a7253ca4969929a7da7a44cd70d6839c4d5b5a4c6e7c36ee5c76a9b8f6be59a32c4e4829b10d1a2ff1d4e22e61a8b19d8efd4ea95e6938d5c9db96bc0a49c1910e3aea03d364fa20b7a16fc500d29da8bd523753b5edddd0b2d9a69a4596d3ab19a32360fa2d6e92cab16a05981f08fd85fea64ef0c8f79a50c2f6996a9ebd12eeab6027612410d2dcdb24ac5edab84dc646f05adb79847bdec0e1609922a90b4ef424ec2125f40b46f41ced6da01285ec89b40de876d14882786a522c4cc51ba35850e493df8486347259e0cf95ad4bea6f09f5cf1156f5675659fe6e5dab22c1aac423398e2ce504000b8d4ae5f8f87e22747fa2d5ba9ef931bafbd9c2d8049dd2d4f7186930a5052ca65438a2eb98170c570864be1c8967c144e93a047e670c71989d461c4bf2332cb13329a64f2e3396795a77380fe382415314d270335beb1eac1d48c2314b2b1e5fd476f45cc11c63a5dcd6b7d89da12b4d80c742b40096ba209a86f357733ffaa91de2078540ca79832a82654386839e43226dd76b5fd59689b213d53ebe4450d62a4100f9644ecd754c27a0d5978fddb723bc2d66d5eb5e07a4c3ee2173def0fa587eddacd22df0b930686a648db864f892e7415f1e659777544a1d80e654b108f8a25bcf7c062c75785ea09d317c829b39ed56c4db3361a38ab61a579d1bda02dd6233020c98d64eadef960cf14a425454f8872e6f5e12c50c612a79a8d3ab177ab153dd8d3c05cd86ad46b4d9a63f010e74d6bc47b238d9cfd44cc6832b939d52994196f1dea8803c0f56bc28cada94592ece384485f5cc75957783eb14828743a904b871bc224062cf97e1706db553408a6d0903e758073b76005fb317e5f8be564adf025cf1078e16bde1b3eae9b29fdb3caab28e13a334389c95355a65cda5ca1e74fa5c233fe81b4caa0799da0ce0740292079f38d049b021c08c39ffa2b8f55ad5242822b2bd92a0bfd34d858a40ef5189c5765150b45ed6fc2e3f226a90b2f03ee51c0ce6681c42b7d0a84b4b73965f6ebd276653d79c6f737a0ca12ef913a6a38a2124bb7f043b96355efc3b9c000b3f5001bcc370d3e4a152e56730c2f40a0c1bf91220ad823272fb203dfd44c6766f81e58cea606632cde84c0020d1a32221a6b7bc2ea8e02a422ed985920caf4464579ca3cbbacb3c3bc129d568df3f26c7b667fa756e4b4f157d1dce7d610581095543901a59ccff3de79c13098be27605200f3e616bf99289c7745ccf33c2d4b2ec74f58e4dab62b014e09c1cdc462b6ade48076e1a6d47801777ae7a9f16fe796018094188ab4d97d525f9af82d5d0c4ae6b4415a70189bf62b886806afbaa5b6cdf48bd38b0e913fecdf6a26d477491543ff97bd219a15d7fcd8344d7681e4f147ba6bffa3d5b00fc207f768c7490c4bc8a9cb37a7772060358c4c4eb277a7c8ee929c97e6d25ae74265855b97aacdd6c41bbed2bda377259b7defa1803542872b270676acb0318c7ad29369f9f96f276ad5b04490104634a6be7390d2768fd55085a46e4c338c85d08dc62f43fb251fc2eea50ba50d72d86037e2a60666d9525c92c07d698c5f8e92834492fb5e30f455b1017c79f81d9e3279d227d619fbeb759e90d35b8c015b55a12ae687459c59094f5329ea4678b7aef75f64aaa7e70f0d3157d0491f1339499fef224a4ce6f3582596c10208cbd048a783a3af0ded4ab0772808ba7603cd748b045d6b4daacb75de6d7d3f5929dfee780957ea9f2271f68e22eb46faed7b7e59a280ff5dc18ac38bb8eda46e7629ad72c5fea8e069863f55be6639c38fe3f03fb7cba45fc9ea4b19be65b1f2cf8fbfab198440b037254bd926f4b02d766b17c226fac084239457f98d984ad82d4c112f89dcdff0e531adc0033a1b8757e70eb99e14db3caf21e7ac3da4a1f5a6e2659447862ff7f0352b9f15a239ff22a13ed34401f6b73888e38e9da89080bc01927267810a62465f5d145717dfa6d6a26e3476fc69f834676738792ee5ffaefef3aec1e5eadd8b062335faffddae029b550585435717235d7eb4883c854a76e5063175ff7a6ad23b2c69cb238105d745a1894041cb1f5ffe4e969de7a1e3127b13317e407ab66c620adec348236a6a77d9a045cdcaa14d06f27d6fc9bfbf0c54e66603a3e0d6f3c31b57a433927ddbd889487af34bb53b503a80a03e7ed5b9bb6c683657765a0697dec6ed49745332bc6f19c1ee0b99d57b14e396589ed5f573335c0f9d7cb5856b4ec3e9217dfad7ff4408984115dc3cbdeb78f7baa13be78d734af8408c72f59dc474342476fcecf947faefef20fddeb440da71d355b114be1f2e74c437394e63aff9f54a58d21d26e425dc518a6999a1350d68e73815db7d50e1d54962e9dd94ed1ba6c56262757f8cb9de05e10fed5de4c831a00d508672c337ab9bba20697ff04f21e1b8d4c919784ac4715dbb5f27fc3de6452b9ea409bf83a1166bb70ad58cef79e963b34e682c3e180586071f65a15e08ad8eac22097f2904f075a1a05a484a4da8e8d2e845f4d5884df0c7ca5bf8b218a63c6e5e24801cec19f1390ffbd762896aa472a32e3670b5a19521158c664c342c929e2311346871bc8d2e0bcc0947ceed437c5173dce5dd0efb4e4048e707b18d8ff414756219f731318f527c0399df317e312fe7cd2b16aca0565d30a772e9f617468c9c94518f209f68231a9d67df31f0cc1c3c70461945585acda65d3d924012861e2e566e02ac427fab37714847846e800cea26ef06a076021bb5311ab048cb0944eb13c4400e0dd13518fd0a7a7b9f2ff1c54617399252f2b95d0e9df7c27274e66b8bdfdbded3941aac4c4355b5ebf231124e26701b1ea02e621e061e6fe902a23216fe1402d3111d32abac5de65b9137770f047c5c07990f2f0ec086d2e36fb7fe877ad502b8c302f6b5c3d5a9bc03b3ffadc05ea73951275e82655a2b4dc6fdb65fa4c13057f183206b39846786fd160cb18a364c5dca34fe4969018e9c4fd147d9d089cdd5ff115ba08b3b440b6bcc9dbddd1d42e67cdf9cfcb3c84e1737ec9c4ff3728d06a6ee3c0794cc5e4959f2ebb6564f8aba64e337fe33b06e17e63f5f888fd395faddc61c6a366f003afa756226eebf18888f2d86a078f2f8b0561d70352f3f93237b9fd039754f2745a7f29cd5f3a370fbdc8585f36eddc02cb3ee10e3cadb70cb9156695703d850948fabca81683166386d454fb9b53a8ddbc76f81f4137fd2f4ec350b7db4db70d26e822efbe4f3f512c06f020aed4c5b36d2040aaeba90267c7118ff7e20b24fb7bc7930495bec22ce07fb0f249c190138601d63735ee6ca6e3426a43e0c5ebdde8c2f29f477ba47476767348e63e71303b9068525b67aabee0e148d489711fa518495d61d622e8a95a04b0a1dc93167b259805cbaa9f70e7bf668a70f762e7cc0ba56230cf59507ae2c3354784bb15efc6c6b37543812ccb8c630ec8fcd1103ea696a0c45659eded43b26ad141bc3ff045f7fe78c2e2fe097eafb21207faa7129d03dda9b4bcbdff970ac4753236b667dc24486fe552442d92ef722edc2a0de9c48f06e570d1033db9937b396e943fad6b2adf238941473e5d394c697f149a90de8b186710ac3f5e500a176262dfd968a174995e34be301c647e95c1", 0x1000}], 0x1, 0x2, 0x8) 17:41:05 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354ef68495fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a4609dbd4f5ea9e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcd042338d440ab4e782bd4ec2bcf920f4826"], 0x97) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r2, &(0x7f0000000080)={'exec ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xefhI_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\xa9\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\x04#8\xd4@\xabNx+\xd4\xec+\xcf\x92\x0fH&\x06\x80\xa2'}, 0x96) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f0000000140)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000380)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f0000000840)=0x101) 17:41:05 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1m\x80\x8b>a\xb35\xc6p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r\x0ea\xeb\x05\xa0\x87\xe8\x12\x87\x1ay:\x7f\a)\xbc$\xdc,\x8dc\x88*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89{\x19gd2\xb8\xd7\x96B\xda\x8e\x91\x00'/126}, 0x83) 17:41:05 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 17:41:05 executing program 4: ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000100)={0x3, 0x1, {0xfffffffffffffffc, @usage=0x6, 0x0, 0x8000, 0x200, 0x4, 0x7, 0xffffffffffffffff, 0x4c6cf9f4dc5c603d, @usage=0x3aa, 0x4, 0x9, [0x6b243420, 0x81, 0x3, 0x2, 0x401, 0xb45]}, {0x22, @struct={0x7, 0x2}, 0x0, 0x9, 0x7fffffffffffffff, 0x1, 0x6, 0x2, 0x22, @struct={0xb203, 0xf9df}, 0x10000, 0x8001, [0x7fffffff, 0x7fffffff, 0x76, 0x4, 0x2, 0x3]}, {0x5, @struct={0x6d, 0x635}, 0x0, 0x7fffffffffffffff, 0x9, 0x6, 0x1, 0x4, 0x14, @usage=0x7, 0x0, 0x9, [0x5, 0x1, 0x8, 0x3, 0x5, 0x49]}, {0x8000000000000000, 0x5, 0x9}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000500)={r0, 0x2, 0x1}) (async) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x4, 0x2040) pwritev(r2, &(0x7f0000001900)=[{&(0x7f0000000900)="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", 0x1000}], 0x1, 0x2, 0x8) 17:41:05 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 17:41:05 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fc4f6f779910fc00634fbda5f2458ac4a5d078b4693461e0894a649bea08ae1e4fc0d9a90e3d9e7ff9b7b28f4821abe7d8b6fa3a7dcadcb3ddffd91955d65dac191d4feaf0311def1677645f09c6b95c98a269ba383396249e2492909a49571cda08f194590f4da040edad9a512468834b5c757"], 0x97) 17:41:05 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:05 executing program 4: ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000100)={0x3, 0x1, {0xfffffffffffffffc, @usage=0x6, 0x0, 0x8000, 0x200, 0x4, 0x7, 0xffffffffffffffff, 0x4c6cf9f4dc5c603d, @usage=0x3aa, 0x4, 0x9, [0x6b243420, 0x81, 0x3, 0x2, 0x401, 0xb45]}, {0x22, @struct={0x7, 0x2}, 0x0, 0x9, 0x7fffffffffffffff, 0x1, 0x6, 0x2, 0x22, @struct={0xb203, 0xf9df}, 0x10000, 0x8001, [0x7fffffff, 0x7fffffff, 0x76, 0x4, 0x2, 0x3]}, {0x5, @struct={0x6d, 0x635}, 0x0, 0x7fffffffffffffff, 0x9, 0x6, 0x1, 0x4, 0x14, @usage=0x7, 0x0, 0x9, [0x5, 0x1, 0x8, 0x3, 0x5, 0x49]}, {0x8000000000000000, 0x5, 0x9}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000500)={r0, 0x2, 0x1}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x4, 0x2040) pwritev(r2, &(0x7f0000001900)=[{&(0x7f0000000900)="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", 0x1000}], 0x1, 0x2, 0x8) 17:41:05 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 17:41:05 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x97) 17:41:05 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:05 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xb8) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b20920ce3618088a8d58549a52e0dc450b288c92faf13e5f82358a08af71a8fc8e52a51568b2103cc6292093ddaa23b43674c5dccaa3665ea1288fb8017720e00002b84854270483a0000cb757597438a95ffc818315ce3cc7cb2cee5c42da22f88"], 0xfffffffffffffe66) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x7fffffff, 0x8, 0x0, 0x12, 0x1f, 0xc, "b2cb8a6682045c2a3e5602f0503a0a12897a07397c7a3f9ca849bb55dcd6f06fddda005c46d3bfce0ee5dd80d216c8a6ff5be29d868eb2a29159703de09e4c2f", "1ed8087a99750f8cf530597644415a86ab04e2f023d64f4d36f0f80cfaa2cba3fa7857edd1b8aa8db066128442896028a815c8b03a2951da04f549eb95a52ac1", "85b5c8e2578a986878a8bbc05e7d0a1094fa35ecc11e713314bc37ee78b312c9", [0x7, 0xfffffffffffffffb]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000680)={0x0, 0x0, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 17:41:05 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) semtimedop(0xffffffffffffffff, &(0x7f0000000000)=[{0x1, 0x2, 0x1800}, {0x3, 0xd7}, {0x2, 0x971, 0x1000}, {0x3, 0xfffc, 0x1000}], 0x4, &(0x7f0000000080)={0x0, 0x3938700}) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) 17:41:05 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x97) 17:41:05 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) (async) 17:41:05 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xb8) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b20920ce3618088a8d58549a52e0dc450b288c92faf13e5f82358a08af71a8fc8e52a51568b2103cc6292093ddaa23b43674c5dccaa3665ea1288fb8017720e00002b84854270483a0000cb757597438a95ffc818315ce3cc7cb2cee5c42da22f88"], 0xfffffffffffffe66) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x7fffffff, 0x8, 0x0, 0x12, 0x1f, 0xc, "b2cb8a6682045c2a3e5602f0503a0a12897a07397c7a3f9ca849bb55dcd6f06fddda005c46d3bfce0ee5dd80d216c8a6ff5be29d868eb2a29159703de09e4c2f", "1ed8087a99750f8cf530597644415a86ab04e2f023d64f4d36f0f80cfaa2cba3fa7857edd1b8aa8db066128442896028a815c8b03a2951da04f549eb95a52ac1", "85b5c8e2578a986878a8bbc05e7d0a1094fa35ecc11e713314bc37ee78b312c9", [0x7, 0xfffffffffffffffb]}) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000680)={0x0, 0x0, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 17:41:05 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) semtimedop(0xffffffffffffffff, &(0x7f0000000000)=[{0x1, 0x2, 0x1800}, {0x3, 0xd7}, {0x2, 0x971, 0x1000}, {0x3, 0xfffc, 0x1000}], 0x4, &(0x7f0000000080)={0x0, 0x3938700}) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) 17:41:05 executing program 5: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000200)={0x9, 0x0, {0x2, @usage=0xfffffffffffffffc, 0x0, 0x4311, 0x6, 0x4, 0x9, 0x0, 0x5a, @usage=0x7, 0x1594, 0x7ff, [0x80, 0x5, 0x800, 0x20, 0x7f, 0x369]}, {0x2136, @struct={0x3, 0x4}, 0x0, 0x6, 0x2, 0x8, 0xfffffffffffff705, 0x2, 0x24, @struct={0x8, 0x1}, 0x1, 0x3b0000, [0x8000000000000000, 0x10001, 0x7, 0x5, 0x15, 0xfff]}, {0xffffffffffffff80, @struct={0x1ff, 0x16}, 0x0, 0xd96, 0x3, 0x6, 0x3, 0x9f15, 0x98, @usage=0x2, 0x1000, 0x1, [0x5, 0x11eb, 0x7fffffffffffffff, 0x80000000, 0xf5fe, 0x8]}, {0xec, 0x8001, 0x6}}) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f0000000080)={{r1}, {@val={r2}, @actul_num={@val=0x2d, 0x3f, 0x4b}}}) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:05 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e9c0daacdea48326f176431b60115f28fb16eeb606fa29dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e610a06a087e81287246a88785a4e734f40a30032f91a793a7f0729bc24dc318d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e91"], 0x83) 17:41:05 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xb8) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b20920ce3618088a8d58549a52e0dc450b288c92faf13e5f82358a08af71a8fc8e52a51568b2103cc6292093ddaa23b43674c5dccaa3665ea1288fb8017720e00002b84854270483a0000cb757597438a95ffc818315ce3cc7cb2cee5c42da22f88"], 0xfffffffffffffe66) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x7fffffff, 0x8, 0x0, 0x12, 0x1f, 0xc, "b2cb8a6682045c2a3e5602f0503a0a12897a07397c7a3f9ca849bb55dcd6f06fddda005c46d3bfce0ee5dd80d216c8a6ff5be29d868eb2a29159703de09e4c2f", "1ed8087a99750f8cf530597644415a86ab04e2f023d64f4d36f0f80cfaa2cba3fa7857edd1b8aa8db066128442896028a815c8b03a2951da04f549eb95a52ac1", "85b5c8e2578a986878a8bbc05e7d0a1094fa35ecc11e713314bc37ee78b312c9", [0x7, 0xfffffffffffffffb]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000680)={0x0, 0x0, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 17:41:05 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) semtimedop(0xffffffffffffffff, &(0x7f0000000000)=[{0x1, 0x2, 0x1800}, {0x3, 0xd7}, {0x2, 0x971, 0x1000}, {0x3, 0xfffc, 0x1000}], 0x4, &(0x7f0000000080)={0x0, 0x3938700}) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) semtimedop(0xffffffffffffffff, &(0x7f0000000000)=[{0x1, 0x2, 0x1800}, {0x3, 0xd7}, {0x2, 0x971, 0x1000}, {0x3, 0xfffc, 0x1000}], 0x4, &(0x7f0000000080)={0x0, 0x3938700}) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) 17:41:05 executing program 5: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) (async) r1 = socket$nl_audit(0x10, 0x3, 0x9) (async) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000200)={0x9, 0x0, {0x2, @usage=0xfffffffffffffffc, 0x0, 0x4311, 0x6, 0x4, 0x9, 0x0, 0x5a, @usage=0x7, 0x1594, 0x7ff, [0x80, 0x5, 0x800, 0x20, 0x7f, 0x369]}, {0x2136, @struct={0x3, 0x4}, 0x0, 0x6, 0x2, 0x8, 0xfffffffffffff705, 0x2, 0x24, @struct={0x8, 0x1}, 0x1, 0x3b0000, [0x8000000000000000, 0x10001, 0x7, 0x5, 0x15, 0xfff]}, {0xffffffffffffff80, @struct={0x1ff, 0x16}, 0x0, 0xd96, 0x3, 0x6, 0x3, 0x9f15, 0x98, @usage=0x2, 0x1000, 0x1, [0x5, 0x11eb, 0x7fffffffffffffff, 0x80000000, 0xf5fe, 0x8]}, {0xec, 0x8001, 0x6}}) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f0000000080)={{r1}, {@val={r2}, @actul_num={@val=0x2d, 0x3f, 0x4b}}}) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:05 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e9c0daacdea48326f176431b60115f28fb16eeb606fa29dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e610a06a087e81287246a88785a4e734f40a30032f91a793a7f0729bc24dc318d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e91"], 0x83) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e9c0daacdea48326f176431b60115f28fb16eeb606fa29dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e610a06a087e81287246a88785a4e734f40a30032f91a793a7f0729bc24dc318d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e91"], 0x83) (async) 17:41:05 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x400, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000880}, 0x4000010) 17:41:05 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'nr0\x00'}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0xffffff0a) write$apparmor_exec(r0, &(0x7f0000000180)={'stack ', '\x92P\xb2\x00\x04/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\xff\xff\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0x45) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 17:41:05 executing program 5: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = socket$nl_audit(0x10, 0x3, 0x9) (async) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000200)={0x9, 0x0, {0x2, @usage=0xfffffffffffffffc, 0x0, 0x4311, 0x6, 0x4, 0x9, 0x0, 0x5a, @usage=0x7, 0x1594, 0x7ff, [0x80, 0x5, 0x800, 0x20, 0x7f, 0x369]}, {0x2136, @struct={0x3, 0x4}, 0x0, 0x6, 0x2, 0x8, 0xfffffffffffff705, 0x2, 0x24, @struct={0x8, 0x1}, 0x1, 0x3b0000, [0x8000000000000000, 0x10001, 0x7, 0x5, 0x15, 0xfff]}, {0xffffffffffffff80, @struct={0x1ff, 0x16}, 0x0, 0xd96, 0x3, 0x6, 0x3, 0x9f15, 0x98, @usage=0x2, 0x1000, 0x1, [0x5, 0x11eb, 0x7fffffffffffffff, 0x80000000, 0xf5fe, 0x8]}, {0xec, 0x8001, 0x6}}) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f0000000080)={{r1}, {@val={r2}, @actul_num={@val=0x2d, 0x3f, 0x4b}}}) (async) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:05 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e9c0daacdea48326f176431b60115f28fb16eeb606fa29dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e610a06a087e81287246a88785a4e734f40a30032f91a793a7f0729bc24dc318d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e91"], 0x83) 17:41:05 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:05 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x400, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000880}, 0x4000010) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x400, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000880}, 0x4000010) (async) 17:41:05 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x400, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000880}, 0x4000010) 17:41:05 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9\xb1\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x03\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xb1-\x93\x90\x1a\x7f\x85%\xac\xd4\xc3A\x13\x8c\x9b\xdf\x0e\'R\n\x88\xad\xbbUL\xc9\x1f~df\xaa\x96\x8e\x8e\xff/\xe3V,x}\t+\x1d\xf6\xec\x13\x83\xff+\xa40\x93\x1c\xdc.tdj\xa1B5h\x7f\x140\xce\x06i/\xc4\x16\xfe\x1a\xfc@j&\xd2D\x14\xc7\xe4\xde\xd5'}, 0xd8) 17:41:05 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'nr0\x00'}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0xffffff0a) write$apparmor_exec(r0, &(0x7f0000000180)={'stack ', '\x92P\xb2\x00\x04/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\xff\xff\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0x45) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 17:41:05 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) socket$nl_crypto(0x10, 0x3, 0x15) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) 17:41:05 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0], 0x47) 17:41:05 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'nr0\x00'}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0xffffff0a) write$apparmor_exec(r0, &(0x7f0000000180)={'stack ', '\x92P\xb2\x00\x04/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\xff\xff\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0x45) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 17:41:05 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9\xb1\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x03\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xb1-\x93\x90\x1a\x7f\x85%\xac\xd4\xc3A\x13\x8c\x9b\xdf\x0e\'R\n\x88\xad\xbbUL\xc9\x1f~df\xaa\x96\x8e\x8e\xff/\xe3V,x}\t+\x1d\xf6\xec\x13\x83\xff+\xa40\x93\x1c\xdc.tdj\xa1B5h\x7f\x140\xce\x06i/\xc4\x16\xfe\x1a\xfc@j&\xd2D\x14\xc7\xe4\xde\xd5'}, 0xd8) 17:41:05 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:05 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (rerun: 64) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) (rerun: 64) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0], 0x47) 17:41:05 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) write$apparmor_exec(r0, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012dbd7000fbdbdf251000000008000600", @ANYRES32=r1, @ANYBLOB="05002d000000000008000300424e48cdef77fb66003043b5aa379c371822701a42594d8e195945ce0a", @ANYRES32=r2, @ANYBLOB="05002e0000000000"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x4000081) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:05 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9\xb1\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x03\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xb1-\x93\x90\x1a\x7f\x85%\xac\xd4\xc3A\x13\x8c\x9b\xdf\x0e\'R\n\x88\xad\xbbUL\xc9\x1f~df\xaa\x96\x8e\x8e\xff/\xe3V,x}\t+\x1d\xf6\xec\x13\x83\xff+\xa40\x93\x1c\xdc.tdj\xa1B5h\x7f\x140\xce\x06i/\xc4\x16\xfe\x1a\xfc@j&\xd2D\x14\xc7\xe4\xde\xd5'}, 0xd8) 17:41:05 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) close(r1) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:05 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) write$apparmor_exec(r0, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012dbd7000fbdbdf251000000008000600", @ANYRES32=r1, @ANYBLOB="05002d000000000008000300424e48cdef77fb66003043b5aa379c371822701a42594d8e195945ce0a", @ANYRES32=r2, @ANYBLOB="05002e0000000000"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x4000081) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) (async) write$apparmor_exec(r0, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012dbd7000fbdbdf251000000008000600", @ANYRES32=r1, @ANYBLOB="05002d000000000008000300424e48cdef77fb66003043b5aa379c371822701a42594d8e195945ce0a", @ANYRES32=r2, @ANYBLOB="05002e0000000000"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x4000081) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (async) 17:41:05 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0], 0x47) 17:41:05 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$rxrpc(r3, &(0x7f0000000240)="261cfad95dd6059b3445aa7ab1c4ddb245d4f7d0ef1da34d0a5b7b3e61793a59652398c0f309fe6c6b3d99921fa49e722acb0253e221f54901e90f45ee45dee893bade91aa331c1082d4c578964a6fe46a9ede09fc3649b883480d1a98587ad15ce22343bf42d7550168c237a9ee7483803b600d9a2704b517607bae", 0x7c, 0x4000000, &(0x7f00000002c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0xffff, @private2, 0x80}}, 0x24) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f0000000080)="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") ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) write$apparmor_exec(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b9319452cfbe2eea6c913a87e1286795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f4ca30032f91a793a7f0729bc24dc258d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e91"], 0x83) 17:41:05 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) close(r1) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:05 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) write$apparmor_exec(r0, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) (async, rerun: 64) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012dbd7000fbdbdf251000000008000600", @ANYRES32=r1, @ANYBLOB="05002d000000000008000300424e48cdef77fb66003043b5aa379c371822701a42594d8e195945ce0a", @ANYRES32=r2, @ANYBLOB="05002e0000000000"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x4000081) (async, rerun: 64) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:05 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000140)="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") 17:41:05 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) (async) sendto$rxrpc(r3, &(0x7f0000000240)="261cfad95dd6059b3445aa7ab1c4ddb245d4f7d0ef1da34d0a5b7b3e61793a59652398c0f309fe6c6b3d99921fa49e722acb0253e221f54901e90f45ee45dee893bade91aa331c1082d4c578964a6fe46a9ede09fc3649b883480d1a98587ad15ce22343bf42d7550168c237a9ee7483803b600d9a2704b517607bae", 0x7c, 0x4000000, &(0x7f00000002c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0xffff, @private2, 0x80}}, 0x24) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f0000000080)="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") ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) write$apparmor_exec(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b9319452cfbe2eea6c913a87e1286795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f4ca30032f91a793a7f0729bc24dc258d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e91"], 0x83) 17:41:05 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r0 = syz_open_dev$media(&(0x7f00000000c0), 0x0, 0x400001) ioctl$int_out(r0, 0x5460, &(0x7f0000000300)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="000000c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc8188cebcf1926f5480fc42da288fa00000000000000e4b8f039d7d3867d1aa456f1307d14bd3e94dec825a219a625e8ff7f0000a46bd6b78216d3e7b651093e3913e63990b09dab073e3f5704cc020029affe4510dc40aa54cc4826c878574c112cd1a4b7b96dc7665e9e5176064a72d4309cbcd50710a5a9ec67ef879a4f7e2d2b12b56470bcfc93092b3b55512ef394ff226689159a87cbafdb64e6ac9a6eaeb48c41461c76f9577f3cad9a4a02e94c156be1d4d0ec5f14051f21c226a95e5d6991f732ab48c5b5770164b5a6804da882540b3b38ad2a91f9a6acce0e1c110d3d0aa855eb0b7edaa167d9731cfc185290596a2278d2f8f50e176dbfcb2de50694fa3d874892469c663e890fee00000000000000000000000000000000000000000000000000006bd6f21b516b7d0df7ed9a9c360a66f102fc00f7ea27fa59aa96bb089c03bf150fab23f836b33e043d92ccf1304e89f0914538de6af1100c9af4e5c613454cb10c02dc80193605fb638831ef99df921fe2b2294240fd93c28642f7eb19db5bb2bb48aaa886ab27bee681c1ea13c47a877b64b041d5d0748d6e036334a6e2a4317301e7bfda98842e69412289c751e315"], 0xfffffffffffffe66) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$int_out(r3, 0x5461, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x11, r4, 0x1, 0x4, 0x6, @remote}, 0x14) ioctl$int_out(r1, 0x5460, &(0x7f0000000000)) 17:41:05 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) (rerun: 64) close(r1) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:05 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) (async) sendto$rxrpc(r3, &(0x7f0000000240)="261cfad95dd6059b3445aa7ab1c4ddb245d4f7d0ef1da34d0a5b7b3e61793a59652398c0f309fe6c6b3d99921fa49e722acb0253e221f54901e90f45ee45dee893bade91aa331c1082d4c578964a6fe46a9ede09fc3649b883480d1a98587ad15ce22343bf42d7550168c237a9ee7483803b600d9a2704b517607bae", 0x7c, 0x4000000, &(0x7f00000002c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0xffff, @private2, 0x80}}, 0x24) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f0000000080)="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") (async) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) (async) write$apparmor_exec(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b9319452cfbe2eea6c913a87e1286795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f4ca30032f91a793a7f0729bc24dc258d63880155642a27ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e91"], 0x83) 17:41:05 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000140)="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") 17:41:06 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) (async) r0 = syz_open_dev$media(&(0x7f00000000c0), 0x0, 0x400001) ioctl$int_out(r0, 0x5460, &(0x7f0000000300)) (async, rerun: 64) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xfffffffffffffe66) (rerun: 64) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (rerun: 64) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$int_out(r3, 0x5461, &(0x7f0000000340)) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x11, r4, 0x1, 0x4, 0x6, @remote}, 0x14) ioctl$int_out(r1, 0x5460, &(0x7f0000000000)) 17:41:06 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/376], 0xfffffffffffffdf9) 17:41:06 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000140)="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") 17:41:06 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x84581, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b90b6795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a793a7f0729fc24dc258d63880155642a27ccf19e3c125fe7942f93bccb4ee962e133d56257775747204c074b38b9bbb30217fd500f44893b19676432b8d79642da8e91"], 0x83) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000240)={0x4, 0x4, {0x3, @usage=0x1, 0x0, 0x1ff, 0x1000, 0x0, 0x4, 0x3, 0x1a, @usage=0x7fff, 0x6, 0x100, [0x8, 0x9, 0x1, 0x40, 0x3, 0x6]}, {0x4, @usage=0x600000000000000, 0x0, 0x6, 0xfff, 0x2, 0x8, 0x6, 0xc0, @usage=0x5, 0x3, 0x7, [0x2, 0x2, 0x84b1, 0xffffffff, 0xc0, 0xffffffffffffffff]}, {0x8000000000000000, @usage=0x2, 0x0, 0x4, 0x1, 0x4, 0x7, 0x9, 0x81, @struct={0x9, 0x7ff}, 0x7, 0x2, [0x3, 0x8, 0x7fff, 0x2, 0x1, 0x1960]}, {0x0, 0x10, 0x7}}) 17:41:06 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r0 = syz_open_dev$media(&(0x7f00000000c0), 0x0, 0x400001) ioctl$int_out(r0, 0x5460, &(0x7f0000000300)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xfffffffffffffe66) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$int_out(r3, 0x5461, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x11, r4, 0x1, 0x4, 0x6, @remote}, 0x14) ioctl$int_out(r1, 0x5460, &(0x7f0000000000)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) (async) syz_open_dev$media(&(0x7f00000000c0), 0x0, 0x400001) (async) ioctl$int_out(r0, 0x5460, &(0x7f0000000300)) (async) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xfffffffffffffe66) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$int_out(r3, 0x5461, &(0x7f0000000340)) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'wlan1\x00'}) (async) bind$packet(r2, &(0x7f0000000140)={0x11, 0x11, r4, 0x1, 0x4, 0x6, @remote}, 0x14) (async) ioctl$int_out(r1, 0x5460, &(0x7f0000000000)) (async) 17:41:06 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/376], 0xfffffffffffffdf9) 17:41:06 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000200)="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") write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r3, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x5, 0x2, 0xa}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) 17:41:06 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x84581, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) (async) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b90b6795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a793a7f0729fc24dc258d63880155642a27ccf19e3c125fe7942f93bccb4ee962e133d56257775747204c074b38b9bbb30217fd500f44893b19676432b8d79642da8e91"], 0x83) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000240)={0x4, 0x4, {0x3, @usage=0x1, 0x0, 0x1ff, 0x1000, 0x0, 0x4, 0x3, 0x1a, @usage=0x7fff, 0x6, 0x100, [0x8, 0x9, 0x1, 0x40, 0x3, 0x6]}, {0x4, @usage=0x600000000000000, 0x0, 0x6, 0xfff, 0x2, 0x8, 0x6, 0xc0, @usage=0x5, 0x3, 0x7, [0x2, 0x2, 0x84b1, 0xffffffff, 0xc0, 0xffffffffffffffff]}, {0x8000000000000000, @usage=0x2, 0x0, 0x4, 0x1, 0x4, 0x7, 0x9, 0x81, @struct={0x9, 0x7ff}, 0x7, 0x2, [0x3, 0x8, 0x7fff, 0x2, 0x1, 0x1960]}, {0x0, 0x10, 0x7}}) 17:41:06 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/376], 0xfffffffffffffdf9) 17:41:06 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '\x92P\x9e\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88'}, 0x44) geteuid() 17:41:06 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000200)="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") write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r3, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x5, 0x2, 0xa}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) 17:41:06 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x84581, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b90b6795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a793a7f0729fc24dc258d63880155642a27ccf19e3c125fe7942f93bccb4ee962e133d56257775747204c074b38b9bbb30217fd500f44893b19676432b8d79642da8e91"], 0x83) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000240)={0x4, 0x4, {0x3, @usage=0x1, 0x0, 0x1ff, 0x1000, 0x0, 0x4, 0x3, 0x1a, @usage=0x7fff, 0x6, 0x100, [0x8, 0x9, 0x1, 0x40, 0x3, 0x6]}, {0x4, @usage=0x600000000000000, 0x0, 0x6, 0xfff, 0x2, 0x8, 0x6, 0xc0, @usage=0x5, 0x3, 0x7, [0x2, 0x2, 0x84b1, 0xffffffff, 0xc0, 0xffffffffffffffff]}, {0x8000000000000000, @usage=0x2, 0x0, 0x4, 0x1, 0x4, 0x7, 0x9, 0x81, @struct={0x9, 0x7ff}, 0x7, 0x2, [0x3, 0x8, 0x7fff, 0x2, 0x1, 0x1960]}, {0x0, 0x10, 0x7}}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x84581, 0x0) (async) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) (async) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b90b6795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a793a7f0729fc24dc258d63880155642a27ccf19e3c125fe7942f93bccb4ee962e133d56257775747204c074b38b9bbb30217fd500f44893b19676432b8d79642da8e91"], 0x83) (async) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000240)={0x4, 0x4, {0x3, @usage=0x1, 0x0, 0x1ff, 0x1000, 0x0, 0x4, 0x3, 0x1a, @usage=0x7fff, 0x6, 0x100, [0x8, 0x9, 0x1, 0x40, 0x3, 0x6]}, {0x4, @usage=0x600000000000000, 0x0, 0x6, 0xfff, 0x2, 0x8, 0x6, 0xc0, @usage=0x5, 0x3, 0x7, [0x2, 0x2, 0x84b1, 0xffffffff, 0xc0, 0xffffffffffffffff]}, {0x8000000000000000, @usage=0x2, 0x0, 0x4, 0x1, 0x4, 0x7, 0x9, 0x81, @struct={0x9, 0x7ff}, 0x7, 0x2, [0x3, 0x8, 0x7fff, 0x2, 0x1, 0x1960]}, {0x0, 0x10, 0x7}}) (async) 17:41:06 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6\x14+\x16\x19'}, 0x9b) 17:41:06 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '\x92P\x9e\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88'}, 0x44) (async) geteuid() 17:41:06 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6\x14+\x16\x19'}, 0x9b) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6\x14+\x16\x19'}, 0x9b) (async) 17:41:06 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000200)="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") (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r3, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x5, 0x2, 0xa}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) 17:41:06 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) socket$rxrpc(0x21, 0x2, 0xbda2db62efb1750d) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032000000007f0729bc24dc258d63880155642a27ccf19e3c125f35884720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e91ad75ea716a5a811bde09d5b9002731605e2eeb474c9552c5285709d9bdcff9319c139d81af9c517ff3e9ca06bc0ca63660f1eaf5b4fbeffa10258efbf3f011875694c5073f00000053"], 0x83) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x2, 0x201, 0x8, 0x106, 0xffffffffffffffff, 0x40, '\x00', 0x0, r1, 0x4, 0x3, 0x0, 0xf}, 0x48) 17:41:06 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '\x92P\x9e\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88'}, 0x44) (async) geteuid() 17:41:06 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0400000000000000"], 0x47) 17:41:06 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) socket$rxrpc(0x21, 0x2, 0xbda2db62efb1750d) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032000000007f0729bc24dc258d63880155642a27ccf19e3c125f35884720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e91ad75ea716a5a811bde09d5b9002731605e2eeb474c9552c5285709d9bdcff9319c139d81af9c517ff3e9ca06bc0ca63660f1eaf5b4fbeffa10258efbf3f011875694c5073f00000053"], 0x83) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x2, 0x201, 0x8, 0x106, 0xffffffffffffffff, 0x40, '\x00', 0x0, r1, 0x4, 0x3, 0x0, 0xf}, 0x48) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) socket$rxrpc(0x21, 0x2, 0xbda2db62efb1750d) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032000000007f0729bc24dc258d63880155642a27ccf19e3c125f35884720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e91ad75ea716a5a811bde09d5b9002731605e2eeb474c9552c5285709d9bdcff9319c139d81af9c517ff3e9ca06bc0ca63660f1eaf5b4fbeffa10258efbf3f011875694c5073f00000053"], 0x83) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x2, 0x201, 0x8, 0x106, 0xffffffffffffffff, 0x40, '\x00', 0x0, r1, 0x4, 0x3, 0x0, 0xf}, 0x48) (async) 17:41:06 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6\x14+\x16\x19'}, 0x9b) 17:41:06 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$MEDIA_IOC_ENUM_ENTITIES(0xffffffffffffffff, 0xc1007c01, &(0x7f0000000100)) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f00000003c0)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfaYd\xdb[\xb7k\x13\x7f\x03\x02\x8bU\x7f\xa1D|M\xdd\xa0?\xb7LX?\xe9!^\x06&\xf3C\xff\xa8\xf2x\x99\x8c\xf5\x1d\xae5\\\xdf\x10\xf5U\x86\x1f\xf6:j\xd1\x00\xd26\'\x86ZW\xceR\x96\xeah}lcHW\xd6O\x17G\xca\xc6\xa5\xe5\xcf\xe1\xfdFn\x1f\x9b\x98\x15\x00+\x0e\xb8\xafB\xc9sl)K\xfb\x9d*\xe2\xb8\xd5\xdb\xeao\xdb\x98\xed\xb2)\x97\x17\xdb\xc5l\xc2%\n\xd0\x977\xc3H82\xcc\xfc\x02\x93G\xf4Z\x1e\x87|`\xddU\x06<\xeal\xf2\x1d\xf9\xffi\x82\xdb\xf3cZ]HhZ\xe3\xa9~:\xd4\x1cImq\xfe\xceM\xea\xd9\xe0O\xc4\xa7!\x7f\x1c\xb3\xb9\xf7c\x82w\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x105) 17:41:06 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:06 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:06 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) socket$rxrpc(0x21, 0x2, 0xbda2db62efb1750d) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b9286795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032000000007f0729bc24dc258d63880155642a27ccf19e3c125f35884720bab74b38b9bbb30217fd500f44893b19676432b8d79642da8e91ad75ea716a5a811bde09d5b9002731605e2eeb474c9552c5285709d9bdcff9319c139d81af9c517ff3e9ca06bc0ca63660f1eaf5b4fbeffa10258efbf3f011875694c5073f00000053"], 0x83) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x2, 0x201, 0x8, 0x106, 0xffffffffffffffff, 0x40, '\x00', 0x0, r1, 0x4, 0x3, 0x0, 0xf}, 0x48) 17:41:06 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$MEDIA_IOC_ENUM_ENTITIES(0xffffffffffffffff, 0xc1007c01, &(0x7f0000000100)) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f00000003c0)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfaYd\xdb[\xb7k\x13\x7f\x03\x02\x8bU\x7f\xa1D|M\xdd\xa0?\xb7LX?\xe9!^\x06&\xf3C\xff\xa8\xf2x\x99\x8c\xf5\x1d\xae5\\\xdf\x10\xf5U\x86\x1f\xf6:j\xd1\x00\xd26\'\x86ZW\xceR\x96\xeah}lcHW\xd6O\x17G\xca\xc6\xa5\xe5\xcf\xe1\xfdFn\x1f\x9b\x98\x15\x00+\x0e\xb8\xafB\xc9sl)K\xfb\x9d*\xe2\xb8\xd5\xdb\xeao\xdb\x98\xed\xb2)\x97\x17\xdb\xc5l\xc2%\n\xd0\x977\xc3H82\xcc\xfc\x02\x93G\xf4Z\x1e\x87|`\xddU\x06<\xeal\xf2\x1d\xf9\xffi\x82\xdb\xf3cZ]HhZ\xe3\xa9~:\xd4\x1cImq\xfe\xceM\xea\xd9\xe0O\xc4\xa7!\x7f\x1c\xb3\xb9\xf7c\x82w\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x105) 17:41:06 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0400000000000000"], 0x47) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0400000000000000"], 0x47) (async) [ 2251.340189] kauditd_printk_skb: 130 callbacks suppressed [ 2251.340200] audit: type=1400 audit(1660326066.296:1540): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=22206D27D23285D30A1F9C319CBEB438C43EAF8FE07175BC50567CA41456A4B3D7C354EFF05C5FB66994FDB745C1CBDBFFDCA35966660C1BA2E7FFECF17758FFC4EC88E7EF7C3B923C34C5A80EB3E3659687BC3B3DE2A44F5E89E7AC91C150A5998610B25BA1561263A1044C888863BC958211FE6C2EA060DC52F0DFCDD62340AB9085FE4647301E30EA251663FE9FC4F6142B1619 pid=4829 comm="syz-executor.5" 17:41:06 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:06 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x400}}, './file0\x00'}) 17:41:06 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0400000000000000"], 0x47) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0400000000000000"], 0x47) (async) 17:41:06 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x97) 17:41:06 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$MEDIA_IOC_ENUM_ENTITIES(0xffffffffffffffff, 0xc1007c01, &(0x7f0000000100)) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f00000003c0)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfaYd\xdb[\xb7k\x13\x7f\x03\x02\x8bU\x7f\xa1D|M\xdd\xa0?\xb7LX?\xe9!^\x06&\xf3C\xff\xa8\xf2x\x99\x8c\xf5\x1d\xae5\\\xdf\x10\xf5U\x86\x1f\xf6:j\xd1\x00\xd26\'\x86ZW\xceR\x96\xeah}lcHW\xd6O\x17G\xca\xc6\xa5\xe5\xcf\xe1\xfdFn\x1f\x9b\x98\x15\x00+\x0e\xb8\xafB\xc9sl)K\xfb\x9d*\xe2\xb8\xd5\xdb\xeao\xdb\x98\xed\xb2)\x97\x17\xdb\xc5l\xc2%\n\xd0\x977\xc3H82\xcc\xfc\x02\x93G\xf4Z\x1e\x87|`\xddU\x06<\xeal\xf2\x1d\xf9\xffi\x82\xdb\xf3cZ]HhZ\xe3\xa9~:\xd4\x1cImq\xfe\xceM\xea\xd9\xe0O\xc4\xa7!\x7f\x1c\xb3\xb9\xf7c\x82w\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x105) [ 2251.427079] audit: type=1400 audit(1660326066.306:1541): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=9250B288C92FAF13E5F82358A08AF71A8FC8A23A43674C5DCCAA3665EA1288FB8017720E pid=4832 comm="syz-executor.4" 17:41:06 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x400}}, './file0\x00'}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) (async) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) (async) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x400}}, './file0\x00'}) (async) 17:41:06 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0x45) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) [ 2251.492596] audit: type=1400 audit(1660326066.306:1542): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=22206D27D23285D30A1F9C319CBEB438C43EAF8FE07175BC50567CA41456A4B3D7C354EFF05C5FB66994FDB745C1CBDBFFDCA35966660C1BA2E7FFECF17758FFC4EC88E7EF7C3B923C34C5A80EB3E3659687BC3B3DE2A44F5E89E7AC91C150A5998610B25BA1561263A1044C888863BC958211FE6C2EA060DC52F0DFCDD62340AB9085FE4647301E30EA251663FE9FC4F6 pid=4833 comm="syz-executor.5" 17:41:06 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b202380", @ANYRES32], 0x47) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 17:41:06 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x97) 17:41:06 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) (async) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x400}}, './file0\x00'}) 17:41:06 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x97) 17:41:06 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b202380", @ANYRES32], 0x47) (async, rerun: 64) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async, rerun: 64) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 17:41:06 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0x45) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) [ 2251.551071] audit: type=1400 audit(1660326066.386:1543): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=9250B288C92FAF13E5F82358A08AF71A8FC8A23A43674C5DCCAA3665EA1288FB8017720E pid=4845 comm="syz-executor.4" 17:41:06 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x97) [ 2251.611901] audit: type=1400 audit(1660326066.426:1544): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=22206D27D23285D30A1F9C319CBEB438C43EAF8FE07175BC50567CA41456A4B3D7C354EFF05C5FB66994FDB745C1CBDBFFDCA35966660C1BA2E7FFECF17758FFC4EC88E7EF7C3B923C34C5A80EB3E3659687BC3B3DE2A44F5E89E7AC91C150A5998610B25BA1561263A1044C888863BC958211FE6C2EA060DC52F0DFCDD62340AB9085FE4647301E30EA251663FE9FC4F6 pid=4850 comm="syz-executor.5" 17:41:06 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = dup2(r0, r0) write$apparmor_exec(r1, &(0x7f0000000080)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) r2 = syz_open_dev$loop(&(0x7f0000000000), 0x3f, 0x303000) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f0000000580)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="10022cbd7000ffdbdf25100000000500330001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x80000}, 0x40) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r5, 0x0, 0x0, 0x0, 0x0, 0x0) accept4$nfc_llcp(r5, &(0x7f0000000380), &(0x7f0000000400)=0x60, 0x180800) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, r4, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x4000800) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r4, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x40}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4430}]}, 0x34}, 0x1, 0x0, 0x0, 0x488d3}, 0x40810) socketpair(0x6, 0x4, 0x40, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000180)={{0x1, 0x1, 0x18, r6, {0x1200000}}, './file0\x00'}) 17:41:06 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x97) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c369abd24f5dd7adb58a3625fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfb9d62340ab9085fe464700e4d5e711384f7ac6045b75c2bc756c5f992c1f67c40044cc6287836e833acc99ca01ac577f76cbe3fdd9c509d190aeb35d46d115c7774e349a98f1a656715f9bfad9cd15d400e2e22cc6a75b3ae45dceedf5ee72878c21dadc040ae2e8484d99c1502a7774706dbe5875d5c6dfa0ce33fb7f5b0ccc85726a7be7b1f8c843c0ecf8c455ef8c425af8f21f86fbe83c1caa6295ece71dd9ac5a2731ed4e8af978cd2dbb52229cca68"], 0x97) (async) 17:41:06 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b202380", @ANYRES32], 0x47) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 17:41:06 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = dup2(r0, r0) write$apparmor_exec(r1, &(0x7f0000000080)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) r2 = syz_open_dev$loop(&(0x7f0000000000), 0x3f, 0x303000) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f0000000580)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="10022cbd7000ffdbdf25100000000500330001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x80000}, 0x40) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r5, 0x0, 0x0, 0x0, 0x0, 0x0) accept4$nfc_llcp(r5, &(0x7f0000000380), &(0x7f0000000400)=0x60, 0x180800) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, r4, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x4000800) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r4, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x40}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4430}]}, 0x34}, 0x1, 0x0, 0x0, 0x488d3}, 0x40810) socketpair(0x6, 0x4, 0x40, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000180)={{0x1, 0x1, 0x18, r6, {0x1200000}}, './file0\x00'}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) dup2(r0, r0) (async) write$apparmor_exec(r1, &(0x7f0000000080)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) (async) syz_open_dev$loop(&(0x7f0000000000), 0x3f, 0x303000) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f0000000580)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="10022cbd7000ffdbdf25100000000500330001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x80000}, 0x40) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r5, 0x0, 0x0, 0x0, 0x0, 0x0) (async) accept4$nfc_llcp(r5, &(0x7f0000000380), &(0x7f0000000400)=0x60, 0x180800) (async) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, r4, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x4000800) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r4, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x40}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4430}]}, 0x34}, 0x1, 0x0, 0x0, 0x488d3}, 0x40810) (async) socketpair(0x6, 0x4, 0x40, &(0x7f0000000140)) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000180)={{0x1, 0x1, 0x18, r6, {0x1200000}}, './file0\x00'}) (async) 17:41:06 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0x45) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) [ 2251.662161] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2251.675702] audit: audit_lost=87 audit_rate_limit=0 audit_backlog_limit=64 [ 2251.682833] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2251.690338] audit: audit_lost=88 audit_rate_limit=0 audit_backlog_limit=64 [ 2251.690439] audit: audit_backlog=65 > audit_backlog_limit=64 17:41:06 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.empty_time\x00', 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000140)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x48000, 0x0) 17:41:06 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000100)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:06 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x97) 17:41:06 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = dup2(r0, r0) write$apparmor_exec(r1, &(0x7f0000000080)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) r2 = syz_open_dev$loop(&(0x7f0000000000), 0x3f, 0x303000) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f0000000580)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="10022cbd7000ffdbdf25100000000500330001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x80000}, 0x40) (async, rerun: 32) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (rerun: 32) sendto$packet(r5, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) accept4$nfc_llcp(r5, &(0x7f0000000380), &(0x7f0000000400)=0x60, 0x180800) (async, rerun: 32) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, r4, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x4000800) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r4, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x40}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4430}]}, 0x34}, 0x1, 0x0, 0x0, 0x488d3}, 0x40810) (async) socketpair(0x6, 0x4, 0x40, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$apparmor_thread_exec(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000180)={{0x1, 0x1, 0x18, r6, {0x1200000}}, './file0\x00'}) (rerun: 64) 17:41:06 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.empty_time\x00', 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000140)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x48000, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.empty_time\x00', 0x0, 0x0) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000140)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x48000, 0x0) (async) 17:41:06 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000100)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async, rerun: 32) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (rerun: 32) 17:41:06 executing program 5: sendto$rxrpc(0xffffffffffffffff, &(0x7f0000000080)="c7bf6a5a5f92cbd34a6989ad5b93e88e298b3f29714265413af48d70fc04d222127293865979fe56fce074d389467e1a31f3eedb11e887b75f2a561325e24ddbebba0352d42df40a0263", 0x4a, 0x24004800, &(0x7f0000000000)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e23, @empty}}, 0x24) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000200)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c88040000008211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fc4f6"], 0x97) 17:41:06 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000100)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:06 executing program 5: sendto$rxrpc(0xffffffffffffffff, &(0x7f0000000080)="c7bf6a5a5f92cbd34a6989ad5b93e88e298b3f29714265413af48d70fc04d222127293865979fe56fce074d389467e1a31f3eedb11e887b75f2a561325e24ddbebba0352d42df40a0263", 0x4a, 0x24004800, &(0x7f0000000000)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e23, @empty}}, 0x24) (async) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000200)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c88040000008211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fc4f6"], 0x97) 17:41:06 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.empty_time\x00', 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000140)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x48000, 0x0) 17:41:06 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000240)={0x0, 0x1ff, 0x1, [0x8, 0x0, 0x4, 0x2, 0x5], [0x3, 0x7, 0x1, 0xdba8, 0x81fc, 0x10000, 0x6, 0x8001, 0x10000, 0x6, 0x400, 0x8000, 0x9, 0xffffffff00000000, 0x80000001, 0x1, 0x6026, 0x1c7, 0xffffffff00000001, 0x3, 0x3, 0x1, 0x5, 0x2, 0xab, 0x3, 0xf25a, 0x6, 0x94f, 0x6, 0x401, 0x4, 0x2, 0x30d, 0x4, 0x3, 0x5, 0x3, 0x20, 0x1, 0x819, 0x2d, 0x7, 0x4, 0x80000000, 0x20, 0x8, 0x1c000000000000, 0xff, 0xfffffffffffff333, 0xad, 0x8, 0xffffffffffff8000, 0x8, 0x9, 0x5, 0x7fffffffffffffff, 0x8, 0x2, 0x4, 0x100000001, 0x1000, 0x7f, 0x89, 0x9ae0000000000000, 0x8000000000000001, 0x5, 0x8000, 0x1, 0x8, 0x6, 0x2, 0x3, 0x1ff, 0x6, 0x408, 0x969, 0x91ba, 0x8, 0x3ff, 0x1ff, 0x8001, 0x4, 0xfffffffffffff001, 0x0, 0x35, 0x4, 0xa6f2, 0x0, 0x5909, 0x1, 0x7ff, 0x1, 0x5, 0x7fff, 0x22, 0x6, 0x81, 0x5, 0x9, 0x0, 0x1ff, 0x4, 0x0, 0x2, 0xa2f, 0x7, 0x101, 0x401, 0x194, 0x20, 0x5c1, 0x6, 0x101, 0x7ff, 0xfffffffffffff001, 0x100000001, 0x36da7e37, 0x8, 0x800, 0x40]}) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="737481006b20192d00"], 0x9) 17:41:06 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000240)={0x0, 0x1ff, 0x1, [0x8, 0x0, 0x4, 0x2, 0x5], [0x3, 0x7, 0x1, 0xdba8, 0x81fc, 0x10000, 0x6, 0x8001, 0x10000, 0x6, 0x400, 0x8000, 0x9, 0xffffffff00000000, 0x80000001, 0x1, 0x6026, 0x1c7, 0xffffffff00000001, 0x3, 0x3, 0x1, 0x5, 0x2, 0xab, 0x3, 0xf25a, 0x6, 0x94f, 0x6, 0x401, 0x4, 0x2, 0x30d, 0x4, 0x3, 0x5, 0x3, 0x20, 0x1, 0x819, 0x2d, 0x7, 0x4, 0x80000000, 0x20, 0x8, 0x1c000000000000, 0xff, 0xfffffffffffff333, 0xad, 0x8, 0xffffffffffff8000, 0x8, 0x9, 0x5, 0x7fffffffffffffff, 0x8, 0x2, 0x4, 0x100000001, 0x1000, 0x7f, 0x89, 0x9ae0000000000000, 0x8000000000000001, 0x5, 0x8000, 0x1, 0x8, 0x6, 0x2, 0x3, 0x1ff, 0x6, 0x408, 0x969, 0x91ba, 0x8, 0x3ff, 0x1ff, 0x8001, 0x4, 0xfffffffffffff001, 0x0, 0x35, 0x4, 0xa6f2, 0x0, 0x5909, 0x1, 0x7ff, 0x1, 0x5, 0x7fff, 0x22, 0x6, 0x81, 0x5, 0x9, 0x0, 0x1ff, 0x4, 0x0, 0x2, 0xa2f, 0x7, 0x101, 0x401, 0x194, 0x20, 0x5c1, 0x6, 0x101, 0x7ff, 0xfffffffffffff001, 0x100000001, 0x36da7e37, 0x8, 0x800, 0x40]}) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="737481006b20192d00"], 0x9) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000240)={0x0, 0x1ff, 0x1, [0x8, 0x0, 0x4, 0x2, 0x5], [0x3, 0x7, 0x1, 0xdba8, 0x81fc, 0x10000, 0x6, 0x8001, 0x10000, 0x6, 0x400, 0x8000, 0x9, 0xffffffff00000000, 0x80000001, 0x1, 0x6026, 0x1c7, 0xffffffff00000001, 0x3, 0x3, 0x1, 0x5, 0x2, 0xab, 0x3, 0xf25a, 0x6, 0x94f, 0x6, 0x401, 0x4, 0x2, 0x30d, 0x4, 0x3, 0x5, 0x3, 0x20, 0x1, 0x819, 0x2d, 0x7, 0x4, 0x80000000, 0x20, 0x8, 0x1c000000000000, 0xff, 0xfffffffffffff333, 0xad, 0x8, 0xffffffffffff8000, 0x8, 0x9, 0x5, 0x7fffffffffffffff, 0x8, 0x2, 0x4, 0x100000001, 0x1000, 0x7f, 0x89, 0x9ae0000000000000, 0x8000000000000001, 0x5, 0x8000, 0x1, 0x8, 0x6, 0x2, 0x3, 0x1ff, 0x6, 0x408, 0x969, 0x91ba, 0x8, 0x3ff, 0x1ff, 0x8001, 0x4, 0xfffffffffffff001, 0x0, 0x35, 0x4, 0xa6f2, 0x0, 0x5909, 0x1, 0x7ff, 0x1, 0x5, 0x7fff, 0x22, 0x6, 0x81, 0x5, 0x9, 0x0, 0x1ff, 0x4, 0x0, 0x2, 0xa2f, 0x7, 0x101, 0x401, 0x194, 0x20, 0x5c1, 0x6, 0x101, 0x7ff, 0xfffffffffffff001, 0x100000001, 0x36da7e37, 0x8, 0x800, 0x40]}) (async) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) (async) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) (async) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="737481006b20192d00"], 0x9) (async) 17:41:06 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\b\x00\x00\x00\x00\x00\x00\x006e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\b\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xf7\xc4-\xa2\x88\xfa'}, 0x45) 17:41:06 executing program 5: sendto$rxrpc(0xffffffffffffffff, &(0x7f0000000080)="c7bf6a5a5f92cbd34a6989ad5b93e88e298b3f29714265413af48d70fc04d222127293865979fe56fce074d389467e1a31f3eedb11e887b75f2a561325e24ddbebba0352d42df40a0263", 0x4a, 0x24004800, &(0x7f0000000000)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e23, @empty}}, 0x24) (async) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000200)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c88040000008211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fc4f6"], 0x97) 17:41:06 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x97) 17:41:06 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\b\x00\x00\x00\x00\x00\x00\x006e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\b\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xf7\xc4-\xa2\x88\xfa'}, 0x45) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\b\x00\x00\x00\x00\x00\x00\x006e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\b\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xf7\xc4-\xa2\x88\xfa'}, 0x45) (async) 17:41:06 executing program 5: setsockopt$RXRPC_SECURITY_KEY(0xffffffffffffffff, 0x110, 0x1, &(0x7f00000006c0)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x10) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) write$tun(r0, &(0x7f0000000300)={@void, @val={0x1, 0x81, 0x578, 0x40, 0xa554, 0x1000}, @ipv6=@gre_packet={0x2, 0x6, "0e74fe", 0x372, 0x2f, 0x0, @loopback, @mcast2, {[@srh={0x87, 0x0, 0x4, 0x0, 0x9, 0x60, 0x6}, @fragment={0x1, 0x0, 0xb5, 0x1, 0x0, 0xf, 0x66}, @srh={0x84, 0x2, 0x4, 0x1, 0x80, 0x8d434139d1f394b, 0x1000, [@loopback]}, @fragment={0x88, 0x0, 0x3, 0x1, 0x0, 0x19, 0x68}, @dstopts={0x5c, 0xa, '\x00', [@jumbo={0xc2, 0x4, 0x2c1c}, @hao={0xc9, 0x10, @empty}, @calipso={0x7, 0x28, {0x0, 0x8, 0x4, 0x401, [0x8, 0x8, 0x9, 0x0]}}, @hao={0xc9, 0x10, @mcast1}, @enc_lim={0x4, 0x1, 0x81}]}, @fragment={0x3a, 0x0, 0x4, 0x1, 0x0, 0x5, 0x65}, @srh={0x3c, 0xc, 0x4, 0x6, 0x6, 0x20, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x20}, @local, @local, @mcast1, @private0]}, @routing={0x89, 0x8, 0x1, 0xf7, 0x0, [@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, @dev={0xfe, 0x80, '\x00', 0x23}, @local]}, @routing={0x40, 0xa, 0x1, 0x1, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1]}], {{0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x30, 0x0, [0xfff, 0x1f], "c0fbdd5ee5f440fadfed796cdb45cd383381d59d4aa6b3222aaddbdb2ee37056f389c610cb0d56d8a628867c8a3b95a9"}, {0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x800, [0xb8], "c0869da04d1409945a2f015df66d002390a355969c31ce7e887e869cd4bcdda10487297a98eab066b616f00c2e9350f7e4994099c70f41110c99c38b3ca7d55e72dadaed2ee680a6b4b26dbf6f006a"}, {0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x86dd, [0x6, 0x5], "ec7b705d97131279653c73df442a55fadd79d8eb0622832411e45a4fac9c2da5ff2462f62035a50efc41b32bebd81934d24d42bb9949e24ab033a3e085a06b72ecd8b5618f1143bff6b7110928e70c8d0d9cd160ac2c4833e72ac9bb0a3c096a8708ffe64aa1b8fe1ca0c098b0dc5ac5a92b94fc04fb0631a34353e53cedfcae01e10becdf571de2019670fc9803f950bb0551ecdddaf13f3e34c45839246b52d6c6404dde70c6962ce7129864177b8b0887151ac9e0a0f5bfcb0ae3f0695a27baf8483a2ab92c8e8988b32302251ed5e6c0f661659453f0ad152fb00cf472f058b4b95c4d64a7d0e87a82de340dbb21de"}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x5, 0x7}, 0x1, {0x1}}}, {0x8, 0x22eb, 0x4, {{0xb, 0x2, 0x3, 0x0, 0x0, 0x1, 0x2, 0xff}, 0x2, {0x2, 0xfffb, 0x3, 0xf, 0x0, 0x0, 0x2, 0x1}}}, {0x8, 0x6558, 0x3, "4a9f7c723b8beb9540383b0c7bfa7a54ae485765"}}}}}, 0x3a4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'hsr0\x00'}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000200)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xef\xf0\\_\xb6i\x94\x1eOE\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[_5\x12c\xa1\x04L\x88\x88c\xbc\x95\x8a\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6\xba\xd1ti\x1bR(\x1d\xc0\x9a\xb6@z\xe7?\xf3}\xe1\xfc&`m\xd3[C\xa1J\xc1\xb8\xd5\x94\a\x0f\x9b!\x1b}\xe1 \x9db\xc6\xa8\xd6e\x82\x15P\xd1\x1c\xe5d\x8b\xcf0?\xa7~\xda\'\xbf\x8c\x13\x98\xa4\x10\xc1\xb5\x84\x8f\xc9\xd2\xc7\xb9)*\xde\xb4E\xf5\xb8\x87L\xacKc6\xd2.\x8b\x86\xdf\x125\xce\xb2<\xbb\n? '}, 0xea) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000000c0)={{0xa08, 0x1}, 0x100, './file0\x00'}) 17:41:06 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000240)={0x0, 0x1ff, 0x1, [0x8, 0x0, 0x4, 0x2, 0x5], [0x3, 0x7, 0x1, 0xdba8, 0x81fc, 0x10000, 0x6, 0x8001, 0x10000, 0x6, 0x400, 0x8000, 0x9, 0xffffffff00000000, 0x80000001, 0x1, 0x6026, 0x1c7, 0xffffffff00000001, 0x3, 0x3, 0x1, 0x5, 0x2, 0xab, 0x3, 0xf25a, 0x6, 0x94f, 0x6, 0x401, 0x4, 0x2, 0x30d, 0x4, 0x3, 0x5, 0x3, 0x20, 0x1, 0x819, 0x2d, 0x7, 0x4, 0x80000000, 0x20, 0x8, 0x1c000000000000, 0xff, 0xfffffffffffff333, 0xad, 0x8, 0xffffffffffff8000, 0x8, 0x9, 0x5, 0x7fffffffffffffff, 0x8, 0x2, 0x4, 0x100000001, 0x1000, 0x7f, 0x89, 0x9ae0000000000000, 0x8000000000000001, 0x5, 0x8000, 0x1, 0x8, 0x6, 0x2, 0x3, 0x1ff, 0x6, 0x408, 0x969, 0x91ba, 0x8, 0x3ff, 0x1ff, 0x8001, 0x4, 0xfffffffffffff001, 0x0, 0x35, 0x4, 0xa6f2, 0x0, 0x5909, 0x1, 0x7ff, 0x1, 0x5, 0x7fff, 0x22, 0x6, 0x81, 0x5, 0x9, 0x0, 0x1ff, 0x4, 0x0, 0x2, 0xa2f, 0x7, 0x101, 0x401, 0x194, 0x20, 0x5c1, 0x6, 0x101, 0x7ff, 0xfffffffffffff001, 0x100000001, 0x36da7e37, 0x8, 0x800, 0x40]}) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) (async) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="737481006b20192d00"], 0x9) 17:41:06 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000200)="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") write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x280, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r3, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x5, 0x2, 0xa}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) 17:41:06 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\b\x00\x00\x00\x00\x00\x00\x006e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\b\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xf7\xc4-\xa2\x88\xfa'}, 0x45) 17:41:06 executing program 5: setsockopt$RXRPC_SECURITY_KEY(0xffffffffffffffff, 0x110, 0x1, &(0x7f00000006c0)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x10) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) write$tun(r0, &(0x7f0000000300)={@void, @val={0x1, 0x81, 0x578, 0x40, 0xa554, 0x1000}, @ipv6=@gre_packet={0x2, 0x6, "0e74fe", 0x372, 0x2f, 0x0, @loopback, @mcast2, {[@srh={0x87, 0x0, 0x4, 0x0, 0x9, 0x60, 0x6}, @fragment={0x1, 0x0, 0xb5, 0x1, 0x0, 0xf, 0x66}, @srh={0x84, 0x2, 0x4, 0x1, 0x80, 0x8d434139d1f394b, 0x1000, [@loopback]}, @fragment={0x88, 0x0, 0x3, 0x1, 0x0, 0x19, 0x68}, @dstopts={0x5c, 0xa, '\x00', [@jumbo={0xc2, 0x4, 0x2c1c}, @hao={0xc9, 0x10, @empty}, @calipso={0x7, 0x28, {0x0, 0x8, 0x4, 0x401, [0x8, 0x8, 0x9, 0x0]}}, @hao={0xc9, 0x10, @mcast1}, @enc_lim={0x4, 0x1, 0x81}]}, @fragment={0x3a, 0x0, 0x4, 0x1, 0x0, 0x5, 0x65}, @srh={0x3c, 0xc, 0x4, 0x6, 0x6, 0x20, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x20}, @local, @local, @mcast1, @private0]}, @routing={0x89, 0x8, 0x1, 0xf7, 0x0, [@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, @dev={0xfe, 0x80, '\x00', 0x23}, @local]}, @routing={0x40, 0xa, 0x1, 0x1, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1]}], {{0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x30, 0x0, [0xfff, 0x1f], "c0fbdd5ee5f440fadfed796cdb45cd383381d59d4aa6b3222aaddbdb2ee37056f389c610cb0d56d8a628867c8a3b95a9"}, {0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x800, [0xb8], "c0869da04d1409945a2f015df66d002390a355969c31ce7e887e869cd4bcdda10487297a98eab066b616f00c2e9350f7e4994099c70f41110c99c38b3ca7d55e72dadaed2ee680a6b4b26dbf6f006a"}, {0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x86dd, [0x6, 0x5], "ec7b705d97131279653c73df442a55fadd79d8eb0622832411e45a4fac9c2da5ff2462f62035a50efc41b32bebd81934d24d42bb9949e24ab033a3e085a06b72ecd8b5618f1143bff6b7110928e70c8d0d9cd160ac2c4833e72ac9bb0a3c096a8708ffe64aa1b8fe1ca0c098b0dc5ac5a92b94fc04fb0631a34353e53cedfcae01e10becdf571de2019670fc9803f950bb0551ecdddaf13f3e34c45839246b52d6c6404dde70c6962ce7129864177b8b0887151ac9e0a0f5bfcb0ae3f0695a27baf8483a2ab92c8e8988b32302251ed5e6c0f661659453f0ad152fb00cf472f058b4b95c4d64a7d0e87a82de340dbb21de"}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x5, 0x7}, 0x1, {0x1}}}, {0x8, 0x22eb, 0x4, {{0xb, 0x2, 0x3, 0x0, 0x0, 0x1, 0x2, 0xff}, 0x2, {0x2, 0xfffb, 0x3, 0xf, 0x0, 0x0, 0x2, 0x1}}}, {0x8, 0x6558, 0x3, "4a9f7c723b8beb9540383b0c7bfa7a54ae485765"}}}}}, 0x3a4) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'hsr0\x00'}) (async) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000200)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xef\xf0\\_\xb6i\x94\x1eOE\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[_5\x12c\xa1\x04L\x88\x88c\xbc\x95\x8a\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6\xba\xd1ti\x1bR(\x1d\xc0\x9a\xb6@z\xe7?\xf3}\xe1\xfc&`m\xd3[C\xa1J\xc1\xb8\xd5\x94\a\x0f\x9b!\x1b}\xe1 \x9db\xc6\xa8\xd6e\x82\x15P\xd1\x1c\xe5d\x8b\xcf0?\xa7~\xda\'\xbf\x8c\x13\x98\xa4\x10\xc1\xb5\x84\x8f\xc9\xd2\xc7\xb9)*\xde\xb4E\xf5\xb8\x87L\xacKc6\xd2.\x8b\x86\xdf\x125\xce\xb2<\xbb\n? '}, 0xea) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000000c0)={{0xa08, 0x1}, 0x100, './file0\x00'}) 17:41:06 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b9286795dfbab1ff160d2e61eb15a087e81287246a88785a4e734f40d47fbbd25706b6f60729bc24dc258d63880155642227ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f448924c8099c945465da42da8e910000b4fd64fb838040754eac31cbeff4f9e3d71bead3c3062929e6dab68d12caa2b4e368182364"], 0x84) 17:41:06 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x84581, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="65786563202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b90b6795577edfbab1ff160d2e61eb05a087e81287246a88785a4e734f40a30032f91a793a7f0729fc24dc258d63880155642a27ccf19e3c125fe7942f93bccb4ee962e133d56257775747204c074b38b9bbb30217fd500f44893b19676432b8d79642da8e91"], 0x83) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000240)={0x4, 0x4, {0x3, @usage=0x1, 0x0, 0x1ff, 0x1000, 0x0, 0x4, 0x3, 0x1a, @usage=0x7fff, 0x6, 0x100, [0x8, 0x9, 0x1, 0x40, 0x3, 0x6]}, {0x4, @usage=0x600000000000000, 0x0, 0x6, 0xfff, 0x2, 0x8, 0x6, 0xc0, @usage=0x5, 0x3, 0x7, [0x2, 0x2, 0x84b1, 0xffffffff, 0xc0, 0xffffffffffffffff]}, {0x8000000000000000, @usage=0x2, 0x0, 0x4, 0x1, 0x4, 0x7, 0x9, 0x81, @struct={0x9, 0x7ff}, 0x7, 0x2, [0x3, 0x8, 0x7fff, 0x2, 0x1, 0x1960]}, {0x0, 0x10, 0x7}}) 17:41:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288a72faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fa35fe5d2933eef5928c8c931e9e765f8f416c86f205a2f56d7333743d2a64f0f9db7a034cbfd0d67044ff7de354cdcc0e9aba552be2ded6cae4c2fcd2cd0411fc250cffd65d224b84c9e120a44e1d18bebdb0b1886d852b05b96d45b4b99055a221dbfb0a456bca44128c731a9a844b13f6b73c34e916a34d386128b5fe9e864fd6ec2bc2e64c0a672e2fea0e847bfb07b6d69796d9e4c78676cdc5e0f070bcf877a4ef7da4d5aa2ab1bc7bfeac8eb9262d68"], 0xfffffffffffffe66) r1 = dup2(0xffffffffffffffff, r0) accept4$packet(r1, 0x0, &(0x7f0000000000), 0x800) 17:41:07 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b9286795dfbab1ff160d2e61eb15a087e81287246a88785a4e734f40d47fbbd25706b6f60729bc24dc258d63880155642227ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f448924c8099c945465da42da8e910000b4fd64fb838040754eac31cbeff4f9e3d71bead3c3062929e6dab68d12caa2b4e368182364"], 0x84) 17:41:07 executing program 5: setsockopt$RXRPC_SECURITY_KEY(0xffffffffffffffff, 0x110, 0x1, &(0x7f00000006c0)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x10) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) write$tun(r0, &(0x7f0000000300)={@void, @val={0x1, 0x81, 0x578, 0x40, 0xa554, 0x1000}, @ipv6=@gre_packet={0x2, 0x6, "0e74fe", 0x372, 0x2f, 0x0, @loopback, @mcast2, {[@srh={0x87, 0x0, 0x4, 0x0, 0x9, 0x60, 0x6}, @fragment={0x1, 0x0, 0xb5, 0x1, 0x0, 0xf, 0x66}, @srh={0x84, 0x2, 0x4, 0x1, 0x80, 0x8d434139d1f394b, 0x1000, [@loopback]}, @fragment={0x88, 0x0, 0x3, 0x1, 0x0, 0x19, 0x68}, @dstopts={0x5c, 0xa, '\x00', [@jumbo={0xc2, 0x4, 0x2c1c}, @hao={0xc9, 0x10, @empty}, @calipso={0x7, 0x28, {0x0, 0x8, 0x4, 0x401, [0x8, 0x8, 0x9, 0x0]}}, @hao={0xc9, 0x10, @mcast1}, @enc_lim={0x4, 0x1, 0x81}]}, @fragment={0x3a, 0x0, 0x4, 0x1, 0x0, 0x5, 0x65}, @srh={0x3c, 0xc, 0x4, 0x6, 0x6, 0x20, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x20}, @local, @local, @mcast1, @private0]}, @routing={0x89, 0x8, 0x1, 0xf7, 0x0, [@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, @dev={0xfe, 0x80, '\x00', 0x23}, @local]}, @routing={0x40, 0xa, 0x1, 0x1, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1]}], {{0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x30, 0x0, [0xfff, 0x1f], "c0fbdd5ee5f440fadfed796cdb45cd383381d59d4aa6b3222aaddbdb2ee37056f389c610cb0d56d8a628867c8a3b95a9"}, {0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x800, [0xb8], "c0869da04d1409945a2f015df66d002390a355969c31ce7e887e869cd4bcdda10487297a98eab066b616f00c2e9350f7e4994099c70f41110c99c38b3ca7d55e72dadaed2ee680a6b4b26dbf6f006a"}, {0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x86dd, [0x6, 0x5], "ec7b705d97131279653c73df442a55fadd79d8eb0622832411e45a4fac9c2da5ff2462f62035a50efc41b32bebd81934d24d42bb9949e24ab033a3e085a06b72ecd8b5618f1143bff6b7110928e70c8d0d9cd160ac2c4833e72ac9bb0a3c096a8708ffe64aa1b8fe1ca0c098b0dc5ac5a92b94fc04fb0631a34353e53cedfcae01e10becdf571de2019670fc9803f950bb0551ecdddaf13f3e34c45839246b52d6c6404dde70c6962ce7129864177b8b0887151ac9e0a0f5bfcb0ae3f0695a27baf8483a2ab92c8e8988b32302251ed5e6c0f661659453f0ad152fb00cf472f058b4b95c4d64a7d0e87a82de340dbb21de"}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x5, 0x7}, 0x1, {0x1}}}, {0x8, 0x22eb, 0x4, {{0xb, 0x2, 0x3, 0x0, 0x0, 0x1, 0x2, 0xff}, 0x2, {0x2, 0xfffb, 0x3, 0xf, 0x0, 0x0, 0x2, 0x1}}}, {0x8, 0x6558, 0x3, "4a9f7c723b8beb9540383b0c7bfa7a54ae485765"}}}}}, 0x3a4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'hsr0\x00'}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000200)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xef\xf0\\_\xb6i\x94\x1eOE\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[_5\x12c\xa1\x04L\x88\x88c\xbc\x95\x8a\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6\xba\xd1ti\x1bR(\x1d\xc0\x9a\xb6@z\xe7?\xf3}\xe1\xfc&`m\xd3[C\xa1J\xc1\xb8\xd5\x94\a\x0f\x9b!\x1b}\xe1 \x9db\xc6\xa8\xd6e\x82\x15P\xd1\x1c\xe5d\x8b\xcf0?\xa7~\xda\'\xbf\x8c\x13\x98\xa4\x10\xc1\xb5\x84\x8f\xc9\xd2\xc7\xb9)*\xde\xb4E\xf5\xb8\x87L\xacKc6\xd2.\x8b\x86\xdf\x125\xce\xb2<\xbb\n? '}, 0xea) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000000c0)={{0xa08, 0x1}, 0x100, './file0\x00'}) setsockopt$RXRPC_SECURITY_KEY(0xffffffffffffffff, 0x110, 0x1, &(0x7f00000006c0)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x10) (async) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) (async) write$tun(r0, &(0x7f0000000300)={@void, @val={0x1, 0x81, 0x578, 0x40, 0xa554, 0x1000}, @ipv6=@gre_packet={0x2, 0x6, "0e74fe", 0x372, 0x2f, 0x0, @loopback, @mcast2, {[@srh={0x87, 0x0, 0x4, 0x0, 0x9, 0x60, 0x6}, @fragment={0x1, 0x0, 0xb5, 0x1, 0x0, 0xf, 0x66}, @srh={0x84, 0x2, 0x4, 0x1, 0x80, 0x8d434139d1f394b, 0x1000, [@loopback]}, @fragment={0x88, 0x0, 0x3, 0x1, 0x0, 0x19, 0x68}, @dstopts={0x5c, 0xa, '\x00', [@jumbo={0xc2, 0x4, 0x2c1c}, @hao={0xc9, 0x10, @empty}, @calipso={0x7, 0x28, {0x0, 0x8, 0x4, 0x401, [0x8, 0x8, 0x9, 0x0]}}, @hao={0xc9, 0x10, @mcast1}, @enc_lim={0x4, 0x1, 0x81}]}, @fragment={0x3a, 0x0, 0x4, 0x1, 0x0, 0x5, 0x65}, @srh={0x3c, 0xc, 0x4, 0x6, 0x6, 0x20, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x20}, @local, @local, @mcast1, @private0]}, @routing={0x89, 0x8, 0x1, 0xf7, 0x0, [@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, @dev={0xfe, 0x80, '\x00', 0x23}, @local]}, @routing={0x40, 0xa, 0x1, 0x1, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1]}], {{0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x30, 0x0, [0xfff, 0x1f], "c0fbdd5ee5f440fadfed796cdb45cd383381d59d4aa6b3222aaddbdb2ee37056f389c610cb0d56d8a628867c8a3b95a9"}, {0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x800, [0xb8], "c0869da04d1409945a2f015df66d002390a355969c31ce7e887e869cd4bcdda10487297a98eab066b616f00c2e9350f7e4994099c70f41110c99c38b3ca7d55e72dadaed2ee680a6b4b26dbf6f006a"}, {0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x86dd, [0x6, 0x5], "ec7b705d97131279653c73df442a55fadd79d8eb0622832411e45a4fac9c2da5ff2462f62035a50efc41b32bebd81934d24d42bb9949e24ab033a3e085a06b72ecd8b5618f1143bff6b7110928e70c8d0d9cd160ac2c4833e72ac9bb0a3c096a8708ffe64aa1b8fe1ca0c098b0dc5ac5a92b94fc04fb0631a34353e53cedfcae01e10becdf571de2019670fc9803f950bb0551ecdddaf13f3e34c45839246b52d6c6404dde70c6962ce7129864177b8b0887151ac9e0a0f5bfcb0ae3f0695a27baf8483a2ab92c8e8988b32302251ed5e6c0f661659453f0ad152fb00cf472f058b4b95c4d64a7d0e87a82de340dbb21de"}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x5, 0x7}, 0x1, {0x1}}}, {0x8, 0x22eb, 0x4, {{0xb, 0x2, 0x3, 0x0, 0x0, 0x1, 0x2, 0xff}, 0x2, {0x2, 0xfffb, 0x3, 0xf, 0x0, 0x0, 0x2, 0x1}}}, {0x8, 0x6558, 0x3, "4a9f7c723b8beb9540383b0c7bfa7a54ae485765"}}}}}, 0x3a4) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'hsr0\x00'}) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r1, &(0x7f0000000200)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xef\xf0\\_\xb6i\x94\x1eOE\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[_5\x12c\xa1\x04L\x88\x88c\xbc\x95\x8a\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6\xba\xd1ti\x1bR(\x1d\xc0\x9a\xb6@z\xe7?\xf3}\xe1\xfc&`m\xd3[C\xa1J\xc1\xb8\xd5\x94\a\x0f\x9b!\x1b}\xe1 \x9db\xc6\xa8\xd6e\x82\x15P\xd1\x1c\xe5d\x8b\xcf0?\xa7~\xda\'\xbf\x8c\x13\x98\xa4\x10\xc1\xb5\x84\x8f\xc9\xd2\xc7\xb9)*\xde\xb4E\xf5\xb8\x87L\xacKc6\xd2.\x8b\x86\xdf\x125\xce\xb2<\xbb\n? '}, 0xea) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000000c0)={{0xa08, 0x1}, 0x100, './file0\x00'}) (async) 17:41:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288a72faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fa35fe5d2933eef5928c8c931e9e765f8f416c86f205a2f56d7333743d2a64f0f9db7a034cbfd0d67044ff7de354cdcc0e9aba552be2ded6cae4c2fcd2cd0411fc250cffd65d224b84c9e120a44e1d18bebdb0b1886d852b05b96d45b4b99055a221dbfb0a456bca44128c731a9a844b13f6b73c34e916a34d386128b5fe9e864fd6ec2bc2e64c0a672e2fea0e847bfb07b6d69796d9e4c78676cdc5e0f070bcf877a4ef7da4d5aa2ab1bc7bfeac8eb9262d68"], 0xfffffffffffffe66) r1 = dup2(0xffffffffffffffff, r0) accept4$packet(r1, 0x0, &(0x7f0000000000), 0x800) 17:41:07 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) write$apparmor_exec(r0, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012dbd7000fbdbdf251000000008000600", @ANYRES32=r1, @ANYBLOB="05002d000000000008000300424e48cdef77fb66003043b5aa379c371822701a42594d8e195945ce0a", @ANYRES32=r2, @ANYBLOB="05002e0000000000"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x4000081) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:07 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b202314e95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b9286795dfbab1ff160d2e61eb15a087e81287246a88785a4e734f40d47fbbd25706b6f60729bc24dc258d63880155642227ccf19e3c125f35882f93bccb4ee962e133d5625777574720bab74b38b9bbb30217fd500f448924c8099c945465da42da8e910000b4fd64fb838040754eac31cbeff4f9e3d71bead3c3062929e6dab68d12caa2b4e368182364"], 0x84) 17:41:07 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) write$apparmor_exec(r0, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012dbd7000fbdbdf251000000008000600", @ANYRES32=r1, @ANYBLOB="05002d000000000008000300424e48cdef77fb66003043b5aa379c371822701a42594d8e195945ce0a", @ANYRES32=r2, @ANYBLOB="05002e0000000000"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x4000081) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:07 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc50300, 0x0) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x60) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:07 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) write$apparmor_exec(r0, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012dbd7000fbdbdf251000000008000600", @ANYRES32=r1, @ANYBLOB="05002d000000000008000300424e48cdef77fb66003043b5aa379c371822701a42594d8e195945ce0a", @ANYRES32=r2, @ANYBLOB="05002e0000000000"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x4000081) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:07 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc50300, 0x0) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x60) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc50300, 0x0) (async) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x60) (async) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) (async) 17:41:07 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) write$apparmor_exec(r0, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012dbd7000fbdbdf251000000008000600", @ANYRES32=r1, @ANYBLOB="05002d000000000008000300424e48cdef77fb66003043b5aa379c371822701a42594d8e195945ce0a", @ANYRES32=r2, @ANYBLOB="05002e0000000000"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x4000081) 17:41:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288a72faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fa35fe5d2933eef5928c8c931e9e765f8f416c86f205a2f56d7333743d2a64f0f9db7a034cbfd0d67044ff7de354cdcc0e9aba552be2ded6cae4c2fcd2cd0411fc250cffd65d224b84c9e120a44e1d18bebdb0b1886d852b05b96d45b4b99055a221dbfb0a456bca44128c731a9a844b13f6b73c34e916a34d386128b5fe9e864fd6ec2bc2e64c0a672e2fea0e847bfb07b6d69796d9e4c78676cdc5e0f070bcf877a4ef7da4d5aa2ab1bc7bfeac8eb9262d68"], 0xfffffffffffffe66) (async) r1 = dup2(0xffffffffffffffff, r0) accept4$packet(r1, 0x0, &(0x7f0000000000), 0x800) 17:41:07 executing program 5: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000000), &(0x7f0000000080)}) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x210, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80000}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, r2, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x4000800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x400, 0x70bd2b, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000c001}, 0x20040854) 17:41:07 executing program 5: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000000), &(0x7f0000000080)}) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x210, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80000}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, r2, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x4000800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x400, 0x70bd2b, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000c001}, 0x20040854) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000000), &(0x7f0000000080)}) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x210, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80000}, 0x0) (async) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, r2, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x4000800) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000002c0)=0x14) (async) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x400, 0x70bd2b, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000c001}, 0x20040854) (async) 17:41:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88~\'CpL\x95\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcau\xb4\xa5\xca?\x9f\xba1\"1\\\xe3\xcc|\xb2\xce\xea\xa3D\xf8y,\xc8\xf1c\xec\xb4\xd6\xf6\xf1'}, 0x53) fsync(r0) 17:41:07 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) write$apparmor_exec(r0, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) 17:41:07 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc50300, 0x0) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x60) (async) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:07 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) write$apparmor_exec(r0, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) 17:41:07 executing program 5: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000000), &(0x7f0000000080)}) (async) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x210, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80000}, 0x0) (async) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, r2, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x4000800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x400, 0x70bd2b, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000c001}, 0x20040854) 17:41:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88~\'CpL\x95\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcau\xb4\xa5\xca?\x9f\xba1\"1\\\xe3\xcc|\xb2\xce\xea\xa3D\xf8y,\xc8\xf1c\xec\xb4\xd6\xf6\xf1'}, 0x53) (async) fsync(r0) 17:41:07 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) 17:41:07 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10) write$tun(0xffffffffffffffff, &(0x7f0000000240)={@void, @void, @ipv6=@gre_packet={0x2, 0x6, "0a7be5", 0x3b7, 0x2f, 0xff, @mcast2, @private1, {[@dstopts={0x0, 0x14, '\x00', [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00'}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @calipso={0x7, 0x48, {0x3, 0x10, 0x0, 0x4, [0xf90, 0x6, 0x70b, 0x3, 0x24, 0xad3, 0x3, 0x7f]}}, @jumbo={0xc2, 0x4, 0x10001}, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0xb32c, [0x1a0, 0x8, 0x0]}}]}, @hopopts={0x62, 0x5, '\x00', [@hao={0xc9, 0x10, @loopback}, @pad1, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @ra={0x5, 0x2, 0x20}]}, @routing={0x3c, 0xa, 0x2, 0x1, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1, @dev={0xfe, 0x80, '\x00', 0x10}, @dev={0xfe, 0x80, '\x00', 0x31}, @mcast1]}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x83, 0x1, [0x1f], "94a060ba4fbb928f5c4c0c9c3ef9c54d0f5589a7e1035bebbd9d7179669a8df18bd62dbca2e21be69aa70ce38f49833cfeb03b743924b6c0a2779182b4f3e0ed841d2dac7d7bc7306b4ee1c6ee7b3bab5c89c32398c0b678b35caa0eb4ea78ced59d32e02708ce3fb91db9c5f249bd8ee548c3aa2e9b9910ca9d53d77a67285634a947"}, {0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800, [0x8001], "f09eafa24aaf2ac8cfafc98969892832885eb20db7ff8a442800a7a60f0cedf2372ff38e7b653f7079d0a91b5513a849b72e6538e0e0e9fae6d61e391b39ffe31a138ddd4ad48f0857e3c8158706b3"}, {0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x86dd, [0x0, 0x7], "9ce958c4de202d06664906608924af4b76cbdea4044021fed5ca3251e6cbbc1a9b5254f9339ed60916d6f71d010c07f28d66009eb783ae1daf9836e9c35c41ae1f1a2f32a66525fac30029c512cdc3221ef91a13b63bb66261f55c96f5556f7fb42f46d9c975c8dc15f5320d25aec7c52b777757c0e1975778d0e6d7c67df6af546445cf743c02e3cce3342e0a5184c02502e08ea22d88ef98a3b84f71d5522021f4b149f1320ccc33663c7c48e4eab39cf5957fae49a5476f701df431b3249302bb4ed073958d71df0eec78c6f5a18bbb6b0e1a20e57e90349c2d01b7687e3eeb0bb3"}, {0x8, 0x88be, 0x2, {{0xb, 0x1, 0x5, 0x3, 0x0, 0x2, 0x5, 0x7}, 0x1, {0x9}}}, {0x8, 0x22eb, 0x3, {{0xc, 0x2, 0x81, 0x3, 0x1, 0x2, 0x1, 0x4}, 0x2, {0x1ff, 0x400, 0x1, 0x1b}}}, {0x8, 0x6558, 0x3, "fd51820f1a04763aef2f77a3e6bee4536a6aa7475e11ffccc526a0fc0ce58801f22fd30b24e74606bfb6d6add1b94c37fe023bec334cdc83f4766bd44f15d934f9ebe0d86c64a69c40c0b6ab3411197bc411bb6a354e9d680e98902dfe023df45d522f9ccc186ec66c07d9086521220e895e094864ce840b3a6e7be815f4"}}}}}, 0x3df) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:07 executing program 0: write$apparmor_exec(0xffffffffffffffff, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) 17:41:07 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000200)={0x0, 0x80e9, 0x0, [0x6, 0x1, 0x9, 0x1ff, 0x6], [0x6, 0x3ff, 0xffffffffffffffff, 0x273, 0x7fffffffffffffff, 0x69b5, 0x7fffffff, 0x1, 0x0, 0x2, 0x8001, 0xfac8, 0x1, 0x1000, 0xffffffff, 0x14066136, 0x10001, 0x8000000000000000, 0x80000000, 0x9, 0x0, 0x80000001, 0x8, 0x4, 0x2, 0x4a, 0x1, 0x80, 0x800, 0x0, 0x2, 0x20, 0x20, 0x100000001, 0x0, 0x2, 0x80000000000000, 0x7, 0x8, 0xd1b, 0x7fffffff, 0x4, 0x9, 0x6, 0x0, 0x6, 0x4d, 0x9, 0x100, 0x9, 0x9, 0x8001, 0x0, 0x6, 0x2ce2, 0x5, 0x1, 0x5400000000000000, 0x9, 0x40, 0x7ff, 0x7fffffff, 0x9, 0x20, 0x7fffffff, 0x6, 0x8, 0x1, 0x200, 0x8000000000000000, 0x5, 0xc000000000000000, 0x2, 0x0, 0x80000001, 0xfffffffffffff7ec, 0xaa4, 0x10001, 0x7, 0x3973, 0x0, 0x80000000, 0x2, 0x89df, 0x7fffffffffffffff, 0x400, 0x7, 0xfff, 0x8, 0x0, 0x8000, 0xfffffffffffffff9, 0x8, 0xf60, 0x3caf66f5, 0x6, 0x3, 0x800, 0x8001, 0x6, 0x1, 0x1cf3, 0x7fff, 0x6, 0x5, 0x3f74, 0x29c, 0x1, 0x73a9, 0x69, 0x5, 0x2, 0x4, 0xffffffffffffffff, 0x0, 0x4, 0x39c, 0x6, 0xffffffff, 0x101, 0x9]}) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:07 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10) write$tun(0xffffffffffffffff, &(0x7f0000000240)={@void, @void, @ipv6=@gre_packet={0x2, 0x6, "0a7be5", 0x3b7, 0x2f, 0xff, @mcast2, @private1, {[@dstopts={0x0, 0x14, '\x00', [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00'}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @calipso={0x7, 0x48, {0x3, 0x10, 0x0, 0x4, [0xf90, 0x6, 0x70b, 0x3, 0x24, 0xad3, 0x3, 0x7f]}}, @jumbo={0xc2, 0x4, 0x10001}, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0xb32c, [0x1a0, 0x8, 0x0]}}]}, @hopopts={0x62, 0x5, '\x00', [@hao={0xc9, 0x10, @loopback}, @pad1, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @ra={0x5, 0x2, 0x20}]}, @routing={0x3c, 0xa, 0x2, 0x1, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1, @dev={0xfe, 0x80, '\x00', 0x10}, @dev={0xfe, 0x80, '\x00', 0x31}, @mcast1]}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x83, 0x1, [0x1f], "94a060ba4fbb928f5c4c0c9c3ef9c54d0f5589a7e1035bebbd9d7179669a8df18bd62dbca2e21be69aa70ce38f49833cfeb03b743924b6c0a2779182b4f3e0ed841d2dac7d7bc7306b4ee1c6ee7b3bab5c89c32398c0b678b35caa0eb4ea78ced59d32e02708ce3fb91db9c5f249bd8ee548c3aa2e9b9910ca9d53d77a67285634a947"}, {0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800, [0x8001], "f09eafa24aaf2ac8cfafc98969892832885eb20db7ff8a442800a7a60f0cedf2372ff38e7b653f7079d0a91b5513a849b72e6538e0e0e9fae6d61e391b39ffe31a138ddd4ad48f0857e3c8158706b3"}, {0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x86dd, [0x0, 0x7], "9ce958c4de202d06664906608924af4b76cbdea4044021fed5ca3251e6cbbc1a9b5254f9339ed60916d6f71d010c07f28d66009eb783ae1daf9836e9c35c41ae1f1a2f32a66525fac30029c512cdc3221ef91a13b63bb66261f55c96f5556f7fb42f46d9c975c8dc15f5320d25aec7c52b777757c0e1975778d0e6d7c67df6af546445cf743c02e3cce3342e0a5184c02502e08ea22d88ef98a3b84f71d5522021f4b149f1320ccc33663c7c48e4eab39cf5957fae49a5476f701df431b3249302bb4ed073958d71df0eec78c6f5a18bbb6b0e1a20e57e90349c2d01b7687e3eeb0bb3"}, {0x8, 0x88be, 0x2, {{0xb, 0x1, 0x5, 0x3, 0x0, 0x2, 0x5, 0x7}, 0x1, {0x9}}}, {0x8, 0x22eb, 0x3, {{0xc, 0x2, 0x81, 0x3, 0x1, 0x2, 0x1, 0x4}, 0x2, {0x1ff, 0x400, 0x1, 0x1b}}}, {0x8, 0x6558, 0x3, "fd51820f1a04763aef2f77a3e6bee4536a6aa7475e11ffccc526a0fc0ce58801f22fd30b24e74606bfb6d6add1b94c37fe023bec334cdc83f4766bd44f15d934f9ebe0d86c64a69c40c0b6ab3411197bc411bb6a354e9d680e98902dfe023df45d522f9ccc186ec66c07d9086521220e895e094864ce840b3a6e7be815f4"}}}}}, 0x3df) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) socket$rds(0x15, 0x5, 0x0) (async) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10) (async) write$tun(0xffffffffffffffff, &(0x7f0000000240)={@void, @void, @ipv6=@gre_packet={0x2, 0x6, "0a7be5", 0x3b7, 0x2f, 0xff, @mcast2, @private1, {[@dstopts={0x0, 0x14, '\x00', [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00'}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @calipso={0x7, 0x48, {0x3, 0x10, 0x0, 0x4, [0xf90, 0x6, 0x70b, 0x3, 0x24, 0xad3, 0x3, 0x7f]}}, @jumbo={0xc2, 0x4, 0x10001}, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0xb32c, [0x1a0, 0x8, 0x0]}}]}, @hopopts={0x62, 0x5, '\x00', [@hao={0xc9, 0x10, @loopback}, @pad1, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @ra={0x5, 0x2, 0x20}]}, @routing={0x3c, 0xa, 0x2, 0x1, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1, @dev={0xfe, 0x80, '\x00', 0x10}, @dev={0xfe, 0x80, '\x00', 0x31}, @mcast1]}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x83, 0x1, [0x1f], "94a060ba4fbb928f5c4c0c9c3ef9c54d0f5589a7e1035bebbd9d7179669a8df18bd62dbca2e21be69aa70ce38f49833cfeb03b743924b6c0a2779182b4f3e0ed841d2dac7d7bc7306b4ee1c6ee7b3bab5c89c32398c0b678b35caa0eb4ea78ced59d32e02708ce3fb91db9c5f249bd8ee548c3aa2e9b9910ca9d53d77a67285634a947"}, {0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800, [0x8001], "f09eafa24aaf2ac8cfafc98969892832885eb20db7ff8a442800a7a60f0cedf2372ff38e7b653f7079d0a91b5513a849b72e6538e0e0e9fae6d61e391b39ffe31a138ddd4ad48f0857e3c8158706b3"}, {0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x86dd, [0x0, 0x7], "9ce958c4de202d06664906608924af4b76cbdea4044021fed5ca3251e6cbbc1a9b5254f9339ed60916d6f71d010c07f28d66009eb783ae1daf9836e9c35c41ae1f1a2f32a66525fac30029c512cdc3221ef91a13b63bb66261f55c96f5556f7fb42f46d9c975c8dc15f5320d25aec7c52b777757c0e1975778d0e6d7c67df6af546445cf743c02e3cce3342e0a5184c02502e08ea22d88ef98a3b84f71d5522021f4b149f1320ccc33663c7c48e4eab39cf5957fae49a5476f701df431b3249302bb4ed073958d71df0eec78c6f5a18bbb6b0e1a20e57e90349c2d01b7687e3eeb0bb3"}, {0x8, 0x88be, 0x2, {{0xb, 0x1, 0x5, 0x3, 0x0, 0x2, 0x5, 0x7}, 0x1, {0x9}}}, {0x8, 0x22eb, 0x3, {{0xc, 0x2, 0x81, 0x3, 0x1, 0x2, 0x1, 0x4}, 0x2, {0x1ff, 0x400, 0x1, 0x1b}}}, {0x8, 0x6558, 0x3, "fd51820f1a04763aef2f77a3e6bee4536a6aa7475e11ffccc526a0fc0ce58801f22fd30b24e74606bfb6d6add1b94c37fe023bec334cdc83f4766bd44f15d934f9ebe0d86c64a69c40c0b6ab3411197bc411bb6a354e9d680e98902dfe023df45d522f9ccc186ec66c07d9086521220e895e094864ce840b3a6e7be815f4"}}}}}, 0x3df) (async) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) (async) 17:41:07 executing program 0: write$apparmor_exec(0xffffffffffffffff, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) 17:41:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88~\'CpL\x95\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcau\xb4\xa5\xca?\x9f\xba1\"1\\\xe3\xcc|\xb2\xce\xea\xa3D\xf8y,\xc8\xf1c\xec\xb4\xd6\xf6\xf1'}, 0x53) fsync(r0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88~\'CpL\x95\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcau\xb4\xa5\xca?\x9f\xba1\"1\\\xe3\xcc|\xb2\xce\xea\xa3D\xf8y,\xc8\xf1c\xec\xb4\xd6\xf6\xf1'}, 0x53) (async) fsync(r0) (async) 17:41:07 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10) write$tun(0xffffffffffffffff, &(0x7f0000000240)={@void, @void, @ipv6=@gre_packet={0x2, 0x6, "0a7be5", 0x3b7, 0x2f, 0xff, @mcast2, @private1, {[@dstopts={0x0, 0x14, '\x00', [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00'}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @calipso={0x7, 0x48, {0x3, 0x10, 0x0, 0x4, [0xf90, 0x6, 0x70b, 0x3, 0x24, 0xad3, 0x3, 0x7f]}}, @jumbo={0xc2, 0x4, 0x10001}, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0xb32c, [0x1a0, 0x8, 0x0]}}]}, @hopopts={0x62, 0x5, '\x00', [@hao={0xc9, 0x10, @loopback}, @pad1, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @ra={0x5, 0x2, 0x20}]}, @routing={0x3c, 0xa, 0x2, 0x1, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1, @dev={0xfe, 0x80, '\x00', 0x10}, @dev={0xfe, 0x80, '\x00', 0x31}, @mcast1]}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x83, 0x1, [0x1f], "94a060ba4fbb928f5c4c0c9c3ef9c54d0f5589a7e1035bebbd9d7179669a8df18bd62dbca2e21be69aa70ce38f49833cfeb03b743924b6c0a2779182b4f3e0ed841d2dac7d7bc7306b4ee1c6ee7b3bab5c89c32398c0b678b35caa0eb4ea78ced59d32e02708ce3fb91db9c5f249bd8ee548c3aa2e9b9910ca9d53d77a67285634a947"}, {0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800, [0x8001], "f09eafa24aaf2ac8cfafc98969892832885eb20db7ff8a442800a7a60f0cedf2372ff38e7b653f7079d0a91b5513a849b72e6538e0e0e9fae6d61e391b39ffe31a138ddd4ad48f0857e3c8158706b3"}, {0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x86dd, [0x0, 0x7], "9ce958c4de202d06664906608924af4b76cbdea4044021fed5ca3251e6cbbc1a9b5254f9339ed60916d6f71d010c07f28d66009eb783ae1daf9836e9c35c41ae1f1a2f32a66525fac30029c512cdc3221ef91a13b63bb66261f55c96f5556f7fb42f46d9c975c8dc15f5320d25aec7c52b777757c0e1975778d0e6d7c67df6af546445cf743c02e3cce3342e0a5184c02502e08ea22d88ef98a3b84f71d5522021f4b149f1320ccc33663c7c48e4eab39cf5957fae49a5476f701df431b3249302bb4ed073958d71df0eec78c6f5a18bbb6b0e1a20e57e90349c2d01b7687e3eeb0bb3"}, {0x8, 0x88be, 0x2, {{0xb, 0x1, 0x5, 0x3, 0x0, 0x2, 0x5, 0x7}, 0x1, {0x9}}}, {0x8, 0x22eb, 0x3, {{0xc, 0x2, 0x81, 0x3, 0x1, 0x2, 0x1, 0x4}, 0x2, {0x1ff, 0x400, 0x1, 0x1b}}}, {0x8, 0x6558, 0x3, "fd51820f1a04763aef2f77a3e6bee4536a6aa7475e11ffccc526a0fc0ce58801f22fd30b24e74606bfb6d6add1b94c37fe023bec334cdc83f4766bd44f15d934f9ebe0d86c64a69c40c0b6ab3411197bc411bb6a354e9d680e98902dfe023df45d522f9ccc186ec66c07d9086521220e895e094864ce840b3a6e7be815f4"}}}}}, 0x3df) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZNsO@\xa3\x002\xf9\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91'}, 0x83) 17:41:07 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000200)={0x0, 0x80e9, 0x0, [0x6, 0x1, 0x9, 0x1ff, 0x6], [0x6, 0x3ff, 0xffffffffffffffff, 0x273, 0x7fffffffffffffff, 0x69b5, 0x7fffffff, 0x1, 0x0, 0x2, 0x8001, 0xfac8, 0x1, 0x1000, 0xffffffff, 0x14066136, 0x10001, 0x8000000000000000, 0x80000000, 0x9, 0x0, 0x80000001, 0x8, 0x4, 0x2, 0x4a, 0x1, 0x80, 0x800, 0x0, 0x2, 0x20, 0x20, 0x100000001, 0x0, 0x2, 0x80000000000000, 0x7, 0x8, 0xd1b, 0x7fffffff, 0x4, 0x9, 0x6, 0x0, 0x6, 0x4d, 0x9, 0x100, 0x9, 0x9, 0x8001, 0x0, 0x6, 0x2ce2, 0x5, 0x1, 0x5400000000000000, 0x9, 0x40, 0x7ff, 0x7fffffff, 0x9, 0x20, 0x7fffffff, 0x6, 0x8, 0x1, 0x200, 0x8000000000000000, 0x5, 0xc000000000000000, 0x2, 0x0, 0x80000001, 0xfffffffffffff7ec, 0xaa4, 0x10001, 0x7, 0x3973, 0x0, 0x80000000, 0x2, 0x89df, 0x7fffffffffffffff, 0x400, 0x7, 0xfff, 0x8, 0x0, 0x8000, 0xfffffffffffffff9, 0x8, 0xf60, 0x3caf66f5, 0x6, 0x3, 0x800, 0x8001, 0x6, 0x1, 0x1cf3, 0x7fff, 0x6, 0x5, 0x3f74, 0x29c, 0x1, 0x73a9, 0x69, 0x5, 0x2, 0x4, 0xffffffffffffffff, 0x0, 0x4, 0x39c, 0x6, 0xffffffff, 0x101, 0x9]}) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fa"], 0x44) 17:41:07 executing program 0: write$apparmor_exec(0xffffffffffffffff, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) 17:41:07 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000080)) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="657865ffffffffe95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b9286795577edfbab1ff16ffff61eb05a087e81287246a88785a4e724f40a30032f91a793a7f0729bc24dc258d63880155642a27ccf19e3c125f35882f93bccb4ee9626b202aabc033e133d5625777574720bab74b38b9bbb30217fd500f448991"], 0x83) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x320c0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000340), r1) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x4c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x3}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x30048400}, 0x40) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0xd, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0xff}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x4000810) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r6, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$packet(r6, 0x0, 0x0, 0x400c801, 0x0, 0xffffffffffffffb7) write$tun(r1, &(0x7f00000001c0)={@val={0x0, 0x2}, @val={0x1, 0x5, 0x1, 0x9, 0x800, 0xfff}, @ipv4=@igmp={{0x8, 0x4, 0x2, 0x36, 0xf8, 0x64, 0x0, 0xf9, 0x2, 0x0, @empty, @multicast1, {[@end, @timestamp={0x44, 0x8, 0x64, 0x0, 0x0, [0x4]}]}}, {0x11, 0x80, 0x0, @private=0xa010102, "2eea099777a245bd22fab7ee05d9ac5ead265f376641dd6eea45d529098fc6ca0c680767144b5c3c0474ec0ff053b0c21f04a29469354dad1a8dc40b85cdff59d1fed91fc0a50c31378e0cf2c8ac152b991f3cf07111e9dd464717cde5c821263f66b67ed9bf3edc629508389437119400d705beb4d206d3a16b4813982cc27d8b98810a3e4f0bb9fa8da914809bd97de113b3497292e9e884759adf8e771da23e10e0661c407643a335384adbfb101290950a12f56d6a175e59c3e0ce36d4eba5780a0c6e0ddc371a4923607fa9a93c"}}}, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)) 17:41:07 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000200)={0x0, 0x80e9, 0x0, [0x6, 0x1, 0x9, 0x1ff, 0x6], [0x6, 0x3ff, 0xffffffffffffffff, 0x273, 0x7fffffffffffffff, 0x69b5, 0x7fffffff, 0x1, 0x0, 0x2, 0x8001, 0xfac8, 0x1, 0x1000, 0xffffffff, 0x14066136, 0x10001, 0x8000000000000000, 0x80000000, 0x9, 0x0, 0x80000001, 0x8, 0x4, 0x2, 0x4a, 0x1, 0x80, 0x800, 0x0, 0x2, 0x20, 0x20, 0x100000001, 0x0, 0x2, 0x80000000000000, 0x7, 0x8, 0xd1b, 0x7fffffff, 0x4, 0x9, 0x6, 0x0, 0x6, 0x4d, 0x9, 0x100, 0x9, 0x9, 0x8001, 0x0, 0x6, 0x2ce2, 0x5, 0x1, 0x5400000000000000, 0x9, 0x40, 0x7ff, 0x7fffffff, 0x9, 0x20, 0x7fffffff, 0x6, 0x8, 0x1, 0x200, 0x8000000000000000, 0x5, 0xc000000000000000, 0x2, 0x0, 0x80000001, 0xfffffffffffff7ec, 0xaa4, 0x10001, 0x7, 0x3973, 0x0, 0x80000000, 0x2, 0x89df, 0x7fffffffffffffff, 0x400, 0x7, 0xfff, 0x8, 0x0, 0x8000, 0xfffffffffffffff9, 0x8, 0xf60, 0x3caf66f5, 0x6, 0x3, 0x800, 0x8001, 0x6, 0x1, 0x1cf3, 0x7fff, 0x6, 0x5, 0x3f74, 0x29c, 0x1, 0x73a9, 0x69, 0x5, 0x2, 0x4, 0xffffffffffffffff, 0x0, 0x4, 0x39c, 0x6, 0xffffffff, 0x101, 0x9]}) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000200)={0x0, 0x80e9, 0x0, [0x6, 0x1, 0x9, 0x1ff, 0x6], [0x6, 0x3ff, 0xffffffffffffffff, 0x273, 0x7fffffffffffffff, 0x69b5, 0x7fffffff, 0x1, 0x0, 0x2, 0x8001, 0xfac8, 0x1, 0x1000, 0xffffffff, 0x14066136, 0x10001, 0x8000000000000000, 0x80000000, 0x9, 0x0, 0x80000001, 0x8, 0x4, 0x2, 0x4a, 0x1, 0x80, 0x800, 0x0, 0x2, 0x20, 0x20, 0x100000001, 0x0, 0x2, 0x80000000000000, 0x7, 0x8, 0xd1b, 0x7fffffff, 0x4, 0x9, 0x6, 0x0, 0x6, 0x4d, 0x9, 0x100, 0x9, 0x9, 0x8001, 0x0, 0x6, 0x2ce2, 0x5, 0x1, 0x5400000000000000, 0x9, 0x40, 0x7ff, 0x7fffffff, 0x9, 0x20, 0x7fffffff, 0x6, 0x8, 0x1, 0x200, 0x8000000000000000, 0x5, 0xc000000000000000, 0x2, 0x0, 0x80000001, 0xfffffffffffff7ec, 0xaa4, 0x10001, 0x7, 0x3973, 0x0, 0x80000000, 0x2, 0x89df, 0x7fffffffffffffff, 0x400, 0x7, 0xfff, 0x8, 0x0, 0x8000, 0xfffffffffffffff9, 0x8, 0xf60, 0x3caf66f5, 0x6, 0x3, 0x800, 0x8001, 0x6, 0x1, 0x1cf3, 0x7fff, 0x6, 0x5, 0x3f74, 0x29c, 0x1, 0x73a9, 0x69, 0x5, 0x2, 0x4, 0xffffffffffffffff, 0x0, 0x4, 0x39c, 0x6, 0xffffffff, 0x101, 0x9]}) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) 17:41:07 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000080)) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="657865ffffffffe95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b9286795577edfbab1ff16ffff61eb05a087e81287246a88785a4e724f40a30032f91a793a7f0729bc24dc258d63880155642a27ccf19e3c125f35882f93bccb4ee9626b202aabc033e133d5625777574720bab74b38b9bbb30217fd500f448991"], 0x83) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x320c0, 0x0) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000340), r1) (async) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x4c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x3}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x30048400}, 0x40) (async) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0xd, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) (async) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0xff}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x4000810) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r6, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$packet(r6, 0x0, 0x0, 0x400c801, 0x0, 0xffffffffffffffb7) write$tun(r1, &(0x7f00000001c0)={@val={0x0, 0x2}, @val={0x1, 0x5, 0x1, 0x9, 0x800, 0xfff}, @ipv4=@igmp={{0x8, 0x4, 0x2, 0x36, 0xf8, 0x64, 0x0, 0xf9, 0x2, 0x0, @empty, @multicast1, {[@end, @timestamp={0x44, 0x8, 0x64, 0x0, 0x0, [0x4]}]}}, {0x11, 0x80, 0x0, @private=0xa010102, "2eea099777a245bd22fab7ee05d9ac5ead265f376641dd6eea45d529098fc6ca0c680767144b5c3c0474ec0ff053b0c21f04a29469354dad1a8dc40b85cdff59d1fed91fc0a50c31378e0cf2c8ac152b991f3cf07111e9dd464717cde5c821263f66b67ed9bf3edc629508389437119400d705beb4d206d3a16b4813982cc27d8b98810a3e4f0bb9fa8da914809bd97de113b3497292e9e884759adf8e771da23e10e0661c407643a335384adbfb101290950a12f56d6a175e59c3e0ce36d4eba5780a0c6e0ddc371a4923607fa9a93c"}}}, 0x106) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)) 17:41:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fa"], 0x44) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fa"], 0x44) (async) 17:41:07 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', '/\x00'}, 0x8) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x4, 0x1ab3, 0xf79e, 0x100, 0x1, 0x2, '\x00', 0x0, r1, 0x3, 0x4, 0x5, 0x7}, 0x48) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x401000, 0x0) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0xfffffffffffffffc) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0xd81, 0x0) sendto$rxrpc(r3, &(0x7f0000000200)="c9111a6d7a2a8f5c0a1660870b4dc67cacf6377cefe0a55922573e2a0e367124dc96b747d8b3b7b98412f27e71d1e7ea024d5d670488ef521663961afc3b5badbaafcf1d3cc0955900b175504090f69be159989fa393f6a452f6e5105090aca5cdc8d1b7023ec9a34a6feb3fd79653610d5013c0d9f3a82586d2ca91d5d84805aad769e581ae325e192320c84e03836f7e4b8066bbda8e24e9ebff2d5310b1a175140de597e5dfc138a53dac062fbefea1d32b9828c85637c977165fbd9c195dadc73e438264f4649ec07a1ea4e8bd55bbd01580764c94a7f952d088642510c752809349968f2c1e5a04d9570ffc53cb", 0xf0, 0x20000000, &(0x7f0000000080)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e24, 0xffffffff, @ipv4={'\x00', '\xff\xff', @local}, 0x7ff}}, 0x24) 17:41:07 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) 17:41:07 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', '/\x00'}, 0x8) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x4, 0x1ab3, 0xf79e, 0x100, 0x1, 0x2, '\x00', 0x0, r1, 0x3, 0x4, 0x5, 0x7}, 0x48) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x401000, 0x0) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0xfffffffffffffffc) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0xd81, 0x0) sendto$rxrpc(r3, &(0x7f0000000200)="c9111a6d7a2a8f5c0a1660870b4dc67cacf6377cefe0a55922573e2a0e367124dc96b747d8b3b7b98412f27e71d1e7ea024d5d670488ef521663961afc3b5badbaafcf1d3cc0955900b175504090f69be159989fa393f6a452f6e5105090aca5cdc8d1b7023ec9a34a6feb3fd79653610d5013c0d9f3a82586d2ca91d5d84805aad769e581ae325e192320c84e03836f7e4b8066bbda8e24e9ebff2d5310b1a175140de597e5dfc138a53dac062fbefea1d32b9828c85637c977165fbd9c195dadc73e438264f4649ec07a1ea4e8bd55bbd01580764c94a7f952d088642510c752809349968f2c1e5a04d9570ffc53cb", 0xf0, 0x20000000, &(0x7f0000000080)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e24, 0xffffffff, @ipv4={'\x00', '\xff\xff', @local}, 0x7ff}}, 0x24) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', '/\x00'}, 0x8) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x4, 0x1ab3, 0xf79e, 0x100, 0x1, 0x2, '\x00', 0x0, r1, 0x3, 0x4, 0x5, 0x7}, 0x48) (async) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x401000, 0x0) (async) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0xfffffffffffffffc) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0xd81, 0x0) (async) sendto$rxrpc(r3, &(0x7f0000000200)="c9111a6d7a2a8f5c0a1660870b4dc67cacf6377cefe0a55922573e2a0e367124dc96b747d8b3b7b98412f27e71d1e7ea024d5d670488ef521663961afc3b5badbaafcf1d3cc0955900b175504090f69be159989fa393f6a452f6e5105090aca5cdc8d1b7023ec9a34a6feb3fd79653610d5013c0d9f3a82586d2ca91d5d84805aad769e581ae325e192320c84e03836f7e4b8066bbda8e24e9ebff2d5310b1a175140de597e5dfc138a53dac062fbefea1d32b9828c85637c977165fbd9c195dadc73e438264f4649ec07a1ea4e8bd55bbd01580764c94a7f952d088642510c752809349968f2c1e5a04d9570ffc53cb", 0xf0, 0x20000000, &(0x7f0000000080)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e24, 0xffffffff, @ipv4={'\x00', '\xff\xff', @local}, 0x7ff}}, 0x24) (async) 17:41:07 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) 17:41:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fa"], 0x44) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fa"], 0x44) (async) 17:41:07 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000080)) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="657865ffffffffe95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b9286795577edfbab1ff16ffff61eb05a087e81287246a88785a4e724f40a30032f91a793a7f0729bc24dc258d63880155642a27ccf19e3c125f35882f93bccb4ee9626b202aabc033e133d5625777574720bab74b38b9bbb30217fd500f448991"], 0x83) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x320c0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000340), r1) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x4c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x3}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x30048400}, 0x40) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0xd, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0xff}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x4000810) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r6, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$packet(r6, 0x0, 0x0, 0x400c801, 0x0, 0xffffffffffffffb7) write$tun(r1, &(0x7f00000001c0)={@val={0x0, 0x2}, @val={0x1, 0x5, 0x1, 0x9, 0x800, 0xfff}, @ipv4=@igmp={{0x8, 0x4, 0x2, 0x36, 0xf8, 0x64, 0x0, 0xf9, 0x2, 0x0, @empty, @multicast1, {[@end, @timestamp={0x44, 0x8, 0x64, 0x0, 0x0, [0x4]}]}}, {0x11, 0x80, 0x0, @private=0xa010102, "2eea099777a245bd22fab7ee05d9ac5ead265f376641dd6eea45d529098fc6ca0c680767144b5c3c0474ec0ff053b0c21f04a29469354dad1a8dc40b85cdff59d1fed91fc0a50c31378e0cf2c8ac152b991f3cf07111e9dd464717cde5c821263f66b67ed9bf3edc629508389437119400d705beb4d206d3a16b4813982cc27d8b98810a3e4f0bb9fa8da914809bd97de113b3497292e9e884759adf8e771da23e10e0661c407643a335384adbfb101290950a12f56d6a175e59c3e0ce36d4eba5780a0c6e0ddc371a4923607fa9a93c"}}}, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$int_out(r0, 0x5460, &(0x7f0000000080)) (async) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="657865ffffffffe95f28fb16eeb6fa29dd1a3192441a734b50f9b170c6b9286795577edfbab1ff16ffff61eb05a087e81287246a88785a4e724f40a30032f91a793a7f0729bc24dc258d63880155642a27ccf19e3c125f35882f93bccb4ee9626b202aabc033e133d5625777574720bab74b38b9bbb30217fd500f448991"], 0x83) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x320c0, 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) (async) syz_genetlink_get_family_id$fou(&(0x7f0000000340), r1) (async) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x4c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x3}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x30048400}, 0x40) (async) socket$packet(0x11, 0x3, 0x300) (async) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) (async) bind$packet(r4, &(0x7f0000000040)={0x11, 0xd, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) (async) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0xff}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x4000810) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r6, 0x0, 0x0, 0x0, 0x0, 0x0) (async) sendto$packet(r6, 0x0, 0x0, 0x400c801, 0x0, 0xffffffffffffffb7) (async) write$tun(r1, &(0x7f00000001c0)={@val={0x0, 0x2}, @val={0x1, 0x5, 0x1, 0x9, 0x800, 0xfff}, @ipv4=@igmp={{0x8, 0x4, 0x2, 0x36, 0xf8, 0x64, 0x0, 0xf9, 0x2, 0x0, @empty, @multicast1, {[@end, @timestamp={0x44, 0x8, 0x64, 0x0, 0x0, [0x4]}]}}, {0x11, 0x80, 0x0, @private=0xa010102, "2eea099777a245bd22fab7ee05d9ac5ead265f376641dd6eea45d529098fc6ca0c680767144b5c3c0474ec0ff053b0c21f04a29469354dad1a8dc40b85cdff59d1fed91fc0a50c31378e0cf2c8ac152b991f3cf07111e9dd464717cde5c821263f66b67ed9bf3edc629508389437119400d705beb4d206d3a16b4813982cc27d8b98810a3e4f0bb9fa8da914809bd97de113b3497292e9e884759adf8e771da23e10e0661c407643a335384adbfb101290950a12f56d6a175e59c3e0ce36d4eba5780a0c6e0ddc371a4923607fa9a93c"}}}, 0x106) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)) (async) 17:41:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r1, 0x20, &(0x7f0000000000)={&(0x7f0000000300)=""/167, 0xa7, 0x0, &(0x7f00000003c0)=""/4096, 0x1000}}, 0x10) accept4$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000013c0)=0x14, 0x1c00) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08ab71a8fc8a23a43674c5dccaa3665ea1288fb8017720e000000c0483a816208b15200ca757597438a95ffc818315ce3cc7cb2cee5c42da2881290fab298ae431dbaf38cd3fc56fd17c8e1fdfaf88c28268202e06c8695745f08a19196824a0b0936e6b38cb43294831e510b00de1092b62e7d0000000000000000d8484e6759311274f86d1b27dd0445d968c648ad5e42e28e6fa898c4795ba1f3868d28514e7a40e05dfdcf1fdc338cf46795172808864cd006cd7a1905177c66a4eff2ddb9e81342d8cdac14cdee3645dd1d257b0337fb41b4a1f381de1b48fcea623bc2cc1fc83c28ada9bcaf464b011de95aee642df7142938002f78bb33dde9dd0d754a54995a9c6ac61d47781e4e9a0895bf5bdbc3eb46069d4a9eee54fbd9050429aafab420d37daddf27ccc449d6777fb94c14b897673883b4ae2de9df01cb758887ff99941a771800b56eb401b347e6bd4e550887605889fad7d5de5c182d66b2d0e06d59e7fa43c153f3ac0d26a1fb1cb25efda7b5e93ec95d3b651d8e18be26851dc49945030000000000000037b537de8b487620bcee13fd7dd4ba632fb6d923c83e690c459326c381f2d0a6b4f47740612faca80c8485ce58959fbd50faf53ad4be6b81cbf15e15f08a0923af8161ddccfb555f1249d9390000000000"], 0xfffffffffffffe66) 17:41:07 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', '/\x00'}, 0x8) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x4, 0x1ab3, 0xf79e, 0x100, 0x1, 0x2, '\x00', 0x0, r1, 0x3, 0x4, 0x5, 0x7}, 0x48) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x401000, 0x0) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0xfffffffffffffffc) (async) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0xd81, 0x0) sendto$rxrpc(r3, &(0x7f0000000200)="c9111a6d7a2a8f5c0a1660870b4dc67cacf6377cefe0a55922573e2a0e367124dc96b747d8b3b7b98412f27e71d1e7ea024d5d670488ef521663961afc3b5badbaafcf1d3cc0955900b175504090f69be159989fa393f6a452f6e5105090aca5cdc8d1b7023ec9a34a6feb3fd79653610d5013c0d9f3a82586d2ca91d5d84805aad769e581ae325e192320c84e03836f7e4b8066bbda8e24e9ebff2d5310b1a175140de597e5dfc138a53dac062fbefea1d32b9828c85637c977165fbd9c195dadc73e438264f4649ec07a1ea4e8bd55bbd01580764c94a7f952d088642510c752809349968f2c1e5a04d9570ffc53cb", 0xf0, 0x20000000, &(0x7f0000000080)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e24, 0xffffffff, @ipv4={'\x00', '\xff\xff', @local}, 0x7ff}}, 0x24) 17:41:07 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) 17:41:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r1, 0x20, &(0x7f0000000000)={&(0x7f0000000300)=""/167, 0xa7, 0x0, &(0x7f00000003c0)=""/4096, 0x1000}}, 0x10) accept4$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000013c0)=0x14, 0x1c00) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08ab71a8fc8a23a43674c5dccaa3665ea1288fb8017720e000000c0483a816208b15200ca757597438a95ffc818315ce3cc7cb2cee5c42da2881290fab298ae431dbaf38cd3fc56fd17c8e1fdfaf88c28268202e06c8695745f08a19196824a0b0936e6b38cb43294831e510b00de1092b62e7d0000000000000000d8484e6759311274f86d1b27dd0445d968c648ad5e42e28e6fa898c4795ba1f3868d28514e7a40e05dfdcf1fdc338cf46795172808864cd006cd7a1905177c66a4eff2ddb9e81342d8cdac14cdee3645dd1d257b0337fb41b4a1f381de1b48fcea623bc2cc1fc83c28ada9bcaf464b011de95aee642df7142938002f78bb33dde9dd0d754a54995a9c6ac61d47781e4e9a0895bf5bdbc3eb46069d4a9eee54fbd9050429aafab420d37daddf27ccc449d6777fb94c14b897673883b4ae2de9df01cb758887ff99941a771800b56eb401b347e6bd4e550887605889fad7d5de5c182d66b2d0e06d59e7fa43c153f3ac0d26a1fb1cb25efda7b5e93ec95d3b651d8e18be26851dc49945030000000000000037b537de8b487620bcee13fd7dd4ba632fb6d923c83e690c459326c381f2d0a6b4f47740612faca80c8485ce58959fbd50faf53ad4be6b81cbf15e15f08a0923af8161ddccfb555f1249d9390000000000"], 0xfffffffffffffe66) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r1, 0x20, &(0x7f0000000000)={&(0x7f0000000300)=""/167, 0xa7, 0x0, &(0x7f00000003c0)=""/4096, 0x1000}}, 0x10) (async) accept4$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000013c0)=0x14, 0x1c00) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0xfffffffffffffe66) (async) 17:41:07 executing program 2: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000000), &(0x7f0000000080)}) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x210, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80000}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, r2, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x4000800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x400, 0x70bd2b, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000c001}, 0x20040854) 17:41:07 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) 17:41:07 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b202380"], 0x47) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 17:41:07 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vlan1\x00', 0x0}) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x5c, 0x0, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfffffff9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x40}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r1, 0x20, &(0x7f0000000000)={&(0x7f0000000300)=""/167, 0xa7, 0x0, &(0x7f00000003c0)=""/4096, 0x1000}}, 0x10) (async) accept4$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000013c0)=0x14, 0x1c00) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0xfffffffffffffe66) 17:41:07 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) 17:41:07 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) 17:41:07 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7374616355202380"], 0x47) 17:41:07 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vlan1\x00', 0x0}) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x5c, 0x0, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfffffff9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x40}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r2, &(0x7f0000000040)={0x11, 0xd, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, 0x0, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x20}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xcb}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xca}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xbc5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x80000000}]}, 0x64}, 0x1, 0x0, 0x0, 0x44}, 0x4084) 17:41:07 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:41:07 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563209250b288c92fb513e5f82358a08af71a8fc8a23a433665ea1200000000000e00000000ca757597a33828bac818315cc4cc7cb2cee5c42da288fa0000000000"], 0x44) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x401, 0xce, "9b6816bf4f439c5e99f0dd23e0bf73bd2ddbca4ba9b348bc667d47996e527df21b2a48427019d1887b384cc31e50bab008e7c8ebc03b2abbc3304f9ebbc222f1caa895389fa94d1628803935815acc8927391055c27f94d3352335cc72f3f48bf93ac18fc14dd83e3c5074b169de85e43a6b0f3de41500d385dad7137d13cf320ca0c92733a1653b88ab5df5b34e0a9aa182c20a39a3486c70f9c31af0470358fbf46353c31fb1b7c988ce2da466362fcf4112f10a0fd8781bda20caf859446cabdabb4d78df89772d0fa7d0c686"}) 17:41:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r2, &(0x7f0000000040)={0x11, 0xd, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, 0x0, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x20}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xcb}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xca}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xbc5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x80000000}]}, 0x64}, 0x1, 0x0, 0x0, 0x44}, 0x4084) 17:41:07 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vlan1\x00', 0x0}) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x5c, 0x0, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfffffff9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x40}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) (async) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:07 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563209250b288c92fb513e5f82358a08af71a8fc8a23a433665ea1200000000000e00000000ca757597a33828bac818315cc4cc7cb2cee5c42da288fa0000000000"], 0x44) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x401, 0xce, "9b6816bf4f439c5e99f0dd23e0bf73bd2ddbca4ba9b348bc667d47996e527df21b2a48427019d1887b384cc31e50bab008e7c8ebc03b2abbc3304f9ebbc222f1caa895389fa94d1628803935815acc8927391055c27f94d3352335cc72f3f48bf93ac18fc14dd83e3c5074b169de85e43a6b0f3de41500d385dad7137d13cf320ca0c92733a1653b88ab5df5b34e0a9aa182c20a39a3486c70f9c31af0470358fbf46353c31fb1b7c988ce2da466362fcf4112f10a0fd8781bda20caf859446cabdabb4d78df89772d0fa7d0c686"}) 17:41:07 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:41:07 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea760dc52f0df1663fe9fc4f6"], 0x97) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) sendmsg$nl_crypto(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=@upd={0x110, 0x12, 0x8, 0x70bd29, 0x25dfdbfb, {{'sha224\x00'}, '\x00', '\x00', 0x2000, 0x2200}, [{0x8}, {0x8, 0x1, 0x5}, {0x8, 0x1, 0xe86}, {0x8, 0x1, 0x3}, {0x8, 0x1, 0x309}, {0x8, 0x1, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x24000040}, 0x40804) 17:41:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r2, &(0x7f0000000040)={0x11, 0xd, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, 0x0, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x20}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xcb}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xca}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xbc5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x80000000}]}, 0x64}, 0x1, 0x0, 0x0, 0x44}, 0x4084) 17:41:07 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) (fail_nth: 1) 17:41:07 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 17:41:07 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea760dc52f0df1663fe9fc4f6"], 0x97) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) sendmsg$nl_crypto(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=@upd={0x110, 0x12, 0x8, 0x70bd29, 0x25dfdbfb, {{'sha224\x00'}, '\x00', '\x00', 0x2000, 0x2200}, [{0x8}, {0x8, 0x1, 0x5}, {0x8, 0x1, 0xe86}, {0x8, 0x1, 0x3}, {0x8, 0x1, 0x309}, {0x8, 0x1, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x24000040}, 0x40804) 17:41:07 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665eabec9fb8017720e00000000ca757597438a7cb2cee5c42da288fa"], 0xfffffffffffffe66) 17:41:07 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 17:41:07 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea760dc52f0df1663fe9fc4f6"], 0x97) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) sendmsg$nl_crypto(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=@upd={0x110, 0x12, 0x8, 0x70bd29, 0x25dfdbfb, {{'sha224\x00'}, '\x00', '\x00', 0x2000, 0x2200}, [{0x8}, {0x8, 0x1, 0x5}, {0x8, 0x1, 0xe86}, {0x8, 0x1, 0x3}, {0x8, 0x1, 0x309}, {0x8, 0x1, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x24000040}, 0x40804) 17:41:07 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) (async) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665eabec9fb8017720e00000000ca757597438a7cb2cee5c42da288fa"], 0xfffffffffffffe66) 17:41:07 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 17:41:07 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000600)={'exec ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0xfffffffffffffd9c) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0xfffffffffffffd98}}, 0x8000005) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000200)={0x0, 0xdf, 0x4, 0x1}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), r1) r3 = syz_open_dev$media(&(0x7f0000000080), 0x100000000, 0x80000) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) 17:41:07 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) (async) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665eabec9fb8017720e00000000ca757597438a7cb2cee5c42da288fa"], 0xfffffffffffffe66) 17:41:07 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000600)={'exec ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0xfffffffffffffd9c) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0xfffffffffffffd98}}, 0x8000005) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000200)={0x0, 0xdf, 0x4, 0x1}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), r1) r3 = syz_open_dev$media(&(0x7f0000000080), 0x100000000, 0x80000) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000600)={'exec ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0xfffffffffffffd9c) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0xfffffffffffffd98}}, 0x8000005) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000200)={0x0, 0xdf, 0x4, 0x1}) (async) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), r1) (async) syz_open_dev$media(&(0x7f0000000080), 0x100000000, 0x80000) (async) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) (async) 17:41:07 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 17:41:07 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000600)={'exec ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0xfffffffffffffd9c) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0xfffffffffffffd98}}, 0x8000005) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000200)={0x0, 0xdf, 0x4, 0x1}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), r1) r3 = syz_open_dev$media(&(0x7f0000000080), 0x100000000, 0x80000) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000600)={'exec ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0xfffffffffffffd9c) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0xfffffffffffffd98}}, 0x8000005) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000200)={0x0, 0xdf, 0x4, 0x1}) (async) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), r1) (async) syz_open_dev$media(&(0x7f0000000080), 0x100000000, 0x80000) (async) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) (async) 17:41:07 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$int_out(r0, 0x1, 0x0) 17:41:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = dup2(0xffffffffffffffff, r0) fsync(r0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000180)={&(0x7f0000000100)=""/119, 0x77, 0x7, 0x4}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r2, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x24}}, 0x0) connect$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0x2, @dev={0xfe, 0x80, '\x00', 0x34}, 0x84}}, 0x24) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0xd, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) connect$packet(r3, &(0x7f00000001c0)={0x11, 0x11, r5, 0x1, 0x3, 0x6, @broadcast}, 0x14) 17:41:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = dup2(0xffffffffffffffff, r0) fsync(r0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000180)={&(0x7f0000000100)=""/119, 0x77, 0x7, 0x4}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r2, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x24}}, 0x0) connect$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0x2, @dev={0xfe, 0x80, '\x00', 0x34}, 0x84}}, 0x24) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0xd, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) connect$packet(r3, &(0x7f00000001c0)={0x11, 0x11, r5, 0x1, 0x3, 0x6, @broadcast}, 0x14) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) dup2(0xffffffffffffffff, r0) (async) fsync(r0) (async) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000180)={&(0x7f0000000100)=""/119, 0x77, 0x7, 0x4}) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) sendmsg$BATADV_CMD_GET_NEIGHBORS(r2, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x24}}, 0x0) (async) connect$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0x2, @dev={0xfe, 0x80, '\x00', 0x34}, 0x84}}, 0x24) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) (async) socket$packet(0x11, 0x3, 0x300) (async) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) (async) bind$packet(r4, &(0x7f0000000040)={0x11, 0xd, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) (async) connect$packet(r3, &(0x7f00000001c0)={0x11, 0x11, r5, 0x1, 0x3, 0x6, @broadcast}, 0x14) (async) 17:41:07 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:07 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$int_out(r0, 0x1, 0x0) 17:41:07 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$int_out(r0, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) (async) ioctl$int_out(r0, 0x1, 0x0) (async) 17:41:07 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = dup2(0xffffffffffffffff, r0) fsync(r0) (async) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000180)={&(0x7f0000000100)=""/119, 0x77, 0x7, 0x4}) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r2, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x24}}, 0x0) (async) connect$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0x2, @dev={0xfe, 0x80, '\x00', 0x34}, 0x84}}, 0x24) (async, rerun: 32) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (async, rerun: 32) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0xd, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) connect$packet(r3, &(0x7f00000001c0)={0x11, 0x11, r5, 0x1, 0x3, 0x6, @broadcast}, 0x14) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e24, @multicast1}, 0x10) bind$rds(r1, &(0x7f0000000000)={0x2, 0x4e21, @multicast2}, 0x10) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca7575970300000000000000e3cc7cb2cee5c42da288fa"], 0xfffffffffffffe66) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e24, @multicast1}, 0x10) (async, rerun: 32) bind$rds(r1, &(0x7f0000000000)={0x2, 0x4e21, @multicast2}, 0x10) (rerun: 32) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca7575970300000000000000e3cc7cb2cee5c42da288fa"], 0xfffffffffffffe66) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e24, @multicast1}, 0x10) (async) bind$rds(r1, &(0x7f0000000000)={0x2, 0x4e21, @multicast2}, 0x10) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca7575970300000000000000e3cc7cb2cee5c42da288fa"], 0xfffffffffffffe66) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca7575970300000000000000e3cc7cb2cee5c42da288fa"], 0xfffffffffffffe66) (async) 17:41:08 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$int_out(r0, 0x5462, 0x0) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:08 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$int_out(r0, 0x5462, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) (async) ioctl$int_out(r0, 0x5462, 0x0) (async) 17:41:08 executing program 4: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x24, r0, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x8040}, 0x8001) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000240), 0xffffffffffffffff) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b359250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea5288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fabe829856bbe6faa0971935c8cc5cb42648c713664c4006acd6857c24b69ebc87a675c8f43526dc4714f8f986ec596be9ef9654bd02ff8a44c173bfbf1013046dd9fd10e6b1bea343d7dee232583782516cbf45366b14fd6096ef1402c8a0ccfc28974b755de0"], 0xfffffffffffffe66) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r2, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x44000) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f00000002c0)={{0x2, 0x168}, 0x100, './file0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x20000000, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14, 0x80800) r5 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r5, 0x942e, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000000)={0x0, 0xff}, 0x2) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x2180, 0x0) sendto$packet(r6, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) bind$packet(r6, &(0x7f00000000c0)={0x11, 0xf5, r7, 0x1, 0x8, 0x6, @random="28b530edcdd5"}, 0x14) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:08 executing program 4: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x24, r0, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x8040}, 0x8001) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000240), 0xffffffffffffffff) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b359250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea5288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fabe829856bbe6faa0971935c8cc5cb42648c713664c4006acd6857c24b69ebc87a675c8f43526dc4714f8f986ec596be9ef9654bd02ff8a44c173bfbf1013046dd9fd10e6b1bea343d7dee232583782516cbf45366b14fd6096ef1402c8a0ccfc28974b755de0"], 0xfffffffffffffe66) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r2, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x44000) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x24, r0, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x8040}, 0x8001) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)) (async) syz_genetlink_get_family_id$fou(&(0x7f0000000240), 0xffffffffffffffff) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b359250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea5288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fabe829856bbe6faa0971935c8cc5cb42648c713664c4006acd6857c24b69ebc87a675c8f43526dc4714f8f986ec596be9ef9654bd02ff8a44c173bfbf1013046dd9fd10e6b1bea343d7dee232583782516cbf45366b14fd6096ef1402c8a0ccfc28974b755de0"], 0xfffffffffffffe66) (async) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r2, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x44000) (async) 17:41:08 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$int_out(r0, 0x5462, 0x0) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f00000002c0)={{0x2, 0x168}, 0x100, './file0\x00'}) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) (async, rerun: 32) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) (async) sendto$packet(r4, 0x0, 0x0, 0x20000000, 0x0, 0x0) (async) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14, 0x80800) (async) r5 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r5, 0x942e, 0x0) (async) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000000)={0x0, 0xff}, 0x2) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x2180, 0x0) sendto$packet(r6, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) bind$packet(r6, &(0x7f00000000c0)={0x11, 0xf5, r7, 0x1, 0x8, 0x6, @random="28b530edcdd5"}, 0x14) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, &(0x7f0000000080)=[0x4, 0x4], 0x2) ioctl$int_out(r0, 0x1, 0x0) 17:41:08 executing program 4: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x24, r0, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x8040}, 0x8001) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)) (rerun: 32) syz_genetlink_get_family_id$fou(&(0x7f0000000240), 0xffffffffffffffff) (async) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b359250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea5288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fabe829856bbe6faa0971935c8cc5cb42648c713664c4006acd6857c24b69ebc87a675c8f43526dc4714f8f986ec596be9ef9654bd02ff8a44c173bfbf1013046dd9fd10e6b1bea343d7dee232583782516cbf45366b14fd6096ef1402c8a0ccfc28974b755de0"], 0xfffffffffffffe66) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r2, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x44000) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, &(0x7f0000000080)=[0x4, 0x4], 0x2) ioctl$int_out(r0, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, &(0x7f0000000080)=[0x4, 0x4], 0x2) (async) ioctl$int_out(r0, 0x1, 0x0) (async) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f00000002c0)={{0x2, 0x168}, 0x100, './file0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x20000000, 0x0, 0x0) (async) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14, 0x80800) r5 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r5, 0x942e, 0x0) (async) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000000)={0x0, 0xff}, 0x2) (async) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x2180, 0x0) sendto$packet(r6, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) bind$packet(r6, &(0x7f00000000c0)={0x11, 0xf5, r7, 0x1, 0x8, 0x6, @random="28b530edcdd5"}, 0x14) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:08 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2dee5c42da288fa"], 0xfffffffffffffe66) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, &(0x7f0000000080)=[0x4, 0x4], 0x2) (async) ioctl$int_out(r0, 0x1, 0x0) 17:41:08 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2dee5c42da288fa"], 0xfffffffffffffe66) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2dee5c42da288fa"], 0xfffffffffffffe66) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2dee5c42da288fa"], 0xfffffffffffffe66) (async) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) connect$rds(r1, &(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000000)={{0x3, 0x1}, 0x42}, 0x10) 17:41:08 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) connect$rds(r1, &(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000000)={{0x3, 0x1}, 0x42}, 0x10) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$int_out(r0, 0x1, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) connect$rds(r1, &(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) (async) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000000)={{0x3, 0x1}, 0x42}, 0x10) (async) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x97) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00'}) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xfffffffffffffe66) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (rerun: 32) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x97) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00'}) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) (async, rerun: 64) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (rerun: 64) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) connect$rds(r1, &(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000000)={{0x3, 0x1}, 0x42}, 0x10) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xfffffffffffffe66) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xfffffffffffffe66) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x97) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00'}) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x40600, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="737461636b209250b288c92fef13e5f823587031f71a8fc8a23a438017720e000100fc00ca7575978b3c95ffc818315ce3cc7cb2cee5c42da288fa06e026a5d7de53495178ba02792c12dccffa227bd8b3cbce21617e4a1d31f4385489ca358a8efc3e5279e78473c13893c70362f8bc1e8f39c3dbebaae862ced82267852bb340a9c1fd008d403937a9dc0ba34373f58ac4d47dc83399e59a3655e94a9ca175a03101d57b8c3e660179a200000000000000000000000000b9656e9e627ee4813c667db0630f6352ed192c172bb1624dd85aa1b8ca3fabb83a78884e2e7aab0bd53067a48fd170381232f6def3b88ca334603c3d00ccf93ae4fea79a4733c2b43829c11f4bcf7cf7799c17eb697c7052f8a045479816306a9f0c550e2764baf5844161dd4d1eb590cdc3dc62d7272ce069d598477620845add3b4fc26a469652b05d76f2e48af88c2f4d18c54c169235ec0b0e953b4d20d8de7116f17297790bcd4e44aa9d527d135520f97d"], 0xfffffffffffffe66) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x40600, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="737461636b209250b288c92fef13e5f823587031f71a8fc8a23a438017720e000100fc00ca7575978b3c95ffc818315ce3cc7cb2cee5c42da288fa06e026a5d7de53495178ba02792c12dccffa227bd8b3cbce21617e4a1d31f4385489ca358a8efc3e5279e78473c13893c70362f8bc1e8f39c3dbebaae862ced82267852bb340a9c1fd008d403937a9dc0ba34373f58ac4d47dc83399e59a3655e94a9ca175a03101d57b8c3e660179a200000000000000000000000000b9656e9e627ee4813c667db0630f6352ed192c172bb1624dd85aa1b8ca3fabb83a78884e2e7aab0bd53067a48fd170381232f6def3b88ca334603c3d00ccf93ae4fea79a4733c2b43829c11f4bcf7cf7799c17eb697c7052f8a045479816306a9f0c550e2764baf5844161dd4d1eb590cdc3dc62d7272ce069d598477620845add3b4fc26a469652b05d76f2e48af88c2f4d18c54c169235ec0b0e953b4d20d8de7116f17297790bcd4e44aa9d527d135520f97d"], 0xfffffffffffffe66) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x40600, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0xfffffffffffffe66) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="737461636b209250b288c92fef13e5f823587031f71a8fc8a23a438017720e000100fc00ca7575978b3c95ffc818315ce3cc7cb2cee5c42da288fa06e026a5d7de53495178ba02792c12dccffa227bd8b3cbce21617e4a1d31f4385489ca358a8efc3e5279e78473c13893c70362f8bc1e8f39c3dbebaae862ced82267852bb340a9c1fd008d403937a9dc0ba34373f58ac4d47dc83399e59a3655e94a9ca175a03101d57b8c3e660179a200000000000000000000000000b9656e9e627ee4813c667db0630f6352ed192c172bb1624dd85aa1b8ca3fabb83a78884e2e7aab0bd53067a48fd170381232f6def3b88ca334603c3d00ccf93ae4fea79a4733c2b43829c11f4bcf7cf7799c17eb697c7052f8a045479816306a9f0c550e2764baf5844161dd4d1eb590cdc3dc62d7272ce069d598477620845add3b4fc26a469652b05d76f2e48af88c2f4d18c54c169235ec0b0e953b4d20d8de7116f17297790bcd4e44aa9d527d135520f97d"], 0xfffffffffffffe66) (async) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000000080)={&(0x7f0000000000)=""/55, 0x37, 0x0, 0x2}) 17:41:08 executing program 5: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)=@getstat={0xe0, 0x15, 0x100, 0x70bd27, 0x25dfdbff, {{'sha256-ssse3\x00'}, '\x00', '\x00', 0x2000, 0x400}}, 0xe0}}, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000000)=0x60) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000180)={0x0, 0xffffffff, 0x3ff, 0x1}) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:08 executing program 5: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)=@getstat={0xe0, 0x15, 0x100, 0x70bd27, 0x25dfdbff, {{'sha256-ssse3\x00'}, '\x00', '\x00', 0x2000, 0x400}}, 0xe0}}, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)=@getstat={0xe0, 0x15, 0x100, 0x70bd27, 0x25dfdbff, {{'sha256-ssse3\x00'}, '\x00', '\x00', 0x2000, 0x400}}, 0xe0}}, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) (async) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000000080)={&(0x7f0000000000)=""/55, 0x37, 0x0, 0x2}) 17:41:08 executing program 5: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)=@getstat={0xe0, 0x15, 0x100, 0x70bd27, 0x25dfdbff, {{'sha256-ssse3\x00'}, '\x00', '\x00', 0x2000, 0x400}}, 0xe0}}, 0x0) (async) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000000)=0x60) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000180)={0x0, 0xffffffff, 0x3ff, 0x1}) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000000080)={&(0x7f0000000000)=""/55, 0x37, 0x0, 0x2}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$int_out(r0, 0x1, 0x0) (async) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000000080)={&(0x7f0000000000)=""/55, 0x37, 0x0, 0x2}) (async) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000200)={0x0, 0x2, 0x0, [0xf8, 0x7fffffffffffffff, 0x8000, 0x8, 0x20], [0x8, 0x2cfe, 0xa51, 0x3, 0x0, 0x1, 0x6, 0x4, 0xffff, 0xfffffffffffffffa, 0xfffffffffffffff7, 0xffff, 0x8, 0x7, 0x2, 0x1, 0xfffffffffffffff9, 0xa, 0x8, 0x7, 0x3f, 0x7ff, 0x36f2, 0x3, 0x7ff, 0x1, 0x807e, 0x1, 0x4, 0xfffffffffffffffb, 0x6, 0x1, 0x4, 0x1, 0x1f, 0x7fffffffffffffff, 0xfffffffffffff369, 0x652943a80000000, 0x2ea8, 0x77, 0x8928, 0x8000000000000001, 0xe8a, 0x7b, 0x0, 0x401, 0x8, 0x0, 0xfffffffffffffffb, 0x4, 0x2f5, 0xaaa00000, 0x7270, 0x719b0da1, 0x8000000000000001, 0xd944, 0x3, 0x4, 0x8, 0x8000000000000000, 0x7, 0xb94e, 0x3, 0x0, 0x7, 0x3, 0x7, 0x7, 0x4, 0xff, 0x3, 0x1, 0x80000001, 0x2, 0x80, 0xfffffffffffffbff, 0x7, 0xffffffffffff86c0, 0x8000, 0x401, 0x7fffffffffffffff, 0x8b, 0x0, 0x2, 0x6, 0x0, 0x5, 0x81, 0xf81, 0x7fffffffffffffff, 0x6, 0x0, 0x3, 0x3, 0x100000000, 0x1, 0x8a8, 0x0, 0x9, 0x8, 0x7fffffffffffffff, 0xffff, 0x3, 0x7, 0x7, 0x9, 0x1ff, 0x7f, 0x80000001, 0x0, 0x6, 0xbdb, 0x2, 0x4, 0x401, 0x7, 0x0, 0x9, 0x9, 0x5, 0x81]}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000640)={0x0, 0x9, 0x8000000000000001}) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f0000000a40)={0x0, 0x5, {0x7, @struct={0x1, 0xfff}, r2, 0x7, 0x7, 0x1, 0x3, 0x800000, 0x40, @usage=0x5, 0x8, 0x400, [0x5, 0xa525, 0x1, 0x5, 0xffff, 0x8]}, {0x7, @usage=0x5, r3, 0x8000, 0x1, 0x9143, 0xfffffffffffff800, 0x7fffffffffffffff, 0x20, @struct={0xffffff64, 0x10000}, 0xfffffdd3, 0x8, [0x82, 0x7ff, 0x1, 0xe8, 0x8, 0x8]}, {0x43, @struct={0x7fffffff, 0x6}, 0x0, 0x6, 0xb3, 0xf000000000000000, 0x3, 0x8, 0x20, @usage=0x2, 0x2f0507bf, 0xfffffffd, [0x1, 0x12, 0x0, 0x7f1f, 0x3f, 0x8b0]}, {0x800, 0x0, 0x1}}) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000000)=0x60) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000180)={0x0, 0xffffffff, 0x3ff, 0x1}) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async, rerun: 64) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (rerun: 64) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000200)={0x0, 0x2, 0x0, [0xf8, 0x7fffffffffffffff, 0x8000, 0x8, 0x20], [0x8, 0x2cfe, 0xa51, 0x3, 0x0, 0x1, 0x6, 0x4, 0xffff, 0xfffffffffffffffa, 0xfffffffffffffff7, 0xffff, 0x8, 0x7, 0x2, 0x1, 0xfffffffffffffff9, 0xa, 0x8, 0x7, 0x3f, 0x7ff, 0x36f2, 0x3, 0x7ff, 0x1, 0x807e, 0x1, 0x4, 0xfffffffffffffffb, 0x6, 0x1, 0x4, 0x1, 0x1f, 0x7fffffffffffffff, 0xfffffffffffff369, 0x652943a80000000, 0x2ea8, 0x77, 0x8928, 0x8000000000000001, 0xe8a, 0x7b, 0x0, 0x401, 0x8, 0x0, 0xfffffffffffffffb, 0x4, 0x2f5, 0xaaa00000, 0x7270, 0x719b0da1, 0x8000000000000001, 0xd944, 0x3, 0x4, 0x8, 0x8000000000000000, 0x7, 0xb94e, 0x3, 0x0, 0x7, 0x3, 0x7, 0x7, 0x4, 0xff, 0x3, 0x1, 0x80000001, 0x2, 0x80, 0xfffffffffffffbff, 0x7, 0xffffffffffff86c0, 0x8000, 0x401, 0x7fffffffffffffff, 0x8b, 0x0, 0x2, 0x6, 0x0, 0x5, 0x81, 0xf81, 0x7fffffffffffffff, 0x6, 0x0, 0x3, 0x3, 0x100000000, 0x1, 0x8a8, 0x0, 0x9, 0x8, 0x7fffffffffffffff, 0xffff, 0x3, 0x7, 0x7, 0x9, 0x1ff, 0x7f, 0x80000001, 0x0, 0x6, 0xbdb, 0x2, 0x4, 0x401, 0x7, 0x0, 0x9, 0x9, 0x5, 0x81]}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000640)={0x0, 0x9, 0x8000000000000001}) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f0000000a40)={0x0, 0x5, {0x7, @struct={0x1, 0xfff}, r2, 0x7, 0x7, 0x1, 0x3, 0x800000, 0x40, @usage=0x5, 0x8, 0x400, [0x5, 0xa525, 0x1, 0x5, 0xffff, 0x8]}, {0x7, @usage=0x5, r3, 0x8000, 0x1, 0x9143, 0xfffffffffffff800, 0x7fffffffffffffff, 0x20, @struct={0xffffff64, 0x10000}, 0xfffffdd3, 0x8, [0x82, 0x7ff, 0x1, 0xe8, 0x8, 0x8]}, {0x43, @struct={0x7fffffff, 0x6}, 0x0, 0x6, 0xb3, 0xf000000000000000, 0x3, 0x8, 0x20, @usage=0x2, 0x2f0507bf, 0xfffffffd, [0x1, 0x12, 0x0, 0x7f1f, 0x3f, 0x8b0]}, {0x800, 0x0, 0x1}}) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_crypto(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@alg={0xf0, 0x10, 0x100, 0x70bd2b, 0x25dfdbfd, {{'tgr160\x00'}, '\x00', '\x00', 0x2000, 0x400}, [{0x8, 0x1, 0x68fa}, {0x8, 0x1, 0xfffff346}]}, 0xf0}, 0x1, 0x0, 0x0, 0x84}, 0x40) ioctl$int_out(r0, 0x1, 0x0) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x4) openat$userio(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$nl_crypto(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@alg={0xf0, 0x10, 0x100, 0x70bd2b, 0x25dfdbfd, {{'tgr160\x00'}, '\x00', '\x00', 0x2000, 0x400}, [{0x8, 0x1, 0x68fa}, {0x8, 0x1, 0xfffff346}]}, 0xf0}, 0x1, 0x0, 0x0, 0x84}, 0x40) (async) ioctl$int_out(r0, 0x1, 0x0) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$nl_crypto(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@alg={0xf0, 0x10, 0x100, 0x70bd2b, 0x25dfdbfd, {{'tgr160\x00'}, '\x00', '\x00', 0x2000, 0x400}, [{0x8, 0x1, 0x68fa}, {0x8, 0x1, 0xfffff346}]}, 0xf0}, 0x1, 0x0, 0x0, 0x84}, 0x40) (async) ioctl$int_out(r0, 0x1, 0x0) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x4) openat$userio(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x4) (async) openat$userio(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) (async) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000200)={0x0, 0x2, 0x0, [0xf8, 0x7fffffffffffffff, 0x8000, 0x8, 0x20], [0x8, 0x2cfe, 0xa51, 0x3, 0x0, 0x1, 0x6, 0x4, 0xffff, 0xfffffffffffffffa, 0xfffffffffffffff7, 0xffff, 0x8, 0x7, 0x2, 0x1, 0xfffffffffffffff9, 0xa, 0x8, 0x7, 0x3f, 0x7ff, 0x36f2, 0x3, 0x7ff, 0x1, 0x807e, 0x1, 0x4, 0xfffffffffffffffb, 0x6, 0x1, 0x4, 0x1, 0x1f, 0x7fffffffffffffff, 0xfffffffffffff369, 0x652943a80000000, 0x2ea8, 0x77, 0x8928, 0x8000000000000001, 0xe8a, 0x7b, 0x0, 0x401, 0x8, 0x0, 0xfffffffffffffffb, 0x4, 0x2f5, 0xaaa00000, 0x7270, 0x719b0da1, 0x8000000000000001, 0xd944, 0x3, 0x4, 0x8, 0x8000000000000000, 0x7, 0xb94e, 0x3, 0x0, 0x7, 0x3, 0x7, 0x7, 0x4, 0xff, 0x3, 0x1, 0x80000001, 0x2, 0x80, 0xfffffffffffffbff, 0x7, 0xffffffffffff86c0, 0x8000, 0x401, 0x7fffffffffffffff, 0x8b, 0x0, 0x2, 0x6, 0x0, 0x5, 0x81, 0xf81, 0x7fffffffffffffff, 0x6, 0x0, 0x3, 0x3, 0x100000000, 0x1, 0x8a8, 0x0, 0x9, 0x8, 0x7fffffffffffffff, 0xffff, 0x3, 0x7, 0x7, 0x9, 0x1ff, 0x7f, 0x80000001, 0x0, 0x6, 0xbdb, 0x2, 0x4, 0x401, 0x7, 0x0, 0x9, 0x9, 0x5, 0x81]}) (async) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000640)={0x0, 0x9, 0x8000000000000001}) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f0000000a40)={0x0, 0x5, {0x7, @struct={0x1, 0xfff}, r2, 0x7, 0x7, 0x1, 0x3, 0x800000, 0x40, @usage=0x5, 0x8, 0x400, [0x5, 0xa525, 0x1, 0x5, 0xffff, 0x8]}, {0x7, @usage=0x5, r3, 0x8000, 0x1, 0x9143, 0xfffffffffffff800, 0x7fffffffffffffff, 0x20, @struct={0xffffff64, 0x10000}, 0xfffffdd3, 0x8, [0x82, 0x7ff, 0x1, 0xe8, 0x8, 0x8]}, {0x43, @struct={0x7fffffff, 0x6}, 0x0, 0x6, 0xb3, 0xf000000000000000, 0x3, 0x8, 0x20, @usage=0x2, 0x2f0507bf, 0xfffffffd, [0x1, 0x12, 0x0, 0x7f1f, 0x3f, 0x8b0]}, {0x800, 0x0, 0x1}}) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x38, 0x3ed, 0x0, 0x70bd27, 0x25dfdbfd, "5cb62fa4821d3ee4cbb1d7f3fc93eb53a1d95a2f0283e81204d7954768ee4bba2ba711eaac9fb8", [""]}, 0x38}, 0x1, 0x0, 0x0, 0x20004c02}, 0x448c2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_ENTITIES(r1, 0xc1007c01, &(0x7f00000000c0)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x4008081, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000000)) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x4) (async) openat$userio(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x38, 0x3ed, 0x0, 0x70bd27, 0x25dfdbfd, "5cb62fa4821d3ee4cbb1d7f3fc93eb53a1d95a2f0283e81204d7954768ee4bba2ba711eaac9fb8", [""]}, 0x38}, 0x1, 0x0, 0x0, 0x20004c02}, 0x448c2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_ENTITIES(r1, 0xc1007c01, &(0x7f00000000c0)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x4008081, 0x0, 0x0) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000000)) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x38, 0x3ed, 0x0, 0x70bd27, 0x25dfdbfd, "5cb62fa4821d3ee4cbb1d7f3fc93eb53a1d95a2f0283e81204d7954768ee4bba2ba711eaac9fb8", [""]}, 0x38}, 0x1, 0x0, 0x0, 0x20004c02}, 0x448c2) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_ENTITIES(r1, 0xc1007c01, &(0x7f00000000c0)) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x4008081, 0x0, 0x0) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000000)) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r1, &(0x7f0000000080)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'stack ', '^]^}!\x00'}, 0xc) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x6, 0x4, 0x0, "28c304c3ba533f11d9edb23bfe60bfd56eb101554966af1c84ac59b55510fdeae398450017e926237d2d7634f6256c37d4311ae76be043cc1d2f6f82f67598", 0x39}, 0x60) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r1, &(0x7f0000000080)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x0, 0x300, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8001}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x80000}, 0x8040) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/293], 0x97) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'stack ', '^]^}!\x00'}, 0xc) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x6, 0x4, 0x0, "28c304c3ba533f11d9edb23bfe60bfd56eb101554966af1c84ac59b55510fdeae398450017e926237d2d7634f6256c37d4311ae76be043cc1d2f6f82f67598", 0x39}, 0x60) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="737c61236b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffec923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab251663fe9fc4f687e374314db64afd3848bec772587a7e9513dac8610e79d1fe98ca65675dd8d7f60d4876d4397a21dd80f38b0ad4e4e6025bc2c01edc83581b9439d706fe584a27857422f72c755a2009cb2706a37a00648e3f8537042b5a504de7f3c3096ff5bc11b697110494c65729845c2fa9456000aa9e9075017bba8ac4aecaab09efc775f45bff7a3387cb748f381cf09f00"/293], 0x97) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/293], 0x97) (async) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x0, 0x300, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8001}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x80000}, 0x8040) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'stack ', '^]^}!\x00'}, 0xc) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x6, 0x4, 0x0, "28c304c3ba533f11d9edb23bfe60bfd56eb101554966af1c84ac59b55510fdeae398450017e926237d2d7634f6256c37d4311ae76be043cc1d2f6f82f67598", 0x39}, 0x60) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/293], 0x97) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0xfffffffffffffe66) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x0, 0x300, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8001}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x80000}, 0x8040) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xfcad, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="08012dbd7000fedbdf25a97bbfd7b735dccaee587a6b930e0000000500300000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x24008814}, 0x4000000) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0xfffffffffffffe66) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xfcad, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="08012dbd7000fedbdf25a97bbfd7b735dccaee587a6b930e0000000500300000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x24008814}, 0x4000000) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000000000)) ioctl$int_out(r0, 0x1, 0x0) 17:41:08 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000000000)) ioctl$int_out(r0, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000000000)) (async) ioctl$int_out(r0, 0x1, 0x0) (async) 17:41:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async, rerun: 64) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (rerun: 64) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) (rerun: 64) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xfcad, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="08012dbd7000fedbdf25a97bbfd7b735dccaee587a6b930e0000000500300000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x24008814}, 0x4000000) 17:41:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0xfffffffffffffe66) 17:41:09 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000001c0)={0x0, 0x3ff, 0x4}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000700)=ANY=[], 0xfffffffffffffe66) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000000000)) ioctl$int_out(r0, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000000000)) (async) ioctl$int_out(r0, 0x1, 0x0) (async) 17:41:09 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000001c0)={0x0, 0x3ff, 0x4}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000700)=ANY=[], 0xfffffffffffffe66) 17:41:09 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r1, 0x1, 0x0) 17:41:09 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000001c0)={0x0, 0x3ff, 0x4}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000700)=ANY=[], 0xfffffffffffffe66) 17:41:09 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0], 0xfffffffffffffe66) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0xfffffffffffffe9d, r0, {0x6}}, './file0\x00'}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x24, 0x0, 0x10, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x20}]}, 0x24}, 0x1, 0x0, 0x0, 0x810}, 0x4000) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) close(r1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43aaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbff5ca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fc4f6282196ae479977514be2ece440ab4bbbd381f42e2ea5cadb29f7f3dd"], 0x97) 17:41:09 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r1, 0x1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$int_out(r1, 0x1, 0x0) (async) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0xfffffffffffffe9d, r0, {0x6}}, './file0\x00'}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x24, 0x0, 0x10, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x20}]}, 0x24}, 0x1, 0x0, 0x0, 0x810}, 0x4000) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) close(r1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43aaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbff5ca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fc4f6282196ae479977514be2ece440ab4bbbd381f42e2ea5cadb29f7f3dd"], 0x97) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0xfffffffffffffe9d, r0, {0x6}}, './file0\x00'}) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) (async) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x24, 0x0, 0x10, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x20}]}, 0x24}, 0x1, 0x0, 0x0, 0x810}, 0x4000) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) close(r1) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43aaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbff5ca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fc4f6282196ae479977514be2ece440ab4bbbd381f42e2ea5cadb29f7f3dd"], 0x97) (async) 17:41:09 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0], 0xfffffffffffffe66) 17:41:09 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r1, 0x1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$int_out(r1, 0x1, 0x0) (async) 17:41:09 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0], 0xfffffffffffffe66) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0], 0xfffffffffffffe66) (async) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0xfffffffffffffe9d, r0, {0x6}}, './file0\x00'}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x24, 0x0, 0x10, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x20}]}, 0x24}, 0x1, 0x0, 0x0, 0x810}, 0x4000) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) close(r1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43aaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbff5ca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fc4f6282196ae479977514be2ece440ab4bbbd381f42e2ea5cadb29f7f3dd"], 0x97) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000080)=ANY=[@ANYBLOB="0000007c8b295cb1804f5000", @ANYRES32=r0, @ANYBLOB="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"]) 17:41:09 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="65788818ae51ba84cfd9e7"], 0xb) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', 'stack '}, 0xc) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000080)=ANY=[@ANYBLOB="0000007c8b295cb1804f5000", @ANYRES32=r0, @ANYBLOB="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"]) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$int_out(r0, 0x1, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000080)=ANY=[@ANYBLOB="0000007c8b295cb1804f5000", @ANYRES32=r0, @ANYBLOB="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"]) (async) 17:41:09 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="65788818ae51ba84cfd9e7"], 0xb) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', 'stack '}, 0xc) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:09 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="65788818ae51ba84cfd9e7"], 0xb) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="65788818ae51ba84cfd9e7"], 0xb) (async) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000080)=ANY=[@ANYBLOB="0000007c8b295cb1804f5000", @ANYRES32=r0, @ANYBLOB="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"]) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$int_out(r0, 0x1, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000080)=ANY=[@ANYBLOB="0000007c8b295cb1804f5000", @ANYRES32=r0, @ANYBLOB="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"]) (async) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', 'stack '}, 0xc) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:09 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000200)=""/254, 0xfe) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000200)=""/254, 0xfe) 17:41:09 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) 17:41:09 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000200)=""/254, 0xfe) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$int_out(r0, 0x1, 0x0) (async) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) setitimer(0x1, &(0x7f00000000c0)={{}, {0x0, 0x2710}}, &(0x7f0000000100)) socketpair(0x15, 0x3, 0x80000001, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r1) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:09 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = syz_open_dev$media(&(0x7f0000000000), 0x6, 0x10000) ioctl$MEDIA_IOC_SETUP_LINK(r1, 0xc0347c03, &(0x7f0000000100)={{0x80000000, 0x0, 0x2, [0x5, 0x9]}, {0x80000000, 0x0, 0x5, [0xf1af, 0xfff]}, 0x0, [0x1ff, 0x10000]}) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$int_out(r0, 0x1, 0x0) (async) 17:41:09 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = syz_open_dev$media(&(0x7f0000000000), 0x6, 0x10000) ioctl$MEDIA_IOC_SETUP_LINK(r1, 0xc0347c03, &(0x7f0000000100)={{0x80000000, 0x0, 0x2, [0x5, 0x9]}, {0x80000000, 0x0, 0x5, [0xf1af, 0xfff]}, 0x0, [0x1ff, 0x10000]}) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 32) setitimer(0x1, &(0x7f00000000c0)={{}, {0x0, 0x2710}}, &(0x7f0000000100)) (async, rerun: 32) socketpair(0x15, 0x3, 0x80000001, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r1) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:09 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = syz_open_dev$media(&(0x7f0000000000), 0x6, 0x10000) ioctl$MEDIA_IOC_SETUP_LINK(r1, 0xc0347c03, &(0x7f0000000100)={{0x80000000, 0x0, 0x2, [0x5, 0x9]}, {0x80000000, 0x0, 0x5, [0xf1af, 0xfff]}, 0x0, [0x1ff, 0x10000]}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (async) syz_open_dev$media(&(0x7f0000000000), 0x6, 0x10000) (async) ioctl$MEDIA_IOC_SETUP_LINK(r1, 0xc0347c03, &(0x7f0000000100)={{0x80000000, 0x0, 0x2, [0x5, 0x9]}, {0x80000000, 0x0, 0x5, [0xf1af, 0xfff]}, 0x0, [0x1ff, 0x10000]}) (async) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f0000000080)={{0x10001, 0x2e6}, 0x100, './file0\x00'}) ioctl$int_out(r0, 0x1, 0x0) 17:41:09 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x40400, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0x45) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f0000000080)={{0x10001, 0x2e6}, 0x100, './file0\x00'}) (async, rerun: 64) ioctl$int_out(r0, 0x1, 0x0) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) setitimer(0x1, &(0x7f00000000c0)={{}, {0x0, 0x2710}}, &(0x7f0000000100)) socketpair(0x15, 0x3, 0x80000001, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r1) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:09 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x40400, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0x45) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x40400, 0x0) (async) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0x45) (async) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)="61eeaca7abf8e85c625496d3d0fa4b0d114b3c337f74f7c79e1a06827396570596da7ac24337f8", 0x27}, {&(0x7f00000000c0)="cdf3ab751fd0c82b415663219f719ab86f7429efdb572132b880ee0a4495f875928de2f12401d1c17d9fa16f3a9b1121a96b22f47c", 0x35}, {&(0x7f0000000100)}, {&(0x7f0000000b00)="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", 0x1000}, {&(0x7f0000000200)="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", 0xfb}, {&(0x7f0000000640)="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", 0x129}, {&(0x7f0000000400)="5384abac68c0f5d54f15c84d4cb67f1bb59dcd5bfbc2034421c537f51073933dd27c2e357d618dc96398fbd4dddf164d83cc5b458a3861b2cc9db282749f9d819baee568df4c6b7744130e4928b3ff87c5a686a990d33e74e2456085a31d3d6ff4eae1a7c5225ca090c1ac5e370554286074c3b6863ca792520a4f3474721cf06030127ca3deb354d5b3d70214f8bc21c5f44a8dec83a77218e33fadae037ac4d8b1", 0xa2}, {&(0x7f00000004c0)="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", 0xfd}], 0x8, 0xdb4, 0x9) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="3a6d01007cab32d41ff63f7855815c19f17443bcb8dd240c416f134bb7cc73ff939b7a8bedd9dc84ef2539046a84976d4fa0335e9bfb50fa45b6324b8ab21f5d37971fe356740c88c45227f87e99638c3818170b52aebb80ae7569eef989f6d1afaa815f1a308ed66b4d862cbfecab8c28840f788b437a2a8220d02c0c741bbedc41e887ae880be63c"]) 17:41:09 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x40400, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0x45) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f0000000080)={{0x10001, 0x2e6}, 0x100, './file0\x00'}) ioctl$int_out(r0, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f0000000080)={{0x10001, 0x2e6}, 0x100, './file0\x00'}) (async) ioctl$int_out(r0, 0x1, 0x0) (async) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)="61eeaca7abf8e85c625496d3d0fa4b0d114b3c337f74f7c79e1a06827396570596da7ac24337f8", 0x27}, {&(0x7f00000000c0)="cdf3ab751fd0c82b415663219f719ab86f7429efdb572132b880ee0a4495f875928de2f12401d1c17d9fa16f3a9b1121a96b22f47c", 0x35}, {&(0x7f0000000100)}, {&(0x7f0000000b00)="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", 0x1000}, {&(0x7f0000000200)="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", 0xfb}, {&(0x7f0000000640)="d341bbaf8f89b94e6c5fad58c0cd2459f7f77a220dfcadec4d83943065ee5690754d317cc96e90ffd91b51e710f9fc6fa56d910ce7582acb31a335874949dc177455b17d79a8ec47cffc38ea76453d032fed2c56a29ab3fa1d7094c94f9a653248f7fc8394bb2428465b6c93c9692adb11a0190bc2995f6f4a0564b7b2ea1a670cf6902985743cf1f76a9c06e723de81cc4c887fb8d96223bf4c82cc7fbe96f274afee5bf6a411f3908c688218947719495348574272fb23634a1a6d94970c1378a55dad238c8dbe792d809a084ec5db2678b00910036a2e167eff1c43d3ecf069ba6470c251be24966b1e435a93177b232f2056e961b028dd9e65549e45b44bd769b232be7cccf25184e793f9d2cd14928534c3280612e84ed40c2f5a3939818ae73fae091dea7565", 0x129}, {&(0x7f0000000400)="5384abac68c0f5d54f15c84d4cb67f1bb59dcd5bfbc2034421c537f51073933dd27c2e357d618dc96398fbd4dddf164d83cc5b458a3861b2cc9db282749f9d819baee568df4c6b7744130e4928b3ff87c5a686a990d33e74e2456085a31d3d6ff4eae1a7c5225ca090c1ac5e370554286074c3b6863ca792520a4f3474721cf06030127ca3deb354d5b3d70214f8bc21c5f44a8dec83a77218e33fadae037ac4d8b1", 0xa2}, {&(0x7f00000004c0)="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", 0xfd}], 0x8, 0xdb4, 0x9) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="3a6d01007cab32d41ff63f7855815c19f17443bcb8dd240c416f134bb7cc73ff939b7a8bedd9dc84ef2539046a84976d4fa0335e9bfb50fa45b6324b8ab21f5d37971fe356740c88c45227f87e99638c3818170b52aebb80ae7569eef989f6d1afaa815f1a308ed66b4d862cbfecab8c28840f788b437a2a8220d02c0c741bbedc41e887ae880be63c"]) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) pwritev(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)="61eeaca7abf8e85c625496d3d0fa4b0d114b3c337f74f7c79e1a06827396570596da7ac24337f8", 0x27}, {&(0x7f00000000c0)="cdf3ab751fd0c82b415663219f719ab86f7429efdb572132b880ee0a4495f875928de2f12401d1c17d9fa16f3a9b1121a96b22f47c", 0x35}, {&(0x7f0000000100)}, {&(0x7f0000000b00)="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", 0x1000}, {&(0x7f0000000200)="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", 0xfb}, {&(0x7f0000000640)="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", 0x129}, {&(0x7f0000000400)="5384abac68c0f5d54f15c84d4cb67f1bb59dcd5bfbc2034421c537f51073933dd27c2e357d618dc96398fbd4dddf164d83cc5b458a3861b2cc9db282749f9d819baee568df4c6b7744130e4928b3ff87c5a686a990d33e74e2456085a31d3d6ff4eae1a7c5225ca090c1ac5e370554286074c3b6863ca792520a4f3474721cf06030127ca3deb354d5b3d70214f8bc21c5f44a8dec83a77218e33fadae037ac4d8b1", 0xa2}, {&(0x7f00000004c0)="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", 0xfd}], 0x8, 0xdb4, 0x9) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="3a6d01007cab32d41ff63f7855815c19f17443bcb8dd240c416f134bb7cc73ff939b7a8bedd9dc84ef2539046a84976d4fa0335e9bfb50fa45b6324b8ab21f5d37971fe356740c88c45227f87e99638c3818170b52aebb80ae7569eef989f6d1afaa815f1a308ed66b4d862cbfecab8c28840f788b437a2a8220d02c0c741bbedc41e887ae880be63c"]) (async) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)="61eeaca7abf8e85c625496d3d0fa4b0d114b3c337f74f7c79e1a06827396570596da7ac24337f8", 0x27}, {&(0x7f00000000c0)="cdf3ab751fd0c82b415663219f719ab86f7429efdb572132b880ee0a4495f875928de2f12401d1c17d9fa16f3a9b1121a96b22f47c", 0x35}, {&(0x7f0000000100)}, {&(0x7f0000000b00)="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", 0x1000}, {&(0x7f0000000200)="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", 0xfb}, {&(0x7f0000000640)="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", 0x129}, {&(0x7f0000000400)="5384abac68c0f5d54f15c84d4cb67f1bb59dcd5bfbc2034421c537f51073933dd27c2e357d618dc96398fbd4dddf164d83cc5b458a3861b2cc9db282749f9d819baee568df4c6b7744130e4928b3ff87c5a686a990d33e74e2456085a31d3d6ff4eae1a7c5225ca090c1ac5e370554286074c3b6863ca792520a4f3474721cf06030127ca3deb354d5b3d70214f8bc21c5f44a8dec83a77218e33fadae037ac4d8b1", 0xa2}, {&(0x7f00000004c0)="77ed21a1f012034a4c5de7bb89a21451450ebe44d816384e9c210b701dd13d1f00332997bf1675e281f5c0d5f519e5a420bb353ae711ce283d8c26660864e9b67393aa1c437989de8a06cba3864f676b5100fabdba3acc2cf20bc94838d3e3d70f152cc203eb92fe0a3d8a7d29df0d28ea984d28850720e08e6ad75a5fb2543b3709d19931d0c19579d9f1d4da7b3ea354cda1e677edfe2e60af03551dea3e8e5d1ebd468f2f41bf59fd759a0aca8a94ddcf476e49d22dd65957eaf7f62c357a5442c701220698bf71e9047f3fec8c6bc09338b4d6a38004e20b090f08fbf35d39deee76019ad9eec2df7c9db8f0e0a0fcd6abcef8c0d4af014540b6f5", 0xfd}], 0x8, 0xdb4, 0x9) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="3a6d01007cab32d41ff63f7855815c19f17443bcb8dd240c416f134bb7cc73ff939b7a8bedd9dc84ef2539046a84976d4fa0335e9bfb50fa45b6324b8ab21f5d37971fe356740c88c45227f87e99638c3818170b52aebb80ae7569eef989f6d1afaa815f1a308ed66b4d862cbfecab8c28840f788b437a2a8220d02c0c741bbedc41e887ae880be63c"]) 17:41:09 executing program 4: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT=r0], 0x45) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000180)={0x0, 0xfffffffffffffffd, 0x0, 0x1}) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000080)={0x0, 0x8000000000000001, 0x1, [0x5, 0x488a, 0x8, 0x80000000, 0x7fffffffffffffff], [0x3bfd0000, 0x4, 0x0, 0x1, 0x8, 0x9a1, 0x6, 0x6, 0x100000000, 0x401, 0x1, 0x0, 0x0, 0x1, 0x1, 0x80000000, 0x0, 0x20, 0x7, 0x4, 0x1, 0x1, 0xaac, 0x401, 0x6, 0x8, 0x3, 0x8, 0x7, 0x8, 0x2, 0x81, 0x3, 0x1, 0x4, 0xfffffffffffffffc, 0xffffffffffffffff, 0x5, 0xfa, 0xf1, 0x2, 0x7, 0x7, 0x28, 0x21d, 0x1, 0x100000000, 0x100000000, 0xdba, 0x9, 0xdfc, 0x7f, 0x40, 0xfffffffffffeffff, 0x98, 0xffff, 0x40, 0x8000, 0x4, 0x7, 0x80000000, 0x1ff, 0x0, 0x6, 0x1, 0x10000, 0x0, 0x20, 0x0, 0x1, 0x0, 0x2, 0x6, 0x401, 0x100, 0xadf, 0x3, 0x2, 0x10001, 0x0, 0x1000, 0x3f, 0x0, 0x0, 0x8, 0x1, 0x3f, 0x4, 0xffffffffffffffff, 0x1, 0xaeb4, 0x10, 0x400, 0x7, 0x7ff, 0x1000, 0x7, 0xdd5, 0x96, 0x8, 0x3, 0x400, 0x81, 0x100000001, 0x5, 0x9, 0x7fffffff, 0xb6, 0x400, 0x9, 0x4, 0x9, 0x80, 0x6da, 0x0, 0xc6, 0x400, 0xff, 0x9, 0x2, 0x400]}) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000004c0)={r1, 0x200, 0x1, [0x800, 0x4, 0x0, 0x9, 0x8000000000000000], [0x80000001, 0x4, 0x4, 0x7, 0x8, 0x7, 0x1, 0x100000001, 0x4, 0xfffffffffffff71d, 0x6, 0x8001, 0x754, 0x2, 0x8, 0x8, 0x5, 0x8, 0x81, 0x6, 0x10000, 0x44d, 0x8, 0x8, 0x6, 0x7fff, 0x0, 0x4, 0xbe, 0xfffffffffffffffa, 0x3, 0x100000001, 0xff, 0x5, 0x8, 0x100000000, 0x100000000, 0x8, 0x8000000000000000, 0x5, 0x0, 0x8000, 0x10b, 0x3, 0x4, 0x5, 0x7fffffff, 0xffffffffaa2f0316, 0xfffffffffffffff6, 0xd857, 0x4, 0x1, 0x52, 0x0, 0x4, 0x6, 0xeb, 0x0, 0x4, 0x7fffffff, 0x5, 0x80, 0x3f, 0xfff, 0xfffffffffffffff9, 0xff, 0x7, 0x7f, 0x7, 0x3, 0xda, 0x7, 0x5, 0x1, 0xc3de, 0x9, 0x40, 0x5, 0x8, 0x5, 0x6, 0x1ff, 0x9, 0xfffffffffffffffe, 0x1, 0x80, 0x136, 0x0, 0x4, 0x0, 0x7f, 0x5, 0x2, 0x400, 0x80000000, 0x0, 0x1, 0x6, 0x8, 0x1, 0x0, 0x3, 0xcb, 0x3, 0x16da, 0x2, 0xe4ed, 0xffff, 0x10000, 0x5, 0x1, 0x9, 0xc51, 0x2, 0x2, 0x9, 0x81, 0x3, 0x2, 0xaea6, 0x32]}) 17:41:09 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\" m\'\xd22\a\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcP\xc5V|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xa7\a\x00\x00\x00\x00\x00\x00\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6\x00\x00dY\x9f,17\x00\x00'}, 0xfffffffffffffdc7) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000080)={0x0, 0x8000000000000001, 0x1, [0x5, 0x488a, 0x8, 0x80000000, 0x7fffffffffffffff], [0x3bfd0000, 0x4, 0x0, 0x1, 0x8, 0x9a1, 0x6, 0x6, 0x100000000, 0x401, 0x1, 0x0, 0x0, 0x1, 0x1, 0x80000000, 0x0, 0x20, 0x7, 0x4, 0x1, 0x1, 0xaac, 0x401, 0x6, 0x8, 0x3, 0x8, 0x7, 0x8, 0x2, 0x81, 0x3, 0x1, 0x4, 0xfffffffffffffffc, 0xffffffffffffffff, 0x5, 0xfa, 0xf1, 0x2, 0x7, 0x7, 0x28, 0x21d, 0x1, 0x100000000, 0x100000000, 0xdba, 0x9, 0xdfc, 0x7f, 0x40, 0xfffffffffffeffff, 0x98, 0xffff, 0x40, 0x8000, 0x4, 0x7, 0x80000000, 0x1ff, 0x0, 0x6, 0x1, 0x10000, 0x0, 0x20, 0x0, 0x1, 0x0, 0x2, 0x6, 0x401, 0x100, 0xadf, 0x3, 0x2, 0x10001, 0x0, 0x1000, 0x3f, 0x0, 0x0, 0x8, 0x1, 0x3f, 0x4, 0xffffffffffffffff, 0x1, 0xaeb4, 0x10, 0x400, 0x7, 0x7ff, 0x1000, 0x7, 0xdd5, 0x96, 0x8, 0x3, 0x400, 0x81, 0x100000001, 0x5, 0x9, 0x7fffffff, 0xb6, 0x400, 0x9, 0x4, 0x9, 0x80, 0x6da, 0x0, 0xc6, 0x400, 0xff, 0x9, 0x2, 0x400]}) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000004c0)={r1, 0x200, 0x1, [0x800, 0x4, 0x0, 0x9, 0x8000000000000000], [0x80000001, 0x4, 0x4, 0x7, 0x8, 0x7, 0x1, 0x100000001, 0x4, 0xfffffffffffff71d, 0x6, 0x8001, 0x754, 0x2, 0x8, 0x8, 0x5, 0x8, 0x81, 0x6, 0x10000, 0x44d, 0x8, 0x8, 0x6, 0x7fff, 0x0, 0x4, 0xbe, 0xfffffffffffffffa, 0x3, 0x100000001, 0xff, 0x5, 0x8, 0x100000000, 0x100000000, 0x8, 0x8000000000000000, 0x5, 0x0, 0x8000, 0x10b, 0x3, 0x4, 0x5, 0x7fffffff, 0xffffffffaa2f0316, 0xfffffffffffffff6, 0xd857, 0x4, 0x1, 0x52, 0x0, 0x4, 0x6, 0xeb, 0x0, 0x4, 0x7fffffff, 0x5, 0x80, 0x3f, 0xfff, 0xfffffffffffffff9, 0xff, 0x7, 0x7f, 0x7, 0x3, 0xda, 0x7, 0x5, 0x1, 0xc3de, 0x9, 0x40, 0x5, 0x8, 0x5, 0x6, 0x1ff, 0x9, 0xfffffffffffffffe, 0x1, 0x80, 0x136, 0x0, 0x4, 0x0, 0x7f, 0x5, 0x2, 0x400, 0x80000000, 0x0, 0x1, 0x6, 0x8, 0x1, 0x0, 0x3, 0xcb, 0x3, 0x16da, 0x2, 0xe4ed, 0xffff, 0x10000, 0x5, 0x1, 0x9, 0xc51, 0x2, 0x2, 0x9, 0x81, 0x3, 0x2, 0xaea6, 0x32]}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$int_out(r0, 0x1, 0x0) (async) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000080)={0x0, 0x8000000000000001, 0x1, [0x5, 0x488a, 0x8, 0x80000000, 0x7fffffffffffffff], [0x3bfd0000, 0x4, 0x0, 0x1, 0x8, 0x9a1, 0x6, 0x6, 0x100000000, 0x401, 0x1, 0x0, 0x0, 0x1, 0x1, 0x80000000, 0x0, 0x20, 0x7, 0x4, 0x1, 0x1, 0xaac, 0x401, 0x6, 0x8, 0x3, 0x8, 0x7, 0x8, 0x2, 0x81, 0x3, 0x1, 0x4, 0xfffffffffffffffc, 0xffffffffffffffff, 0x5, 0xfa, 0xf1, 0x2, 0x7, 0x7, 0x28, 0x21d, 0x1, 0x100000000, 0x100000000, 0xdba, 0x9, 0xdfc, 0x7f, 0x40, 0xfffffffffffeffff, 0x98, 0xffff, 0x40, 0x8000, 0x4, 0x7, 0x80000000, 0x1ff, 0x0, 0x6, 0x1, 0x10000, 0x0, 0x20, 0x0, 0x1, 0x0, 0x2, 0x6, 0x401, 0x100, 0xadf, 0x3, 0x2, 0x10001, 0x0, 0x1000, 0x3f, 0x0, 0x0, 0x8, 0x1, 0x3f, 0x4, 0xffffffffffffffff, 0x1, 0xaeb4, 0x10, 0x400, 0x7, 0x7ff, 0x1000, 0x7, 0xdd5, 0x96, 0x8, 0x3, 0x400, 0x81, 0x100000001, 0x5, 0x9, 0x7fffffff, 0xb6, 0x400, 0x9, 0x4, 0x9, 0x80, 0x6da, 0x0, 0xc6, 0x400, 0xff, 0x9, 0x2, 0x400]}) (async) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000004c0)={r1, 0x200, 0x1, [0x800, 0x4, 0x0, 0x9, 0x8000000000000000], [0x80000001, 0x4, 0x4, 0x7, 0x8, 0x7, 0x1, 0x100000001, 0x4, 0xfffffffffffff71d, 0x6, 0x8001, 0x754, 0x2, 0x8, 0x8, 0x5, 0x8, 0x81, 0x6, 0x10000, 0x44d, 0x8, 0x8, 0x6, 0x7fff, 0x0, 0x4, 0xbe, 0xfffffffffffffffa, 0x3, 0x100000001, 0xff, 0x5, 0x8, 0x100000000, 0x100000000, 0x8, 0x8000000000000000, 0x5, 0x0, 0x8000, 0x10b, 0x3, 0x4, 0x5, 0x7fffffff, 0xffffffffaa2f0316, 0xfffffffffffffff6, 0xd857, 0x4, 0x1, 0x52, 0x0, 0x4, 0x6, 0xeb, 0x0, 0x4, 0x7fffffff, 0x5, 0x80, 0x3f, 0xfff, 0xfffffffffffffff9, 0xff, 0x7, 0x7f, 0x7, 0x3, 0xda, 0x7, 0x5, 0x1, 0xc3de, 0x9, 0x40, 0x5, 0x8, 0x5, 0x6, 0x1ff, 0x9, 0xfffffffffffffffe, 0x1, 0x80, 0x136, 0x0, 0x4, 0x0, 0x7f, 0x5, 0x2, 0x400, 0x80000000, 0x0, 0x1, 0x6, 0x8, 0x1, 0x0, 0x3, 0xcb, 0x3, 0x16da, 0x2, 0xe4ed, 0xffff, 0x10000, 0x5, 0x1, 0x9, 0xc51, 0x2, 0x2, 0x9, 0x81, 0x3, 0x2, 0xaea6, 0x32]}) (async) 17:41:09 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\" m\'\xd22\a\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcP\xc5V|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xa7\a\x00\x00\x00\x00\x00\x00\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6\x00\x00dY\x9f,17\x00\x00'}, 0xfffffffffffffdc7) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) (async) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\" m\'\xd22\a\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcP\xc5V|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xa7\a\x00\x00\x00\x00\x00\x00\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6\x00\x00dY\x9f,17\x00\x00'}, 0xfffffffffffffdc7) (async) 17:41:09 executing program 4: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT=r0], 0x45) (async) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000180)={0x0, 0xfffffffffffffffd, 0x0, 0x1}) 17:41:09 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\" m\'\xd22\a\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcP\xc5V|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xa7\a\x00\x00\x00\x00\x00\x00\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6\x00\x00dY\x9f,17\x00\x00'}, 0xfffffffffffffdc7) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) (async) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\" m\'\xd22\a\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcP\xc5V|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xa7\a\x00\x00\x00\x00\x00\x00\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6\x00\x00dY\x9f,17\x00\x00'}, 0xfffffffffffffdc7) (async) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) (async) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000080)={0x0, 0x8000000000000001, 0x1, [0x5, 0x488a, 0x8, 0x80000000, 0x7fffffffffffffff], [0x3bfd0000, 0x4, 0x0, 0x1, 0x8, 0x9a1, 0x6, 0x6, 0x100000000, 0x401, 0x1, 0x0, 0x0, 0x1, 0x1, 0x80000000, 0x0, 0x20, 0x7, 0x4, 0x1, 0x1, 0xaac, 0x401, 0x6, 0x8, 0x3, 0x8, 0x7, 0x8, 0x2, 0x81, 0x3, 0x1, 0x4, 0xfffffffffffffffc, 0xffffffffffffffff, 0x5, 0xfa, 0xf1, 0x2, 0x7, 0x7, 0x28, 0x21d, 0x1, 0x100000000, 0x100000000, 0xdba, 0x9, 0xdfc, 0x7f, 0x40, 0xfffffffffffeffff, 0x98, 0xffff, 0x40, 0x8000, 0x4, 0x7, 0x80000000, 0x1ff, 0x0, 0x6, 0x1, 0x10000, 0x0, 0x20, 0x0, 0x1, 0x0, 0x2, 0x6, 0x401, 0x100, 0xadf, 0x3, 0x2, 0x10001, 0x0, 0x1000, 0x3f, 0x0, 0x0, 0x8, 0x1, 0x3f, 0x4, 0xffffffffffffffff, 0x1, 0xaeb4, 0x10, 0x400, 0x7, 0x7ff, 0x1000, 0x7, 0xdd5, 0x96, 0x8, 0x3, 0x400, 0x81, 0x100000001, 0x5, 0x9, 0x7fffffff, 0xb6, 0x400, 0x9, 0x4, 0x9, 0x80, 0x6da, 0x0, 0xc6, 0x400, 0xff, 0x9, 0x2, 0x400]}) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000004c0)={r1, 0x200, 0x1, [0x800, 0x4, 0x0, 0x9, 0x8000000000000000], [0x80000001, 0x4, 0x4, 0x7, 0x8, 0x7, 0x1, 0x100000001, 0x4, 0xfffffffffffff71d, 0x6, 0x8001, 0x754, 0x2, 0x8, 0x8, 0x5, 0x8, 0x81, 0x6, 0x10000, 0x44d, 0x8, 0x8, 0x6, 0x7fff, 0x0, 0x4, 0xbe, 0xfffffffffffffffa, 0x3, 0x100000001, 0xff, 0x5, 0x8, 0x100000000, 0x100000000, 0x8, 0x8000000000000000, 0x5, 0x0, 0x8000, 0x10b, 0x3, 0x4, 0x5, 0x7fffffff, 0xffffffffaa2f0316, 0xfffffffffffffff6, 0xd857, 0x4, 0x1, 0x52, 0x0, 0x4, 0x6, 0xeb, 0x0, 0x4, 0x7fffffff, 0x5, 0x80, 0x3f, 0xfff, 0xfffffffffffffff9, 0xff, 0x7, 0x7f, 0x7, 0x3, 0xda, 0x7, 0x5, 0x1, 0xc3de, 0x9, 0x40, 0x5, 0x8, 0x5, 0x6, 0x1ff, 0x9, 0xfffffffffffffffe, 0x1, 0x80, 0x136, 0x0, 0x4, 0x0, 0x7f, 0x5, 0x2, 0x400, 0x80000000, 0x0, 0x1, 0x6, 0x8, 0x1, 0x0, 0x3, 0xcb, 0x3, 0x16da, 0x2, 0xe4ed, 0xffff, 0x10000, 0x5, 0x1, 0x9, 0xc51, 0x2, 0x2, 0x9, 0x81, 0x3, 0x2, 0xaea6, 0x32]}) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:09 executing program 4: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) (async) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT=r0], 0x45) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000180)={0x0, 0xfffffffffffffffd, 0x0, 0x1}) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:09 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x220400, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f00000000c0)={0x0, 0x1ff, 0x0, [0x7, 0x9, 0x8, 0x5, 0xd18], [0x800, 0x0, 0xffffffff80000001, 0x5, 0x1fffe0000000, 0x4c6, 0x7, 0xff, 0x5, 0x7, 0x9, 0x400, 0xd230, 0x3f, 0x6, 0x1, 0x3, 0x80, 0x6, 0x3, 0x3f7, 0x35, 0x8001, 0xb2, 0x4, 0x266, 0x20, 0x7, 0x7, 0x80000000, 0x2, 0x9, 0x80, 0xff, 0x100000, 0x0, 0x7fffffffffffffff, 0x2, 0x400, 0xffff, 0x2b5a2e77, 0x4b939329, 0x7, 0xffffffffffffffff, 0x46, 0x9, 0xfffffffffffffffc, 0x5, 0x6, 0x7, 0x7b7f, 0x7, 0x9, 0x0, 0x180000000000000, 0x9, 0x8, 0x800, 0x5, 0x1, 0x0, 0x3e13, 0x100000001, 0x7, 0x8, 0x9, 0x4, 0x6, 0x7, 0xffffffffffffffff, 0x8a7, 0x100000001, 0xffffffffffffffff, 0x6, 0x9e, 0x2, 0xc47, 0x7b, 0x3, 0x3ff, 0x8, 0x2e, 0xfffffffffffffeff, 0x9, 0x3, 0x7b, 0x8, 0x5, 0x0, 0x2, 0x2, 0x2, 0xfff, 0xf48, 0x5, 0x7f, 0x48, 0x3, 0xfff, 0x6, 0x0, 0x4, 0x7, 0x8, 0x10001, 0x4, 0xfffffffffffffffd, 0x100000001, 0x2, 0x2, 0x5, 0x7fff, 0x6, 0x9, 0x7, 0xda, 0x7ff, 0x0, 0x2, 0x101, 0x8]}) r3 = syz_open_dev$dri(&(0x7f0000000000), 0x2, 0x220002) close(r3) sendto$packet(r1, 0x0, 0x3d, 0x0, 0x0, 0x0) ioctl$int_out(r1, 0xa8c1, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000500), &(0x7f0000000540)=0x14) 17:41:09 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x85, 0x0, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000100)={'exec ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]A\xca\xd8\xb1K\x12\x94M9\xf1\xe7\xeeO\xcc\xaa6e\xea\x12\x88\x01\x04\x00\x00\x0e\x00\x00\x00\x00\xcbuu\x97C\x8a\x95\xff\xc8\x18\xb0\x93\xdc(\x86;\x18P\xd8i\xf4\a\xeb\xe3\xbb8f\x96*(\x82=\x7f\xfd/\x1dq\xbebiJ\xf5\xbd\xb8H\x04\x9c\xc8M\xef\xd83\x86/\xef\xe2\xd3\x10R\x02\xe1mF\xc9\xed\xbb\xe9\x1e\x8c;\x93\xd5^~\xaa\xb4\x91\x1fQg\x8e\xd6\xa6f\xcd\x86\xac\r\xa2\x00\f\xfaH\x9b\x87\x8f}eH\x83m\xfe\xdd?%\x03\xaf\x04P\x8f\xcf\vh\xbbV'}, 0xfffffffffffffe5e) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) 17:41:09 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x220400, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f00000000c0)={0x0, 0x1ff, 0x0, [0x7, 0x9, 0x8, 0x5, 0xd18], [0x800, 0x0, 0xffffffff80000001, 0x5, 0x1fffe0000000, 0x4c6, 0x7, 0xff, 0x5, 0x7, 0x9, 0x400, 0xd230, 0x3f, 0x6, 0x1, 0x3, 0x80, 0x6, 0x3, 0x3f7, 0x35, 0x8001, 0xb2, 0x4, 0x266, 0x20, 0x7, 0x7, 0x80000000, 0x2, 0x9, 0x80, 0xff, 0x100000, 0x0, 0x7fffffffffffffff, 0x2, 0x400, 0xffff, 0x2b5a2e77, 0x4b939329, 0x7, 0xffffffffffffffff, 0x46, 0x9, 0xfffffffffffffffc, 0x5, 0x6, 0x7, 0x7b7f, 0x7, 0x9, 0x0, 0x180000000000000, 0x9, 0x8, 0x800, 0x5, 0x1, 0x0, 0x3e13, 0x100000001, 0x7, 0x8, 0x9, 0x4, 0x6, 0x7, 0xffffffffffffffff, 0x8a7, 0x100000001, 0xffffffffffffffff, 0x6, 0x9e, 0x2, 0xc47, 0x7b, 0x3, 0x3ff, 0x8, 0x2e, 0xfffffffffffffeff, 0x9, 0x3, 0x7b, 0x8, 0x5, 0x0, 0x2, 0x2, 0x2, 0xfff, 0xf48, 0x5, 0x7f, 0x48, 0x3, 0xfff, 0x6, 0x0, 0x4, 0x7, 0x8, 0x10001, 0x4, 0xfffffffffffffffd, 0x100000001, 0x2, 0x2, 0x5, 0x7fff, 0x6, 0x9, 0x7, 0xda, 0x7ff, 0x0, 0x2, 0x101, 0x8]}) r3 = syz_open_dev$dri(&(0x7f0000000000), 0x2, 0x220002) close(r3) sendto$packet(r1, 0x0, 0x3d, 0x0, 0x0, 0x0) ioctl$int_out(r1, 0xa8c1, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000500), &(0x7f0000000540)=0x14) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x220400, 0x0) (async) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f00000000c0)={0x0, 0x1ff, 0x0, [0x7, 0x9, 0x8, 0x5, 0xd18], [0x800, 0x0, 0xffffffff80000001, 0x5, 0x1fffe0000000, 0x4c6, 0x7, 0xff, 0x5, 0x7, 0x9, 0x400, 0xd230, 0x3f, 0x6, 0x1, 0x3, 0x80, 0x6, 0x3, 0x3f7, 0x35, 0x8001, 0xb2, 0x4, 0x266, 0x20, 0x7, 0x7, 0x80000000, 0x2, 0x9, 0x80, 0xff, 0x100000, 0x0, 0x7fffffffffffffff, 0x2, 0x400, 0xffff, 0x2b5a2e77, 0x4b939329, 0x7, 0xffffffffffffffff, 0x46, 0x9, 0xfffffffffffffffc, 0x5, 0x6, 0x7, 0x7b7f, 0x7, 0x9, 0x0, 0x180000000000000, 0x9, 0x8, 0x800, 0x5, 0x1, 0x0, 0x3e13, 0x100000001, 0x7, 0x8, 0x9, 0x4, 0x6, 0x7, 0xffffffffffffffff, 0x8a7, 0x100000001, 0xffffffffffffffff, 0x6, 0x9e, 0x2, 0xc47, 0x7b, 0x3, 0x3ff, 0x8, 0x2e, 0xfffffffffffffeff, 0x9, 0x3, 0x7b, 0x8, 0x5, 0x0, 0x2, 0x2, 0x2, 0xfff, 0xf48, 0x5, 0x7f, 0x48, 0x3, 0xfff, 0x6, 0x0, 0x4, 0x7, 0x8, 0x10001, 0x4, 0xfffffffffffffffd, 0x100000001, 0x2, 0x2, 0x5, 0x7fff, 0x6, 0x9, 0x7, 0xda, 0x7ff, 0x0, 0x2, 0x101, 0x8]}) (async) syz_open_dev$dri(&(0x7f0000000000), 0x2, 0x220002) (async) close(r3) (async) sendto$packet(r1, 0x0, 0x3d, 0x0, 0x0, 0x0) (async) ioctl$int_out(r1, 0xa8c1, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) (async) getsockname$packet(r4, &(0x7f0000000500), &(0x7f0000000540)=0x14) (async) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="737461636b202257ab27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211feec2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fc4f6"], 0x97) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) 17:41:09 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (rerun: 64) sendto$packet(r0, 0x0, 0x0, 0x85, 0x0, 0x0) (async) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000100)={'exec ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]A\xca\xd8\xb1K\x12\x94M9\xf1\xe7\xeeO\xcc\xaa6e\xea\x12\x88\x01\x04\x00\x00\x0e\x00\x00\x00\x00\xcbuu\x97C\x8a\x95\xff\xc8\x18\xb0\x93\xdc(\x86;\x18P\xd8i\xf4\a\xeb\xe3\xbb8f\x96*(\x82=\x7f\xfd/\x1dq\xbebiJ\xf5\xbd\xb8H\x04\x9c\xc8M\xef\xd83\x86/\xef\xe2\xd3\x10R\x02\xe1mF\xc9\xed\xbb\xe9\x1e\x8c;\x93\xd5^~\xaa\xb4\x91\x1fQg\x8e\xd6\xa6f\xcd\x86\xac\r\xa2\x00\f\xfaH\x9b\x87\x8f}eH\x83m\xfe\xdd?%\x03\xaf\x04P\x8f\xcf\vh\xbbV'}, 0xfffffffffffffe5e) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) (async) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="737461636b202257ab27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211feec2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fc4f6"], 0x97) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) 17:41:09 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x220400, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f00000000c0)={0x0, 0x1ff, 0x0, [0x7, 0x9, 0x8, 0x5, 0xd18], [0x800, 0x0, 0xffffffff80000001, 0x5, 0x1fffe0000000, 0x4c6, 0x7, 0xff, 0x5, 0x7, 0x9, 0x400, 0xd230, 0x3f, 0x6, 0x1, 0x3, 0x80, 0x6, 0x3, 0x3f7, 0x35, 0x8001, 0xb2, 0x4, 0x266, 0x20, 0x7, 0x7, 0x80000000, 0x2, 0x9, 0x80, 0xff, 0x100000, 0x0, 0x7fffffffffffffff, 0x2, 0x400, 0xffff, 0x2b5a2e77, 0x4b939329, 0x7, 0xffffffffffffffff, 0x46, 0x9, 0xfffffffffffffffc, 0x5, 0x6, 0x7, 0x7b7f, 0x7, 0x9, 0x0, 0x180000000000000, 0x9, 0x8, 0x800, 0x5, 0x1, 0x0, 0x3e13, 0x100000001, 0x7, 0x8, 0x9, 0x4, 0x6, 0x7, 0xffffffffffffffff, 0x8a7, 0x100000001, 0xffffffffffffffff, 0x6, 0x9e, 0x2, 0xc47, 0x7b, 0x3, 0x3ff, 0x8, 0x2e, 0xfffffffffffffeff, 0x9, 0x3, 0x7b, 0x8, 0x5, 0x0, 0x2, 0x2, 0x2, 0xfff, 0xf48, 0x5, 0x7f, 0x48, 0x3, 0xfff, 0x6, 0x0, 0x4, 0x7, 0x8, 0x10001, 0x4, 0xfffffffffffffffd, 0x100000001, 0x2, 0x2, 0x5, 0x7fff, 0x6, 0x9, 0x7, 0xda, 0x7ff, 0x0, 0x2, 0x101, 0x8]}) r3 = syz_open_dev$dri(&(0x7f0000000000), 0x2, 0x220002) close(r3) sendto$packet(r1, 0x0, 0x3d, 0x0, 0x0, 0x0) ioctl$int_out(r1, 0xa8c1, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000500), &(0x7f0000000540)=0x14) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x220400, 0x0) (async) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f00000000c0)={0x0, 0x1ff, 0x0, [0x7, 0x9, 0x8, 0x5, 0xd18], [0x800, 0x0, 0xffffffff80000001, 0x5, 0x1fffe0000000, 0x4c6, 0x7, 0xff, 0x5, 0x7, 0x9, 0x400, 0xd230, 0x3f, 0x6, 0x1, 0x3, 0x80, 0x6, 0x3, 0x3f7, 0x35, 0x8001, 0xb2, 0x4, 0x266, 0x20, 0x7, 0x7, 0x80000000, 0x2, 0x9, 0x80, 0xff, 0x100000, 0x0, 0x7fffffffffffffff, 0x2, 0x400, 0xffff, 0x2b5a2e77, 0x4b939329, 0x7, 0xffffffffffffffff, 0x46, 0x9, 0xfffffffffffffffc, 0x5, 0x6, 0x7, 0x7b7f, 0x7, 0x9, 0x0, 0x180000000000000, 0x9, 0x8, 0x800, 0x5, 0x1, 0x0, 0x3e13, 0x100000001, 0x7, 0x8, 0x9, 0x4, 0x6, 0x7, 0xffffffffffffffff, 0x8a7, 0x100000001, 0xffffffffffffffff, 0x6, 0x9e, 0x2, 0xc47, 0x7b, 0x3, 0x3ff, 0x8, 0x2e, 0xfffffffffffffeff, 0x9, 0x3, 0x7b, 0x8, 0x5, 0x0, 0x2, 0x2, 0x2, 0xfff, 0xf48, 0x5, 0x7f, 0x48, 0x3, 0xfff, 0x6, 0x0, 0x4, 0x7, 0x8, 0x10001, 0x4, 0xfffffffffffffffd, 0x100000001, 0x2, 0x2, 0x5, 0x7fff, 0x6, 0x9, 0x7, 0xda, 0x7ff, 0x0, 0x2, 0x101, 0x8]}) (async) syz_open_dev$dri(&(0x7f0000000000), 0x2, 0x220002) (async) close(r3) (async) sendto$packet(r1, 0x0, 0x3d, 0x0, 0x0, 0x0) (async) ioctl$int_out(r1, 0xa8c1, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) (async) getsockname$packet(r4, &(0x7f0000000500), &(0x7f0000000540)=0x14) (async) 17:41:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="737461636b202257ab27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211feec2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fc4f6"], 0x97) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000000000)={&(0x7f0000000080)=""/4096, 0x1000, 0x1, 0x6}) 17:41:09 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x85, 0x0, 0x0) (async) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000100)={'exec ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]A\xca\xd8\xb1K\x12\x94M9\xf1\xe7\xeeO\xcc\xaa6e\xea\x12\x88\x01\x04\x00\x00\x0e\x00\x00\x00\x00\xcbuu\x97C\x8a\x95\xff\xc8\x18\xb0\x93\xdc(\x86;\x18P\xd8i\xf4\a\xeb\xe3\xbb8f\x96*(\x82=\x7f\xfd/\x1dq\xbebiJ\xf5\xbd\xb8H\x04\x9c\xc8M\xef\xd83\x86/\xef\xe2\xd3\x10R\x02\xe1mF\xc9\xed\xbb\xe9\x1e\x8c;\x93\xd5^~\xaa\xb4\x91\x1fQg\x8e\xd6\xa6f\xcd\x86\xac\r\xa2\x00\f\xfaH\x9b\x87\x8f}eH\x83m\xfe\xdd?%\x03\xaf\x04P\x8f\xcf\vh\xbbV'}, 0xfffffffffffffe5e) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000000000)={&(0x7f0000000080)=""/4096, 0x1000, 0x1, 0x6}) 17:41:09 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000100)={{r0}, {@void, @actul_num={@val=0x2b, 0x3, 0x50}}}) 17:41:09 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x210, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80000}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, r3, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x4000800) sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r3, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="5eefafde246b"}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xb42}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}]}, 0x40}, 0x1, 0x0, 0x0, 0x20044010}, 0x4000) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '/proc/thread-self/attr/exec\x00'}, 0x21) sendto$packet(r1, 0x0, 0xfffffff1, 0x2040, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="657865632022206d27d23285d30a1f9c319cbe7f0000000000000075bc50567ca41456a4b3d7c354eff05c5fb669949843ec32bbbf8d4646664b49fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef5d3b923c34c5a80eb3e3659687bc3ba15612dc52f0dfcdd62340ab9000009c8bd34500"/138], 0x8a) 17:41:09 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (async, rerun: 64) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (rerun: 64) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000100)={{r0}, {@void, @actul_num={@val=0x2b, 0x3, 0x50}}}) 17:41:09 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x210, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80000}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, r3, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x4000800) (async) sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r3, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="5eefafde246b"}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xb42}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}]}, 0x40}, 0x1, 0x0, 0x0, 0x20044010}, 0x4000) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '/proc/thread-self/attr/exec\x00'}, 0x21) (async) sendto$packet(r1, 0x0, 0xfffffff1, 0x2040, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="657865632022206d27d23285d30a1f9c319cbe7f0000000000000075bc50567ca41456a4b3d7c354eff05c5fb669949843ec32bbbf8d4646664b49fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef5d3b923c34c5a80eb3e3659687bc3ba15612dc52f0dfcdd62340ab9000009c8bd34500"/138], 0x8a) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000000000)={&(0x7f0000000080)=""/4096, 0x1000, 0x1, 0x6}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$int_out(r0, 0x1, 0x0) (async) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000000000)={&(0x7f0000000080)=""/4096, 0x1000, 0x1, 0x6}) (async) 17:41:09 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000100)={{r0}, {@void, @actul_num={@val=0x2b, 0x3, 0x50}}}) 17:41:09 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async, rerun: 32) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (rerun: 32) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) (rerun: 32) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x210, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80000}, 0x0) (async) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, r3, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x4000800) sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r3, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="5eefafde246b"}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xb42}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}]}, 0x40}, 0x1, 0x0, 0x0, 0x20044010}, 0x4000) (async, rerun: 64) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '/proc/thread-self/attr/exec\x00'}, 0x21) (async) sendto$packet(r1, 0x0, 0xfffffff1, 0x2040, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="657865632022206d27d23285d30a1f9c319cbe7f0000000000000075bc50567ca41456a4b3d7c354eff05c5fb669949843ec32bbbf8d4646664b49fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef5d3b923c34c5a80eb3e3659687bc3ba15612dc52f0dfcdd62340ab9000009c8bd34500"/138], 0x8a) 17:41:09 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa0e00000000ca757597438a95ffc818315ce3cc7cb2cee5c406a288fa000100000002000000"], 0x45) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x0, 0x0) 17:41:09 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa0e00000000ca757597438a95ffc818315ce3cc7cb2cee5c406a288fa000100000002000000"], 0x45) 17:41:09 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$int_out(r0, 0x0, 0x0) (async) 17:41:09 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa0e00000000ca757597438a95ffc818315ce3cc7cb2cee5c406a288fa000100000002000000"], 0x45) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pwritev(r1, &(0x7f00000002c0)=[{&(0x7f0000000100)="21a21e67f391627e6a6c67fc954b571eb4ef53bb4c14bdb598768b55e1406b934d428862f06dd0a7df3e028f05bb9274371f8202e969813c247e00530a062563552d47b9901573d7f268e5c8741d7df000f7a57c76f8759f548a044bd08a50bf48990f0bf1d6c556c0", 0xffffffffffffff46}, {&(0x7f0000000300)="63e613dc3eef18373f0b76765fb1386d"}, {&(0x7f00000001c0)="0b3dc48f3b17a8a0dd7bead4128e1af047dea9942de67f7270e60410a0de7fb76124a1611d7875392f37234919409e3175ecb01368222e1bffe25a50837c81d33c9d36b3c285776686ee36ae3b3a99b24178224b403dbd61f1d406e6f6c0c6bcf8fe81d7e00a52e786200cfdceb2b3782a22c5e406a6ce5a11021bfc678925f849bfff3ce16add59e121b8f882fae88eafc3361aa9c3607abbd2884f47edfa9468f327a0640b0a", 0xa7}, {&(0x7f0000000180)="75625447e193", 0x6}], 0x4, 0x2, 0x8) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) accept4$vsock_stream(r2, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host}, 0x10, 0x400) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[], 0x97) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x9) 17:41:10 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$int_out(r0, 0x0, 0x0) (async) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pwritev(r1, &(0x7f00000002c0)=[{&(0x7f0000000100)="21a21e67f391627e6a6c67fc954b571eb4ef53bb4c14bdb598768b55e1406b934d428862f06dd0a7df3e028f05bb9274371f8202e969813c247e00530a062563552d47b9901573d7f268e5c8741d7df000f7a57c76f8759f548a044bd08a50bf48990f0bf1d6c556c0", 0xffffffffffffff46}, {&(0x7f0000000300)="63e613dc3eef18373f0b76765fb1386d"}, {&(0x7f00000001c0)="0b3dc48f3b17a8a0dd7bead4128e1af047dea9942de67f7270e60410a0de7fb76124a1611d7875392f37234919409e3175ecb01368222e1bffe25a50837c81d33c9d36b3c285776686ee36ae3b3a99b24178224b403dbd61f1d406e6f6c0c6bcf8fe81d7e00a52e786200cfdceb2b3782a22c5e406a6ce5a11021bfc678925f849bfff3ce16add59e121b8f882fae88eafc3361aa9c3607abbd2884f47edfa9468f327a0640b0a", 0xa7}, {&(0x7f0000000180)="75625447e193", 0x6}], 0x4, 0x2, 0x8) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) accept4$vsock_stream(r2, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host}, 0x10, 0x400) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[], 0x97) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x9) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) pwritev(r1, &(0x7f00000002c0)=[{&(0x7f0000000100)="21a21e67f391627e6a6c67fc954b571eb4ef53bb4c14bdb598768b55e1406b934d428862f06dd0a7df3e028f05bb9274371f8202e969813c247e00530a062563552d47b9901573d7f268e5c8741d7df000f7a57c76f8759f548a044bd08a50bf48990f0bf1d6c556c0", 0xffffffffffffff46}, {&(0x7f0000000300)="63e613dc3eef18373f0b76765fb1386d"}, {&(0x7f00000001c0)="0b3dc48f3b17a8a0dd7bead4128e1af047dea9942de67f7270e60410a0de7fb76124a1611d7875392f37234919409e3175ecb01368222e1bffe25a50837c81d33c9d36b3c285776686ee36ae3b3a99b24178224b403dbd61f1d406e6f6c0c6bcf8fe81d7e00a52e786200cfdceb2b3782a22c5e406a6ce5a11021bfc678925f849bfff3ce16add59e121b8f882fae88eafc3361aa9c3607abbd2884f47edfa9468f327a0640b0a", 0xa7}, {&(0x7f0000000180)="75625447e193", 0x6}], 0x4, 0x2, 0x8) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) (async) accept4$vsock_stream(r2, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host}, 0x10, 0x400) (async) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[], 0x97) (async) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x9) (async) 17:41:10 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) sendto$packet(r1, 0x0, 0x0, 0x20008004, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$int_out(r3, 0x1, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) pwritev(r4, &(0x7f0000000180)=[{&(0x7f0000000080)="c35dd3e474c9eb23f92818ff70e5358a235966e136dc08ade414b52093a4320cf8569d2bae829e3aa792a07924749b85405675b202cf9ac3b4275d9c499296d8aa00535b008d0ffd7d7480251104d135c3410c87bfca29fc", 0x58}, {&(0x7f0000000000)="37e18c93249833a9063ddcbcb6b2154e4bcccabe937441a71a67efec491d76bc7df2f4b1fcdba7c364b3ef51b7d8c663e7eca87a6416eebd", 0x38}, {&(0x7f0000000100)="4535bde6acc7999b6c12563562ac9b91f2bab000365f9ffd93e5fbcab373d10f844623396db5d0a1ca8da2f494", 0x2d}, {&(0x7f0000000140)="38e2e60f8904682de2a35237e55af91a6c6f28548fefe711468adf774ede473ccbc781a5d1db9938", 0x28}], 0x4, 0x1ff, 0x7f) 17:41:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req={0x8001, 0x200, 0x6, 0x7}, 0x10) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fa59cfe5edc5aa15326a6eab96ddb9dfbba8baa82a7328b25004fdb27e53052f5468b632be397caf6c5406cd8813968621355a4cf31ee585637125c48c6b41797350737202076506c7f340f7cd2225a92c8f5a0d223686a8b44928706c2f9364b25e113ae1c678ec8866e4f7f6242a88ceb99124c9c639cd6e4ee6685cdc74f559dd90b9bde2fd9668f9fb69cc6ff1b432871acd077bb763e7d7ad8798a39ba78700"/244], 0xfffffffffffffe66) 17:41:10 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) r1 = dup2(r0, 0xffffffffffffffff) sendto$packet(r1, 0x0, 0x0, 0x20008004, 0x0, 0x0) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (rerun: 64) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$int_out(r3, 0x1, 0x0) (async) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) (async) pwritev(r4, &(0x7f0000000180)=[{&(0x7f0000000080)="c35dd3e474c9eb23f92818ff70e5358a235966e136dc08ade414b52093a4320cf8569d2bae829e3aa792a07924749b85405675b202cf9ac3b4275d9c499296d8aa00535b008d0ffd7d7480251104d135c3410c87bfca29fc", 0x58}, {&(0x7f0000000000)="37e18c93249833a9063ddcbcb6b2154e4bcccabe937441a71a67efec491d76bc7df2f4b1fcdba7c364b3ef51b7d8c663e7eca87a6416eebd", 0x38}, {&(0x7f0000000100)="4535bde6acc7999b6c12563562ac9b91f2bab000365f9ffd93e5fbcab373d10f844623396db5d0a1ca8da2f494", 0x2d}, {&(0x7f0000000140)="38e2e60f8904682de2a35237e55af91a6c6f28548fefe711468adf774ede473ccbc781a5d1db9938", 0x28}], 0x4, 0x1ff, 0x7f) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pwritev(r1, &(0x7f00000002c0)=[{&(0x7f0000000100)="21a21e67f391627e6a6c67fc954b571eb4ef53bb4c14bdb598768b55e1406b934d428862f06dd0a7df3e028f05bb9274371f8202e969813c247e00530a062563552d47b9901573d7f268e5c8741d7df000f7a57c76f8759f548a044bd08a50bf48990f0bf1d6c556c0", 0xffffffffffffff46}, {&(0x7f0000000300)="63e613dc3eef18373f0b76765fb1386d"}, {&(0x7f00000001c0)="0b3dc48f3b17a8a0dd7bead4128e1af047dea9942de67f7270e60410a0de7fb76124a1611d7875392f37234919409e3175ecb01368222e1bffe25a50837c81d33c9d36b3c285776686ee36ae3b3a99b24178224b403dbd61f1d406e6f6c0c6bcf8fe81d7e00a52e786200cfdceb2b3782a22c5e406a6ce5a11021bfc678925f849bfff3ce16add59e121b8f882fae88eafc3361aa9c3607abbd2884f47edfa9468f327a0640b0a", 0xa7}, {&(0x7f0000000180)="75625447e193", 0x6}], 0x4, 0x2, 0x8) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) accept4$vsock_stream(r2, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host}, 0x10, 0x400) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[], 0x97) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x9) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) pwritev(r1, &(0x7f00000002c0)=[{&(0x7f0000000100)="21a21e67f391627e6a6c67fc954b571eb4ef53bb4c14bdb598768b55e1406b934d428862f06dd0a7df3e028f05bb9274371f8202e969813c247e00530a062563552d47b9901573d7f268e5c8741d7df000f7a57c76f8759f548a044bd08a50bf48990f0bf1d6c556c0", 0xffffffffffffff46}, {&(0x7f0000000300)="63e613dc3eef18373f0b76765fb1386d"}, {&(0x7f00000001c0)="0b3dc48f3b17a8a0dd7bead4128e1af047dea9942de67f7270e60410a0de7fb76124a1611d7875392f37234919409e3175ecb01368222e1bffe25a50837c81d33c9d36b3c285776686ee36ae3b3a99b24178224b403dbd61f1d406e6f6c0c6bcf8fe81d7e00a52e786200cfdceb2b3782a22c5e406a6ce5a11021bfc678925f849bfff3ce16add59e121b8f882fae88eafc3361aa9c3607abbd2884f47edfa9468f327a0640b0a", 0xa7}, {&(0x7f0000000180)="75625447e193", 0x6}], 0x4, 0x2, 0x8) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) (async) accept4$vsock_stream(r2, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host}, 0x10, 0x400) (async) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[], 0x97) (async) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x9) (async) 17:41:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req={0x8001, 0x200, 0x6, 0x7}, 0x10) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fa59cfe5edc5aa15326a6eab96ddb9dfbba8baa82a7328b25004fdb27e53052f5468b632be397caf6c5406cd8813968621355a4cf31ee585637125c48c6b41797350737202076506c7f340f7cd2225a92c8f5a0d223686a8b44928706c2f9364b25e113ae1c678ec8866e4f7f6242a88ceb99124c9c639cd6e4ee6685cdc74f559dd90b9bde2fd9668f9fb69cc6ff1b432871acd077bb763e7d7ad8798a39ba78700"/244], 0xfffffffffffffe66) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\fwX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6\x00\x00\x00\x00\x00\x00'}, 0x97) 17:41:10 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) r1 = dup2(r0, 0xffffffffffffffff) sendto$packet(r1, 0x0, 0x0, 0x20008004, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$int_out(r3, 0x1, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) pwritev(r4, &(0x7f0000000180)=[{&(0x7f0000000080)="c35dd3e474c9eb23f92818ff70e5358a235966e136dc08ade414b52093a4320cf8569d2bae829e3aa792a07924749b85405675b202cf9ac3b4275d9c499296d8aa00535b008d0ffd7d7480251104d135c3410c87bfca29fc", 0x58}, {&(0x7f0000000000)="37e18c93249833a9063ddcbcb6b2154e4bcccabe937441a71a67efec491d76bc7df2f4b1fcdba7c364b3ef51b7d8c663e7eca87a6416eebd", 0x38}, {&(0x7f0000000100)="4535bde6acc7999b6c12563562ac9b91f2bab000365f9ffd93e5fbcab373d10f844623396db5d0a1ca8da2f494", 0x2d}, {&(0x7f0000000140)="38e2e60f8904682de2a35237e55af91a6c6f28548fefe711468adf774ede473ccbc781a5d1db9938", 0x28}], 0x4, 0x1ff, 0x7f) (rerun: 64) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\fwX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6\x00\x00\x00\x00\x00\x00'}, 0x97) 17:41:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req={0x8001, 0x200, 0x6, 0x7}, 0x10) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fa59cfe5edc5aa15326a6eab96ddb9dfbba8baa82a7328b25004fdb27e53052f5468b632be397caf6c5406cd8813968621355a4cf31ee585637125c48c6b41797350737202076506c7f340f7cd2225a92c8f5a0d223686a8b44928706c2f9364b25e113ae1c678ec8866e4f7f6242a88ceb99124c9c639cd6e4ee6685cdc74f559dd90b9bde2fd9668f9fb69cc6ff1b432871acd077bb763e7d7ad8798a39ba78700"/244], 0xfffffffffffffe66) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\fwX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6\x00\x00\x00\x00\x00\x00'}, 0x97) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000), 0x2) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:10 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14, 0x0) ioctl$int_out(r2, 0x1, 0x0) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000), 0x2) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000), 0x2) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) 17:41:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffe818315ce3cc7cb2cee5c42da288fa"], 0xfffffffffffffe66) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0x3f, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xd}}, 0x5}}, 0x24) 17:41:10 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14, 0x0) ioctl$int_out(r2, 0x1, 0x0) 17:41:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffe818315ce3cc7cb2cee5c42da288fa"], 0xfffffffffffffe66) (async) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0x3f, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xd}}, 0x5}}, 0x24) 17:41:10 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14, 0x0) ioctl$int_out(r2, 0x1, 0x0) 17:41:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffe818315ce3cc7cb2cee5c42da288fa"], 0xfffffffffffffe66) (async) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0x3f, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xd}}, 0x5}}, 0x24) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000), 0x2) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000100)={'stack ', 'stack '}, 0xc) 17:41:10 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14, 0x0) ioctl$int_out(r1, 0x5460, &(0x7f0000000140)) ioctl$int_out(r0, 0x1, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'exec ', '%%\x00'}, 0x8) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)={'exec ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x96) 17:41:10 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14, 0x0) ioctl$int_out(r1, 0x5460, &(0x7f0000000140)) (async) ioctl$int_out(r0, 0x1, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000100)={'exec ', '%%\x00'}, 0x8) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)={'exec ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x96) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r1, &(0x7f0000000080)={'exec ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x96) (async) 17:41:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000100)={'stack ', 'stack '}, 0xc) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) (async) write$apparmor_exec(r1, &(0x7f0000000100)={'stack ', 'stack '}, 0xc) (async) 17:41:10 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14, 0x0) ioctl$int_out(r1, 0x5460, &(0x7f0000000140)) (async) ioctl$int_out(r0, 0x1, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'exec ', '%%\x00'}, 0x8) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r1, &(0x7f0000000080)={'exec ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x96) 17:41:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000100)={'stack ', 'stack '}, 0xc) 17:41:10 executing program 5: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) 17:41:10 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="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") ioctl$int_out(r0, 0x1, 0x0) 17:41:10 executing program 4: getuid() r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:10 executing program 5: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) 17:41:10 executing program 5: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) 17:41:10 executing program 4: getuid() r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:10 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="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") ioctl$int_out(r0, 0x1, 0x0) 17:41:10 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="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") ioctl$int_out(r0, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="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") (async) ioctl$int_out(r0, 0x1, 0x0) (async) 17:41:10 executing program 4: getuid() r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000200)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 17:41:10 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'stack ', '*,@\x00'}, 0xa) ioctl$int_out(r0, 0x1, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) 17:41:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#Xu\x9f/\xe8\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc\xefa\xbe\xfeC\xd6\xfa|\xb2\xce\xe1\xd3s5$\xed'}, 0x3d) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000200)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 17:41:10 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'stack ', '*,@\x00'}, 0xa) ioctl$int_out(r0, 0x1, 0x0) (async, rerun: 64) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) (rerun: 64) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000200)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000200)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async) 17:41:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#Xu\x9f/\xe8\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc\xefa\xbe\xfeC\xd6\xfa|\xb2\xce\xe1\xd3s5$\xed'}, 0x3d) 17:41:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#Xu\x9f/\xe8\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc\xefa\xbe\xfeC\xd6\xfa|\xb2\xce\xe1\xd3s5$\xed'}, 0x3d) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f0000000200)={0x2, 0x4, {0xff, @usage=0x6, 0x0, 0xcb, 0xfffffffffffffffa, 0x8000000000000001, 0x100, 0xffffffffffff8af2, 0x8a, @struct={0x7133, 0x7}, 0x2, 0x7, [0x9, 0x1, 0x4, 0x8757, 0x6, 0x401]}, {0x80, @struct={0x7fffffff, 0x3c9}, 0x0, 0x7fffffff, 0x800, 0x5, 0x2, 0x4, 0x4, @struct={0x7, 0x3}, 0x2000000, 0x2a73, [0x1ff, 0x101, 0x7, 0x6, 0xc00000000000, 0x4]}, {0x8, @usage=0x40, 0x0, 0x0, 0xd9, 0x13937f91, 0x4, 0x2, 0x29e, @struct={0xff, 0x9}, 0x2, 0xfffffffe, [0x81, 0x5, 0x400, 0x80000000, 0x8000, 0x4]}, {0x81, 0x8, 0x101}}) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:10 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (rerun: 64) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r1, &(0x7f0000000000)={'stack ', '*,@\x00'}, 0xa) (async) ioctl$int_out(r0, 0x1, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) 17:41:10 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x21c380, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[], 0x45) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f00000000c0)=ANY=[@ANYBLOB="0100002735afc0f2e2b6b200cf51dd5dfbd659509d29b69c7a3beca06d", @ANYRES32=r1, @ANYBLOB="06000000000000002e2f66696c653000"]) 17:41:10 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000001c0), 0x1) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000400)={0x1a, 0x1, {0x7f, @struct={0x9, 0x2}, 0x0, 0x54, 0x7, 0x3, 0x0, 0x7fff, 0x80, @usage=0x6, 0x9, 0x0, [0x8000, 0xffff, 0x20, 0x5, 0x81]}, {0x2, @usage=0x3, 0x0, 0x3, 0x8, 0x8000000000000001, 0x100000001, 0xd5, 0x20, @usage=0x4, 0x0, 0x2, [0x12b, 0x8000000000000000, 0xc5, 0xff, 0x5, 0x1]}, {0x4, @usage=0x4000000, 0x0, 0x8000000000000000, 0x8001, 0x8, 0x40, 0x8, 0x2a, @usage=0xfff, 0x1, 0x8000, [0x7fff, 0x7ff, 0x8001, 0x2, 0x2]}, {0x8, 0x8, 0x7}}) ioctl$BTRFS_IOC_RESIZE(r3, 0x50009403, &(0x7f00000000c0)={{r1}, {@val={r4}, @max}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) ioctl$int_out(r0, 0x1, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r5, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x14, 0x0, 0x100, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x40) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r3}, 0x8) ioctl$BTRFS_IOC_RESIZE(r6, 0x50009403, &(0x7f0000000800)={{r0}, {@void, @actul_num={@void, 0x52, 0x67}}}) sendmsg$AUDIT_USER(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x202}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x64}}, 0x10) 17:41:10 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x21c380, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[], 0x45) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f00000000c0)=ANY=[@ANYBLOB="0100002735afc0f2e2b6b200cf51dd5dfbd659509d29b69c7a3beca06d", @ANYRES32=r1, @ANYBLOB="06000000000000002e2f66696c653000"]) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f0000000200)={0x2, 0x4, {0xff, @usage=0x6, 0x0, 0xcb, 0xfffffffffffffffa, 0x8000000000000001, 0x100, 0xffffffffffff8af2, 0x8a, @struct={0x7133, 0x7}, 0x2, 0x7, [0x9, 0x1, 0x4, 0x8757, 0x6, 0x401]}, {0x80, @struct={0x7fffffff, 0x3c9}, 0x0, 0x7fffffff, 0x800, 0x5, 0x2, 0x4, 0x4, @struct={0x7, 0x3}, 0x2000000, 0x2a73, [0x1ff, 0x101, 0x7, 0x6, 0xc00000000000, 0x4]}, {0x8, @usage=0x40, 0x0, 0x0, 0xd9, 0x13937f91, 0x4, 0x2, 0x29e, @struct={0xff, 0x9}, 0x2, 0xfffffffe, [0x81, 0x5, 0x400, 0x80000000, 0x8000, 0x4]}, {0x81, 0x8, 0x101}}) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f0000000200)={0x2, 0x4, {0xff, @usage=0x6, 0x0, 0xcb, 0xfffffffffffffffa, 0x8000000000000001, 0x100, 0xffffffffffff8af2, 0x8a, @struct={0x7133, 0x7}, 0x2, 0x7, [0x9, 0x1, 0x4, 0x8757, 0x6, 0x401]}, {0x80, @struct={0x7fffffff, 0x3c9}, 0x0, 0x7fffffff, 0x800, 0x5, 0x2, 0x4, 0x4, @struct={0x7, 0x3}, 0x2000000, 0x2a73, [0x1ff, 0x101, 0x7, 0x6, 0xc00000000000, 0x4]}, {0x8, @usage=0x40, 0x0, 0x0, 0xd9, 0x13937f91, 0x4, 0x2, 0x29e, @struct={0xff, 0x9}, 0x2, 0xfffffffe, [0x81, 0x5, 0x400, 0x80000000, 0x8000, 0x4]}, {0x81, 0x8, 0x101}}) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:10 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x21c380, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) dup2(r0, 0xffffffffffffffff) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[], 0x45) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f00000000c0)=ANY=[@ANYBLOB="0100002735afc0f2e2b6b200cf51dd5dfbd659509d29b69c7a3beca06d", @ANYRES32=r1, @ANYBLOB="06000000000000002e2f66696c653000"]) 17:41:10 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000001c0), 0x1) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000400)={0x1a, 0x1, {0x7f, @struct={0x9, 0x2}, 0x0, 0x54, 0x7, 0x3, 0x0, 0x7fff, 0x80, @usage=0x6, 0x9, 0x0, [0x8000, 0xffff, 0x20, 0x5, 0x81]}, {0x2, @usage=0x3, 0x0, 0x3, 0x8, 0x8000000000000001, 0x100000001, 0xd5, 0x20, @usage=0x4, 0x0, 0x2, [0x12b, 0x8000000000000000, 0xc5, 0xff, 0x5, 0x1]}, {0x4, @usage=0x4000000, 0x0, 0x8000000000000000, 0x8001, 0x8, 0x40, 0x8, 0x2a, @usage=0xfff, 0x1, 0x8000, [0x7fff, 0x7ff, 0x8001, 0x2, 0x2]}, {0x8, 0x8, 0x7}}) ioctl$BTRFS_IOC_RESIZE(r3, 0x50009403, &(0x7f00000000c0)={{r1}, {@val={r4}, @max}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) (async) ioctl$int_out(r0, 0x1, 0x0) (async) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r5, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x14, 0x0, 0x100, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x40) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r3}, 0x8) ioctl$BTRFS_IOC_RESIZE(r6, 0x50009403, &(0x7f0000000800)={{r0}, {@void, @actul_num={@void, 0x52, 0x67}}}) (async) sendmsg$AUDIT_USER(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x202}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="64000000ed03000228bd7000fedbdf2524be20d190ae1d31d42fb378a520712f878f9e0a973916ccd14840b49355ec74db197ef61d3b7d58493b99f71c74913c4a11556e565e9ce1cdeed0315018fba796f3e4ecdd9e0c8c0e56c965ba2d8183bfd00000dbcd0d035c915f67313acb2b79bc8f30da025b10170d6dedb99be6e014b39aed5105e91fef37b0b44239c47353d73593ac66c600226d75dd3fd7d84b0d6babc8ade89432275a0a83528f6627ad0066427fd7c78e283630532330c787b45774c8710d3523d18eff66904cb68f6c02f0f43d1667851838412618a77f0d961cb882910a9947ee96e83535142cfa6da4855553fb306e8e98f8a3518a577d3c591bf5847526a69a7dc7ba274e4e82c2f4839799821e7b0fd5810a24918fb8eaf922e46d945bd9c954c7220c0d6e265788e2fece84953aec7e281d636374edf9e56ba034d7e83f7052c2d6e7e3165841a5d0862d2fddfca1e7633d35f80000675eed7aae21c77c251c7ef7847f88d603254d04c34f2dd8674be45ddbcb1a0023f5fdbbb619ab5a017a0105b0d5f52bfa99eceb6b2152d0315660ea5e7551a8fa40552593ce237bc4d2c825b2b10b35a035f3181e02a06f7a82b11ddfcd99cdfa92f660f15a595a13aeffc5f3e253b60f7cc15fa5a650b759f70d0000000000000000200000000000"], 0x64}}, 0x10) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x7fffffff, 0x64100) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r1, 0xc01064ac, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000080)=""/2}) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x7fffffff, 0x64100) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r1, 0xc01064ac, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000080)=""/2}) 17:41:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0x60, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665fb8017720e006a670000000000008a95ffc818315ce3cc7cb2cee5c42da288fa000000"], 0xfffffffffffffe66) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000040)) 17:41:10 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 32) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) (async, rerun: 32) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000001c0), 0x1) (async) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000400)={0x1a, 0x1, {0x7f, @struct={0x9, 0x2}, 0x0, 0x54, 0x7, 0x3, 0x0, 0x7fff, 0x80, @usage=0x6, 0x9, 0x0, [0x8000, 0xffff, 0x20, 0x5, 0x81]}, {0x2, @usage=0x3, 0x0, 0x3, 0x8, 0x8000000000000001, 0x100000001, 0xd5, 0x20, @usage=0x4, 0x0, 0x2, [0x12b, 0x8000000000000000, 0xc5, 0xff, 0x5, 0x1]}, {0x4, @usage=0x4000000, 0x0, 0x8000000000000000, 0x8001, 0x8, 0x40, 0x8, 0x2a, @usage=0xfff, 0x1, 0x8000, [0x7fff, 0x7ff, 0x8001, 0x2, 0x2]}, {0x8, 0x8, 0x7}}) ioctl$BTRFS_IOC_RESIZE(r3, 0x50009403, &(0x7f00000000c0)={{r1}, {@val={r4}, @max}}) (async) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) (async) ioctl$int_out(r0, 0x1, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r5, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x14, 0x0, 0x100, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x40) (async, rerun: 32) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r3}, 0x8) (rerun: 32) ioctl$BTRFS_IOC_RESIZE(r6, 0x50009403, &(0x7f0000000800)={{r0}, {@void, @actul_num={@void, 0x52, 0x67}}}) (async) sendmsg$AUDIT_USER(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x202}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x64}}, 0x10) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x7fffffff, 0x64100) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r1, 0xc01064ac, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000080)=""/2}) 17:41:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0x60, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) (async) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665fb8017720e006a670000000000008a95ffc818315ce3cc7cb2cee5c42da288fa000000"], 0xfffffffffffffe66) (async) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000040)) 17:41:10 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000), 0x804080, 0x0) r2 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000140)={{r2}, {@void, @max}}) ioctl$int_out(r0, 0x1, 0x0) 17:41:10 executing program 5: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000440)={'exec ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\x01\x00\x00\x00\x00\x00\x00\x00\x92<4\xc5\xa8\x0e\xb3\xa3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%+\xfb\x99-7\xd8\x1562AJq,\xad\xe4.y\x0fIE\x18&\xcd84pMp\xfex-\x0e\x96\xe7\xfb\xa3t1\xe4\x0e\x13\xeb\xcc5\a\xf15\xda\x132\x95\xa2\x15\x1a\xd8\xe4\xb4\xb8\xdf-\xd5p\xd3}\x8axv\xed\x1aG\x7f\x12+s5\x80\xfd\x86gg#k\x12\xcd\xad\x85\xc3RJ`\n\x8a\xc9\xf9c!\x12\xbc\xf6Y\x1c\x0e\xdd\xb1\x9es\x1fD\xa8|\xa2\x8b\x91\x14\x81s\rM;\x90\xd0]\xeeb\xb6\xe4_\x14m\xa7\xd7\xee\xdc3\xe1\x99M$\xe7\xaeh\x9e\t\x04\x0f\xc4\x05\xf9\xa0\\f\xe1\xb5\x9a\xc3\x9ag\x98\x00\x8d\xe3\xa6b\xbc\x7f\xc7\xe1\xec\xd5\xfe\x18=W\x0e\xbf\xfd\xd94\xe4\x05\xc8 G]\xa9]\x7f\xae^_\t\xb5\xbe\xafV\xf2\xa7\xae\xa3*r\x01k1\x10#&\xa4\xd9\x96uz\xbb6\x1d\xbba\x02\xcc\xa0y\x83\xa7\x9c\x0e\bT\"\xcc\xf9\xf6\x8d\xa9\xc8\x81-\xf2Z\xe8N\x90\xd9\x91\t\x16\x13\x8c\xaa\xc5u0q\xbbC\x00\xb1\xf1;.\x8d\xd7\xb0\x97\x85\xf1\xa2\xea\xe6\xfe\x9e\xe0Y\x03.\xab\x98\xd0\xd8\x98aR\xd0%{\xeb\x91^\xd8\f_\x06\x12\\#w\"ajT\x90\xeb\xa3\xeb\xbe\xc5\x9d\x1e\x1a1T\x96\xb0\xd7\x03\x97\xf8=\x19E%$\xf5\x0e\xa4\xb8\x1f\xad\x19\xca-\xad;n7\'\xda,\xb6\xd6\xaag\xdd[\xa0\v\x8b\xe7\xc2\xfb?\xd6\x93\xf0\x95%\x18\"\xafDD\b\xc7[\xf3\x8a\x10\xf1\x18$\x11pA\xf4Z\x7f\xb0\xbf\xf3\xe5\xca-[\xf6\x90\r\x1ckq\x98\x00\x89\x82\xfc\xcao\xe0\x1b3\xe2\xe5\xf5\x97l\x94s6\xbd\x93\xf7\xecq\xcc\x1dV\xfa\xebEO\xfb\x05X\xff|3\xdb\xeaU\xfe}\x98\x8f\x80!>8<\xd4V\x99~\xec@\x11\xf8K\x8b\xe9#\f\xc3\xf3qv'}, 0x251) 17:41:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0x60, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665fb8017720e006a670000000000008a95ffc818315ce3cc7cb2cee5c42da288fa000000"], 0xfffffffffffffe66) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000040)) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0x60, 0x0) (async) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) (async) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665fb8017720e006a670000000000008a95ffc818315ce3cc7cb2cee5c42da288fa000000"], 0xfffffffffffffe66) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000040)) (async) 17:41:10 executing program 5: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000440)={'exec ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\x01\x00\x00\x00\x00\x00\x00\x00\x92<4\xc5\xa8\x0e\xb3\xa3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%+\xfb\x99-7\xd8\x1562AJq,\xad\xe4.y\x0fIE\x18&\xcd84pMp\xfex-\x0e\x96\xe7\xfb\xa3t1\xe4\x0e\x13\xeb\xcc5\a\xf15\xda\x132\x95\xa2\x15\x1a\xd8\xe4\xb4\xb8\xdf-\xd5p\xd3}\x8axv\xed\x1aG\x7f\x12+s5\x80\xfd\x86gg#k\x12\xcd\xad\x85\xc3RJ`\n\x8a\xc9\xf9c!\x12\xbc\xf6Y\x1c\x0e\xdd\xb1\x9es\x1fD\xa8|\xa2\x8b\x91\x14\x81s\rM;\x90\xd0]\xeeb\xb6\xe4_\x14m\xa7\xd7\xee\xdc3\xe1\x99M$\xe7\xaeh\x9e\t\x04\x0f\xc4\x05\xf9\xa0\\f\xe1\xb5\x9a\xc3\x9ag\x98\x00\x8d\xe3\xa6b\xbc\x7f\xc7\xe1\xec\xd5\xfe\x18=W\x0e\xbf\xfd\xd94\xe4\x05\xc8 G]\xa9]\x7f\xae^_\t\xb5\xbe\xafV\xf2\xa7\xae\xa3*r\x01k1\x10#&\xa4\xd9\x96uz\xbb6\x1d\xbba\x02\xcc\xa0y\x83\xa7\x9c\x0e\bT\"\xcc\xf9\xf6\x8d\xa9\xc8\x81-\xf2Z\xe8N\x90\xd9\x91\t\x16\x13\x8c\xaa\xc5u0q\xbbC\x00\xb1\xf1;.\x8d\xd7\xb0\x97\x85\xf1\xa2\xea\xe6\xfe\x9e\xe0Y\x03.\xab\x98\xd0\xd8\x98aR\xd0%{\xeb\x91^\xd8\f_\x06\x12\\#w\"ajT\x90\xeb\xa3\xeb\xbe\xc5\x9d\x1e\x1a1T\x96\xb0\xd7\x03\x97\xf8=\x19E%$\xf5\x0e\xa4\xb8\x1f\xad\x19\xca-\xad;n7\'\xda,\xb6\xd6\xaag\xdd[\xa0\v\x8b\xe7\xc2\xfb?\xd6\x93\xf0\x95%\x18\"\xafDD\b\xc7[\xf3\x8a\x10\xf1\x18$\x11pA\xf4Z\x7f\xb0\xbf\xf3\xe5\xca-[\xf6\x90\r\x1ckq\x98\x00\x89\x82\xfc\xcao\xe0\x1b3\xe2\xe5\xf5\x97l\x94s6\xbd\x93\xf7\xecq\xcc\x1dV\xfa\xebEO\xfb\x05X\xff|3\xdb\xeaU\xfe}\x98\x8f\x80!>8<\xd4V\x99~\xec@\x11\xf8K\x8b\xe9#\f\xc3\xf3qv'}, 0x251) 17:41:10 executing program 4: socket$packet(0x11, 0x0, 0x300) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209a50b288c92faf13e5f82358aa3665ea1288fb8017720ecbbcd60000cc7cb2cee5c42da288fa00"/69], 0xfffffffffffffe66) 17:41:10 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000), 0x804080, 0x0) (async) r2 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000140)={{r2}, {@void, @max}}) (async) ioctl$int_out(r0, 0x1, 0x0) 17:41:10 executing program 5: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000440)={'exec ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\x01\x00\x00\x00\x00\x00\x00\x00\x92<4\xc5\xa8\x0e\xb3\xa3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%+\xfb\x99-7\xd8\x1562AJq,\xad\xe4.y\x0fIE\x18&\xcd84pMp\xfex-\x0e\x96\xe7\xfb\xa3t1\xe4\x0e\x13\xeb\xcc5\a\xf15\xda\x132\x95\xa2\x15\x1a\xd8\xe4\xb4\xb8\xdf-\xd5p\xd3}\x8axv\xed\x1aG\x7f\x12+s5\x80\xfd\x86gg#k\x12\xcd\xad\x85\xc3RJ`\n\x8a\xc9\xf9c!\x12\xbc\xf6Y\x1c\x0e\xdd\xb1\x9es\x1fD\xa8|\xa2\x8b\x91\x14\x81s\rM;\x90\xd0]\xeeb\xb6\xe4_\x14m\xa7\xd7\xee\xdc3\xe1\x99M$\xe7\xaeh\x9e\t\x04\x0f\xc4\x05\xf9\xa0\\f\xe1\xb5\x9a\xc3\x9ag\x98\x00\x8d\xe3\xa6b\xbc\x7f\xc7\xe1\xec\xd5\xfe\x18=W\x0e\xbf\xfd\xd94\xe4\x05\xc8 G]\xa9]\x7f\xae^_\t\xb5\xbe\xafV\xf2\xa7\xae\xa3*r\x01k1\x10#&\xa4\xd9\x96uz\xbb6\x1d\xbba\x02\xcc\xa0y\x83\xa7\x9c\x0e\bT\"\xcc\xf9\xf6\x8d\xa9\xc8\x81-\xf2Z\xe8N\x90\xd9\x91\t\x16\x13\x8c\xaa\xc5u0q\xbbC\x00\xb1\xf1;.\x8d\xd7\xb0\x97\x85\xf1\xa2\xea\xe6\xfe\x9e\xe0Y\x03.\xab\x98\xd0\xd8\x98aR\xd0%{\xeb\x91^\xd8\f_\x06\x12\\#w\"ajT\x90\xeb\xa3\xeb\xbe\xc5\x9d\x1e\x1a1T\x96\xb0\xd7\x03\x97\xf8=\x19E%$\xf5\x0e\xa4\xb8\x1f\xad\x19\xca-\xad;n7\'\xda,\xb6\xd6\xaag\xdd[\xa0\v\x8b\xe7\xc2\xfb?\xd6\x93\xf0\x95%\x18\"\xafDD\b\xc7[\xf3\x8a\x10\xf1\x18$\x11pA\xf4Z\x7f\xb0\xbf\xf3\xe5\xca-[\xf6\x90\r\x1ckq\x98\x00\x89\x82\xfc\xcao\xe0\x1b3\xe2\xe5\xf5\x97l\x94s6\xbd\x93\xf7\xecq\xcc\x1dV\xfa\xebEO\xfb\x05X\xff|3\xdb\xeaU\xfe}\x98\x8f\x80!>8<\xd4V\x99~\xec@\x11\xf8K\x8b\xe9#\f\xc3\xf3qv'}, 0x251) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x97) 17:41:10 executing program 4: socket$packet(0x11, 0x0, 0x300) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209a50b288c92faf13e5f82358aa3665ea1288fb8017720ecbbcd60000cc7cb2cee5c42da288fa00"/69], 0xfffffffffffffe66) socket$packet(0x11, 0x0, 0x300) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209a50b288c92faf13e5f82358aa3665ea1288fb8017720ecbbcd60000cc7cb2cee5c42da288fa00"/69], 0xfffffffffffffe66) (async) 17:41:10 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000), 0x804080, 0x0) (rerun: 64) r2 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000140)={{r2}, {@void, @max}}) (async) ioctl$int_out(r0, 0x1, 0x0) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x97) 17:41:10 executing program 4: socket$packet(0x11, 0x0, 0x300) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209a50b288c92faf13e5f82358aa3665ea1288fb8017720ecbbcd60000cc7cb2cee5c42da288fa00"/69], 0xfffffffffffffe66) socket$packet(0x11, 0x0, 0x300) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209a50b288c92faf13e5f82358aa3665ea1288fb8017720ecbbcd60000cc7cb2cee5c42da288fa00"/69], 0xfffffffffffffe66) (async) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x97) 17:41:10 executing program 2: connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000), 0x10) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3dc2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fc4f6"], 0x97) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000000)={0x0, 0xd2}, 0x2) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r1, 0x0, 0x25, 0x6}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x10400, 0x0) dup2(r2, r3) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="07000000200099702e2f6669446530f5"]) 17:41:10 executing program 2: connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000), 0x10) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) 17:41:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a094fab10dd03d11cf8af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fadaba583398acc4477a"], 0xfffffffffffffe66) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3dc2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fc4f6"], 0x97) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000000)={0x0, 0xd2}, 0x2) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r1, 0x0, 0x25, 0x6}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x10400, 0x0) dup2(r2, r3) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="07000000200099702e2f6669446530f5"]) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3dc2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fc4f6"], 0x97) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000000)={0x0, 0xd2}, 0x2) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r1, 0x0, 0x25, 0x6}, 0x10) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x10400, 0x0) (async) dup2(r2, r3) (async) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="07000000200099702e2f6669446530f5"]) (async) 17:41:10 executing program 2: connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000), 0x10) (async) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) 17:41:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a094fab10dd03d11cf8af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fadaba583398acc4477a"], 0xfffffffffffffe66) 17:41:10 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$int_out(r0, 0x1, 0x0) 17:41:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a094fab10dd03d11cf8af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fadaba583398acc4477a"], 0xfffffffffffffe66) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a094fab10dd03d11cf8af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fadaba583398acc4477a"], 0xfffffffffffffe66) (async) 17:41:10 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$int_out(r0, 0x1, 0x0) 17:41:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3dc2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fc4f6"], 0x97) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000000)={0x0, 0xd2}, 0x2) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r1, 0x0, 0x25, 0x6}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x10400, 0x0) dup2(r2, r3) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="07000000200099702e2f6669446530f5"]) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3dc2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fc4f6"], 0x97) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000000)={0x0, 0xd2}, 0x2) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r1, 0x0, 0x25, 0x6}, 0x10) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x10400, 0x0) (async) dup2(r2, r3) (async) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="07000000200099702e2f6669446530f5"]) (async) 17:41:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'exec ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xe9\xffL\xbc\xf0\xb3\xda\xb0~\x88\xcbx\xea\xfc\xee\xa2\x00\x00gL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x181\\\xe3\xcc|\xb2\xcee\x89rU\x88\x05E\xd6\xa8#\x89c\xc8\xe5\xc4\x03\x00\x88\xd0MI\xd6\xd7\x98\x8aT\xd6\x14aN\xae.\xe93L]:\xd2\xe8\xdb\xe8\xea\x9f\xa3B\xdd\x10\xa6\x0eWx%\\G\xc5\x0f\xfbc\xc6\x9a\xd6\xa6\xc5\"u\xe1\xbf\x95\x8a\xa6\x97~\xee\xa1\xe3\xd6\x96\x00'/151}, 0x9c) 17:41:11 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$int_out(r0, 0x1, 0x0) 17:41:11 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'exec ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xe9\xffL\xbc\xf0\xb3\xda\xb0~\x88\xcbx\xea\xfc\xee\xa2\x00\x00gL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x181\\\xe3\xcc|\xb2\xcee\x89rU\x88\x05E\xd6\xa8#\x89c\xc8\xe5\xc4\x03\x00\x88\xd0MI\xd6\xd7\x98\x8aT\xd6\x14aN\xae.\xe93L]:\xd2\xe8\xdb\xe8\xea\x9f\xa3B\xdd\x10\xa6\x0eWx%\\G\xc5\x0f\xfbc\xc6\x9a\xd6\xa6\xc5\"u\xe1\xbf\x95\x8a\xa6\x97~\xee\xa1\xe3\xd6\x96\x00'/151}, 0x9c) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000100)={'exec ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xe9\xffL\xbc\xf0\xb3\xda\xb0~\x88\xcbx\xea\xfc\xee\xa2\x00\x00gL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x181\\\xe3\xcc|\xb2\xcee\x89rU\x88\x05E\xd6\xa8#\x89c\xc8\xe5\xc4\x03\x00\x88\xd0MI\xd6\xd7\x98\x8aT\xd6\x14aN\xae.\xe93L]:\xd2\xe8\xdb\xe8\xea\x9f\xa3B\xdd\x10\xa6\x0eWx%\\G\xc5\x0f\xfbc\xc6\x9a\xd6\xa6\xc5\"u\xe1\xbf\x95\x8a\xa6\x97~\xee\xa1\xe3\xd6\x96\x00'/151}, 0x9c) (async) 17:41:11 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="4cb14180773675b49e226a3c2d0f7cfa37befe5b3526485d685d0330fa0be70a14a5438ad35f677305ded6121661b0b6d08b50209c15e95a7f9ff6ee12672268dd7b521ee6974d5f613def20a73c8afd8aab82ae0747fc0be6730000000000000000ecac1d2f6ad3dbec8a1dad7fa506f041b21022aec4db91057387dfd239fed138aa4c0e192feeaeb97e71dda611ed13b8751f76ba51e4343055a1eeaeaa50c99c129a2530116b82f0ad265eff54a6afd0cf39ce8e1265f22f9795148903dfb9918d82d8621aea400f358765977f7f4fcc4078f60b1c4fba14cc56160859074b67deef2b6df005233753fe472370e32d3e41e5b2e73f00") bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000180)={0x27, 0x0, 0x2, 0x3, 0x20, 0xf9, "f313f750aaee5d8f9cb91fb78cf303ce33c1f84ebb3e47cce9b596d2925fa2e83c173bf13cec09e7b602af2fdb8fce33ff4f40bf5cf9a1c0f908b1bf23c991", 0x2d}, 0x60) 17:41:11 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f0000000000)=0x4, 0x4) socket$nl_crypto(0x10, 0x3, 0x15) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="100100008000000000ba7000fddbdf25cc12700ef1f52204c8a7eec4c7314331c6c27586c8bdc8fbec9e88e2ec65ebce6c3820947cd787995b037f3ae78da2d2830c8845e82806176fbbfb0e36b3d91938bbbffdc7cab76975e380e79ed73beb9beae49a0260917cf768c23beb80117b41"], 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x24044001) 17:41:11 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="4cb14180773675b49e226a3c2d0f7cfa37befe5b3526485d685d0330fa0be70a14a5438ad35f677305ded6121661b0b6d08b50209c15e95a7f9ff6ee12672268dd7b521ee6974d5f613def20a73c8afd8aab82ae0747fc0be6730000000000000000ecac1d2f6ad3dbec8a1dad7fa506f041b21022aec4db91057387dfd239fed138aa4c0e192feeaeb97e71dda611ed13b8751f76ba51e4343055a1eeaeaa50c99c129a2530116b82f0ad265eff54a6afd0cf39ce8e1265f22f9795148903dfb9918d82d8621aea400f358765977f7f4fcc4078f60b1c4fba14cc56160859074b67deef2b6df005233753fe472370e32d3e41e5b2e73f00") bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000180)={0x27, 0x0, 0x2, 0x3, 0x20, 0xf9, "f313f750aaee5d8f9cb91fb78cf303ce33c1f84ebb3e47cce9b596d2925fa2e83c173bf13cec09e7b602af2fdb8fce33ff4f40bf5cf9a1c0f908b1bf23c991", 0x2d}, 0x60) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$int_out(r0, 0x1, 0x0) (async) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="4cb14180773675b49e226a3c2d0f7cfa37befe5b3526485d685d0330fa0be70a14a5438ad35f677305ded6121661b0b6d08b50209c15e95a7f9ff6ee12672268dd7b521ee6974d5f613def20a73c8afd8aab82ae0747fc0be6730000000000000000ecac1d2f6ad3dbec8a1dad7fa506f041b21022aec4db91057387dfd239fed138aa4c0e192feeaeb97e71dda611ed13b8751f76ba51e4343055a1eeaeaa50c99c129a2530116b82f0ad265eff54a6afd0cf39ce8e1265f22f9795148903dfb9918d82d8621aea400f358765977f7f4fcc4078f60b1c4fba14cc56160859074b67deef2b6df005233753fe472370e32d3e41e5b2e73f00") (async) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000180)={0x27, 0x0, 0x2, 0x3, 0x20, 0xf9, "f313f750aaee5d8f9cb91fb78cf303ce33c1f84ebb3e47cce9b596d2925fa2e83c173bf13cec09e7b602af2fdb8fce33ff4f40bf5cf9a1c0f908b1bf23c991", 0x2d}, 0x60) (async) 17:41:11 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'exec ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xe9\xffL\xbc\xf0\xb3\xda\xb0~\x88\xcbx\xea\xfc\xee\xa2\x00\x00gL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x181\\\xe3\xcc|\xb2\xcee\x89rU\x88\x05E\xd6\xa8#\x89c\xc8\xe5\xc4\x03\x00\x88\xd0MI\xd6\xd7\x98\x8aT\xd6\x14aN\xae.\xe93L]:\xd2\xe8\xdb\xe8\xea\x9f\xa3B\xdd\x10\xa6\x0eWx%\\G\xc5\x0f\xfbc\xc6\x9a\xd6\xa6\xc5\"u\xe1\xbf\x95\x8a\xa6\x97~\xee\xa1\xe3\xd6\x96\x00'/151}, 0x9c) 17:41:11 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f0000000000)=0x4, 0x4) (async) socket$nl_crypto(0x10, 0x3, 0x15) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="100100008000000000ba7000fddbdf25cc12700ef1f52204c8a7eec4c7314331c6c27586c8bdc8fbec9e88e2ec65ebce6c3820947cd787995b037f3ae78da2d2830c8845e82806176fbbfb0e36b3d91938bbbffdc7cab76975e380e79ed73beb9beae49a0260917cf768c23beb80117b41"], 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x24044001) 17:41:11 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af9c84573e140743549b008ccee9c1af71accaa3665ea1288fb8017720e00000000ca757597438a95ff74847d09302b02"], 0xfffffffffffffe66) 17:41:11 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="4cb14180773675b49e226a3c2d0f7cfa37befe5b3526485d685d0330fa0be70a14a5438ad35f677305ded6121661b0b6d08b50209c15e95a7f9ff6ee12672268dd7b521ee6974d5f613def20a73c8afd8aab82ae0747fc0be6730000000000000000ecac1d2f6ad3dbec8a1dad7fa506f041b21022aec4db91057387dfd239fed138aa4c0e192feeaeb97e71dda611ed13b8751f76ba51e4343055a1eeaeaa50c99c129a2530116b82f0ad265eff54a6afd0cf39ce8e1265f22f9795148903dfb9918d82d8621aea400f358765977f7f4fcc4078f60b1c4fba14cc56160859074b67deef2b6df005233753fe472370e32d3e41e5b2e73f00") (async) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000180)={0x27, 0x0, 0x2, 0x3, 0x20, 0xf9, "f313f750aaee5d8f9cb91fb78cf303ce33c1f84ebb3e47cce9b596d2925fa2e83c173bf13cec09e7b602af2fdb8fce33ff4f40bf5cf9a1c0f908b1bf23c991", 0x2d}, 0x60) 17:41:11 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af9c84573e140743549b008ccee9c1af71accaa3665ea1288fb8017720e00000000ca757597438a95ff74847d09302b02"], 0xfffffffffffffe66) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) syz_open_dev$ptys(0xc, 0x3, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af9c84573e140743549b008ccee9c1af71accaa3665ea1288fb8017720e00000000ca757597438a95ff74847d09302b02"], 0xfffffffffffffe66) (async) 17:41:11 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f0000000000)=0x4, 0x4) socket$nl_crypto(0x10, 0x3, 0x15) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="100100008000000000ba7000fddbdf25cc12700ef1f52204c8a7eec4c7314331c6c27586c8bdc8fbec9e88e2ec65ebce6c3820947cd787995b037f3ae78da2d2830c8845e82806176fbbfb0e36b3d91938bbbffdc7cab76975e380e79ed73beb9beae49a0260917cf768c23beb80117b41"], 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x24044001) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f0000000000)=0x4, 0x4) (async) socket$nl_crypto(0x10, 0x3, 0x15) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) (async) socket$nl_crypto(0x10, 0x3, 0x15) (async) sendmsg$nl_crypto(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="100100008000000000ba7000fddbdf25cc12700ef1f52204c8a7eec4c7314331c6c27586c8bdc8fbec9e88e2ec65ebce6c3820947cd787995b037f3ae78da2d2830c8845e82806176fbbfb0e36b3d91938bbbffdc7cab76975e380e79ed73beb9beae49a0260917cf768c23beb80117b41"], 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x24044001) (async) 17:41:11 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$packet(r1, 0x0, 0xffffffffffffffb9, 0x4040064, 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_pressure(r2, &(0x7f00000000c0)='memory.pressure\x00', 0x2, 0x0) ioctl$int_out(r0, 0xee203b309084ad23, 0x0) 17:41:11 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) syz_open_dev$ptys(0xc, 0x3, 0x0) (rerun: 64) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af9c84573e140743549b008ccee9c1af71accaa3665ea1288fb8017720e00000000ca757597438a95ff74847d09302b02"], 0xfffffffffffffe66) 17:41:11 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) openat$cgroup_pressure(r1, &(0x7f0000000000)='cpu.pressure\x00', 0x2, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1f3) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r2}, 0x8) 17:41:11 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$packet(r1, 0x0, 0xffffffffffffffb9, 0x4040064, 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_pressure(r2, &(0x7f00000000c0)='memory.pressure\x00', 0x2, 0x0) ioctl$int_out(r0, 0xee203b309084ad23, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0xffffffffffffffb9, 0x4040064, 0x0, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_pressure(r2, &(0x7f00000000c0)='memory.pressure\x00', 0x2, 0x0) (async) ioctl$int_out(r0, 0xee203b309084ad23, 0x0) (async) 17:41:11 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0x44) 17:41:11 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0xffffffffffffffb9, 0x4040064, 0x0, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_pressure(r2, &(0x7f00000000c0)='memory.pressure\x00', 0x2, 0x0) (async) ioctl$int_out(r0, 0xee203b309084ad23, 0x0) 17:41:11 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 32) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (rerun: 32) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) openat$cgroup_pressure(r1, &(0x7f0000000000)='cpu.pressure\x00', 0x2, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1f3) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r2}, 0x8) 17:41:11 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0x44) 17:41:11 executing program 2: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r0, 0x300, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r1, 0x1, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000005c0), 0x101000, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000640), 0xffffffffffffffff) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000007c0)={0x0, 0x1, 0x6}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000006c0)=0x14) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x34, r3, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x34}, 0x1, 0x0, 0x0, 0x81}, 0x11) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000180)={0x0, 0x1, 0x1, [0x8, 0x101, 0x2dd, 0x9, 0x2], [0x1, 0x7, 0x8, 0x2, 0x0, 0x2, 0x400, 0x13, 0x200, 0x8000000000000000, 0x6, 0x3, 0x4, 0x5, 0x1ff, 0x6, 0x8c, 0x1, 0xeb4, 0x40, 0x8, 0x9, 0x101, 0x5, 0x5, 0x7f, 0x1, 0x81, 0x3, 0x401, 0x0, 0x7, 0x9, 0x1, 0x3, 0xfffffffffffffff7, 0x8000, 0x1, 0x5ce8, 0x7f, 0x2, 0x1, 0x7, 0x0, 0x78d, 0x3, 0x9, 0x0, 0x4, 0xffffffff, 0x1, 0xff2, 0x3, 0x1, 0x7, 0x7, 0x3, 0x9, 0x8001, 0xcf, 0x9, 0x5, 0xd0b4, 0x8, 0x3, 0x3, 0x0, 0x9, 0x8, 0x0, 0x1, 0xab69, 0x3, 0x8, 0x5, 0x7, 0x7, 0x1, 0x6, 0xc553, 0x10000, 0x9, 0x0, 0x80, 0x4, 0xfffffffffffffeff, 0x9, 0xa3c, 0x100000000, 0x5, 0x7, 0x7, 0x2, 0x6, 0x8000000000000001, 0x0, 0xf3, 0x2, 0x7, 0x5404d48e, 0x3, 0x0, 0x4, 0x800000000000000, 0x7fffffff, 0x2, 0x400, 0x0, 0xfffffffffffffff7, 0x5, 0x5, 0x4, 0x3, 0x9, 0x3, 0x7fffffffffffffff, 0x80, 0x2, 0x2, 0x7, 0x123]}) 17:41:11 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0x44) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0x44) (async) 17:41:11 executing program 2: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r0, 0x300, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r1, 0x1, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000005c0), 0x101000, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000640), 0xffffffffffffffff) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000007c0)={0x0, 0x1, 0x6}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000006c0)=0x14) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x34, r3, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x34}, 0x1, 0x0, 0x0, 0x81}, 0x11) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000180)={0x0, 0x1, 0x1, [0x8, 0x101, 0x2dd, 0x9, 0x2], [0x1, 0x7, 0x8, 0x2, 0x0, 0x2, 0x400, 0x13, 0x200, 0x8000000000000000, 0x6, 0x3, 0x4, 0x5, 0x1ff, 0x6, 0x8c, 0x1, 0xeb4, 0x40, 0x8, 0x9, 0x101, 0x5, 0x5, 0x7f, 0x1, 0x81, 0x3, 0x401, 0x0, 0x7, 0x9, 0x1, 0x3, 0xfffffffffffffff7, 0x8000, 0x1, 0x5ce8, 0x7f, 0x2, 0x1, 0x7, 0x0, 0x78d, 0x3, 0x9, 0x0, 0x4, 0xffffffff, 0x1, 0xff2, 0x3, 0x1, 0x7, 0x7, 0x3, 0x9, 0x8001, 0xcf, 0x9, 0x5, 0xd0b4, 0x8, 0x3, 0x3, 0x0, 0x9, 0x8, 0x0, 0x1, 0xab69, 0x3, 0x8, 0x5, 0x7, 0x7, 0x1, 0x6, 0xc553, 0x10000, 0x9, 0x0, 0x80, 0x4, 0xfffffffffffffeff, 0x9, 0xa3c, 0x100000000, 0x5, 0x7, 0x7, 0x2, 0x6, 0x8000000000000001, 0x0, 0xf3, 0x2, 0x7, 0x5404d48e, 0x3, 0x0, 0x4, 0x800000000000000, 0x7fffffff, 0x2, 0x400, 0x0, 0xfffffffffffffff7, 0x5, 0x5, 0x4, 0x3, 0x9, 0x3, 0x7fffffffffffffff, 0x80, 0x2, 0x2, 0x7, 0x123]}) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r0, 0x300, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$int_out(r1, 0x1, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000005c0), 0x101000, 0x0) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000640), 0xffffffffffffffff) (async) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000007c0)={0x0, 0x1, 0x6}, 0x10) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000006c0)=0x14) (async) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x34, r3, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x34}, 0x1, 0x0, 0x0, 0x81}, 0x11) (async) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000180)={0x0, 0x1, 0x1, [0x8, 0x101, 0x2dd, 0x9, 0x2], [0x1, 0x7, 0x8, 0x2, 0x0, 0x2, 0x400, 0x13, 0x200, 0x8000000000000000, 0x6, 0x3, 0x4, 0x5, 0x1ff, 0x6, 0x8c, 0x1, 0xeb4, 0x40, 0x8, 0x9, 0x101, 0x5, 0x5, 0x7f, 0x1, 0x81, 0x3, 0x401, 0x0, 0x7, 0x9, 0x1, 0x3, 0xfffffffffffffff7, 0x8000, 0x1, 0x5ce8, 0x7f, 0x2, 0x1, 0x7, 0x0, 0x78d, 0x3, 0x9, 0x0, 0x4, 0xffffffff, 0x1, 0xff2, 0x3, 0x1, 0x7, 0x7, 0x3, 0x9, 0x8001, 0xcf, 0x9, 0x5, 0xd0b4, 0x8, 0x3, 0x3, 0x0, 0x9, 0x8, 0x0, 0x1, 0xab69, 0x3, 0x8, 0x5, 0x7, 0x7, 0x1, 0x6, 0xc553, 0x10000, 0x9, 0x0, 0x80, 0x4, 0xfffffffffffffeff, 0x9, 0xa3c, 0x100000000, 0x5, 0x7, 0x7, 0x2, 0x6, 0x8000000000000001, 0x0, 0xf3, 0x2, 0x7, 0x5404d48e, 0x3, 0x0, 0x4, 0x800000000000000, 0x7fffffff, 0x2, 0x400, 0x0, 0xfffffffffffffff7, 0x5, 0x5, 0x4, 0x3, 0x9, 0x3, 0x7fffffffffffffff, 0x80, 0x2, 0x2, 0x7, 0x123]}) (async) 17:41:11 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) openat$cgroup_pressure(r1, &(0x7f0000000000)='cpu.pressure\x00', 0x2, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1f3) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r2}, 0x8) 17:41:11 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x521000, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000100)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x9, 0x4a6, 0x0, 0x880, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x2, 0x2, 0x2, 0x2}, 0x48) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r2, 0x942e, 0x0) 17:41:11 executing program 2: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r0, 0x300, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r1, 0x1, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000005c0), 0x101000, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000640), 0xffffffffffffffff) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000007c0)={0x0, 0x1, 0x6}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000006c0)=0x14) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x34, r3, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x34}, 0x1, 0x0, 0x0, 0x81}, 0x11) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000180)={0x0, 0x1, 0x1, [0x8, 0x101, 0x2dd, 0x9, 0x2], [0x1, 0x7, 0x8, 0x2, 0x0, 0x2, 0x400, 0x13, 0x200, 0x8000000000000000, 0x6, 0x3, 0x4, 0x5, 0x1ff, 0x6, 0x8c, 0x1, 0xeb4, 0x40, 0x8, 0x9, 0x101, 0x5, 0x5, 0x7f, 0x1, 0x81, 0x3, 0x401, 0x0, 0x7, 0x9, 0x1, 0x3, 0xfffffffffffffff7, 0x8000, 0x1, 0x5ce8, 0x7f, 0x2, 0x1, 0x7, 0x0, 0x78d, 0x3, 0x9, 0x0, 0x4, 0xffffffff, 0x1, 0xff2, 0x3, 0x1, 0x7, 0x7, 0x3, 0x9, 0x8001, 0xcf, 0x9, 0x5, 0xd0b4, 0x8, 0x3, 0x3, 0x0, 0x9, 0x8, 0x0, 0x1, 0xab69, 0x3, 0x8, 0x5, 0x7, 0x7, 0x1, 0x6, 0xc553, 0x10000, 0x9, 0x0, 0x80, 0x4, 0xfffffffffffffeff, 0x9, 0xa3c, 0x100000000, 0x5, 0x7, 0x7, 0x2, 0x6, 0x8000000000000001, 0x0, 0xf3, 0x2, 0x7, 0x5404d48e, 0x3, 0x0, 0x4, 0x800000000000000, 0x7fffffff, 0x2, 0x400, 0x0, 0xfffffffffffffff7, 0x5, 0x5, 0x4, 0x3, 0x9, 0x3, 0x7fffffffffffffff, 0x80, 0x2, 0x2, 0x7, 0x123]}) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r0, 0x300, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$int_out(r1, 0x1, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000005c0), 0x101000, 0x0) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000640), 0xffffffffffffffff) (async) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000007c0)={0x0, 0x1, 0x6}, 0x10) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000006c0)=0x14) (async) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x34, r3, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x34}, 0x1, 0x0, 0x0, 0x81}, 0x11) (async) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000180)={0x0, 0x1, 0x1, [0x8, 0x101, 0x2dd, 0x9, 0x2], [0x1, 0x7, 0x8, 0x2, 0x0, 0x2, 0x400, 0x13, 0x200, 0x8000000000000000, 0x6, 0x3, 0x4, 0x5, 0x1ff, 0x6, 0x8c, 0x1, 0xeb4, 0x40, 0x8, 0x9, 0x101, 0x5, 0x5, 0x7f, 0x1, 0x81, 0x3, 0x401, 0x0, 0x7, 0x9, 0x1, 0x3, 0xfffffffffffffff7, 0x8000, 0x1, 0x5ce8, 0x7f, 0x2, 0x1, 0x7, 0x0, 0x78d, 0x3, 0x9, 0x0, 0x4, 0xffffffff, 0x1, 0xff2, 0x3, 0x1, 0x7, 0x7, 0x3, 0x9, 0x8001, 0xcf, 0x9, 0x5, 0xd0b4, 0x8, 0x3, 0x3, 0x0, 0x9, 0x8, 0x0, 0x1, 0xab69, 0x3, 0x8, 0x5, 0x7, 0x7, 0x1, 0x6, 0xc553, 0x10000, 0x9, 0x0, 0x80, 0x4, 0xfffffffffffffeff, 0x9, 0xa3c, 0x100000000, 0x5, 0x7, 0x7, 0x2, 0x6, 0x8000000000000001, 0x0, 0xf3, 0x2, 0x7, 0x5404d48e, 0x3, 0x0, 0x4, 0x800000000000000, 0x7fffffff, 0x2, 0x400, 0x0, 0xfffffffffffffff7, 0x5, 0x5, 0x4, 0x3, 0x9, 0x3, 0x7fffffffffffffff, 0x80, 0x2, 0x2, 0x7, 0x123]}) (async) 17:41:11 executing program 5: sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x14, 0x0, 0x400, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x94}, 0x2004c00c) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:11 executing program 5: sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x14, 0x0, 0x400, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x94}, 0x2004c00c) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x14, 0x0, 0x400, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x94}, 0x2004c00c) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) 17:41:11 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x521000, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000100)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x9, 0x4a6, 0x0, 0x880, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x2, 0x2, 0x2, 0x2}, 0x48) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r2, 0x942e, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x521000, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000100)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x9, 0x4a6, 0x0, 0x880, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x2, 0x2, 0x2, 0x2}, 0x48) (async) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r2, 0x942e, 0x0) (async) 17:41:11 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14, 0x800) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f00000000c0)={{r2}, {@val, @actul_num={@val=0x2d, 0x47, 0x4d}}}) [ 2256.365661] kauditd_printk_skb: 351 callbacks suppressed [ 2256.365676] audit: type=1400 audit(1660326071.327:1871): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=22206D27D23285D30A1F9C319CBEB438C43EAF8FE07175BC50567CA41456A4B3D7C354EFF05C5FB66994FDB745C1CBDBFFDCA35966660C1BA2E7FFECF17758FFC4EC88E7EF7C3B923C34C5A80EB3E3659687BC3B3DE2A44F5E89E7AC91C150A5998610B25BA1561263A1044C888863BC958211FE6C2EA060DC52F0DFCDD62340AB9085FE4647301E30EA251663FE9FC4F6 pid=6378 comm="syz-executor.5" 17:41:11 executing program 5: sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x14, 0x0, 0x400, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x94}, 0x2004c00c) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x14, 0x0, 0x400, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x94}, 0x2004c00c) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) 17:41:11 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14, 0x800) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f00000000c0)={{r2}, {@val, @actul_num={@val=0x2d, 0x47, 0x4d}}}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$int_out(r0, 0x1, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14, 0x800) (async) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f00000000c0)={{r2}, {@val, @actul_num={@val=0x2d, 0x47, 0x4d}}}) (async) [ 2256.434515] audit: type=1400 audit(1660326071.387:1872): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=22206D27D23285D30A1F9C319CBEB438C43EAF8FE07175BC50567CA41456A4B3D7C354EFF05C5FB66994FDB745C1CBDBFFDCA35966660C1BA2E7FFECF17758FFC4EC88E7EF7C3B923C34C5A80EB3E3659687BC3B3DE2A44F5E89E7AC91C150A5998610B25BA1561263A1044C888863BC958211FE6C2EA060DC52F0DFCDD62340AB9085FE4647301E30EA251663FE9FC4F6 pid=6383 comm="syz-executor.5" 17:41:11 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x521000, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000100)) (async, rerun: 32) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x9, 0x4a6, 0x0, 0x880, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x2, 0x2, 0x2, 0x2}, 0x48) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r2, 0x942e, 0x0) 17:41:11 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) 17:41:11 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14, 0x800) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f00000000c0)={{r2}, {@val, @actul_num={@val=0x2d, 0x47, 0x4d}}}) 17:41:11 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) (async) 17:41:11 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000180)="b5e7634772be131adc91c1b65d35e529fa9b31b41cb0300376d958c0bcfc1d39754e1522cbcdf77240c7e477d121867fb19e06d6fb70eba4b89e5646d9e4dc9e4ada9ee022205edef740296bb7b43ba9bf53130f274c2dbbb42dc5fcf44b70d0934db5f5c65bf3bb4232124966d0e6c9035e30e2cd8b6f682348abbea7bf7d31665d01dcff2e4a3e5b3126f13673467a99b4b211bd2d252b187f2ade8fb675d157c9146b6eea2d9429a42763b3a5fc390a1fe449d745f22b6205e4fd2b81010d8e", 0xc1}], 0x1, 0x122, 0x7) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'exec ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0x44) [ 2256.500956] audit: type=1400 audit(1660326071.437:1873): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=22206D27D23285D30A1F9C319CBEB438C43EAF8FE07175BC50567CA41456A4B3D7C354EFF05C5FB66994FDB745C1CBDBFFDCA35966660C1BA2E7FFECF17758FFC4EC88E7EF7C3B923C34C5A80EB3E3659687BC3B3DE2A44F5E89E7AC91C150A5998610B25BA1561263A1044C888863BC958211FE6C2EA060DC52F0DFCDD62340AB9085FE4647301E30EA251663FE9FC4F6 pid=6383 comm="syz-executor.5" 17:41:11 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.time\x00', 0x0, 0x0) ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x4c0a, &(0x7f00000000c0)={r1, 0x1, {0x0, 0x0, 0x0, 0x5802, 0x2, 0x0, 0xa, 0x1, 0xc, "6b3eb916e66a5f5ea9aea09df1598ef9d8ff436877e69ec97994fba9d76e6b94ef2e93ebd6b3dd1a3f6dd476aa666f9db14e63715a2ba7163035eb2ec4f5695f", "2b7c35159dec8b311dbb5d76f6185877cc9117bad6ae077e8b5475f4262b27f2c8aed9e9939a1cf4d5def231e9ebdeb073d4e09e83440c85b436dbfa5cf3b51d", "9f03f93ab5dbf96b276dfcd649d995a103ddb8b95dcc2084283f45680fe22b4f", [0x7, 0x3]}}) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 17:41:11 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.time\x00', 0x0, 0x0) ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x4c0a, &(0x7f00000000c0)={r1, 0x1, {0x0, 0x0, 0x0, 0x5802, 0x2, 0x0, 0xa, 0x1, 0xc, "6b3eb916e66a5f5ea9aea09df1598ef9d8ff436877e69ec97994fba9d76e6b94ef2e93ebd6b3dd1a3f6dd476aa666f9db14e63715a2ba7163035eb2ec4f5695f", "2b7c35159dec8b311dbb5d76f6185877cc9117bad6ae077e8b5475f4262b27f2c8aed9e9939a1cf4d5def231e9ebdeb073d4e09e83440c85b436dbfa5cf3b51d", "9f03f93ab5dbf96b276dfcd649d995a103ddb8b95dcc2084283f45680fe22b4f", [0x7, 0x3]}}) (async) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 17:41:11 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.time\x00', 0x0, 0x0) ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x4c0a, &(0x7f00000000c0)={r1, 0x1, {0x0, 0x0, 0x0, 0x5802, 0x2, 0x0, 0xa, 0x1, 0xc, "6b3eb916e66a5f5ea9aea09df1598ef9d8ff436877e69ec97994fba9d76e6b94ef2e93ebd6b3dd1a3f6dd476aa666f9db14e63715a2ba7163035eb2ec4f5695f", "2b7c35159dec8b311dbb5d76f6185877cc9117bad6ae077e8b5475f4262b27f2c8aed9e9939a1cf4d5def231e9ebdeb073d4e09e83440c85b436dbfa5cf3b51d", "9f03f93ab5dbf96b276dfcd649d995a103ddb8b95dcc2084283f45680fe22b4f", [0x7, 0x3]}}) (async) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) [ 2256.585933] audit: type=1400 audit(1660326071.457:1874): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=22206D27D23285D30A1F9C319CBEB438C43EAF8FE07175BC50567CA41456A4B3D7C354EFF05C5FB66994FDB745C1CBDBFFDCA35966660C1BA2E7FFECF17758FFC4EC88E7EF7C3B923C34C5A80EB3E3659687BC3B3DE2A44F5E89E7AC91C150A5998610B25BA1561263A1044C888863BC958211FE6C2EA060DC52F0DFCDD62340AB9085FE4647301E30EA251663FE9FC4F6 pid=6396 comm="syz-executor.5" 17:41:11 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) 17:41:11 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000180)="b5e7634772be131adc91c1b65d35e529fa9b31b41cb0300376d958c0bcfc1d39754e1522cbcdf77240c7e477d121867fb19e06d6fb70eba4b89e5646d9e4dc9e4ada9ee022205edef740296bb7b43ba9bf53130f274c2dbbb42dc5fcf44b70d0934db5f5c65bf3bb4232124966d0e6c9035e30e2cd8b6f682348abbea7bf7d31665d01dcff2e4a3e5b3126f13673467a99b4b211bd2d252b187f2ade8fb675d157c9146b6eea2d9429a42763b3a5fc390a1fe449d745f22b6205e4fd2b81010d8e", 0xc1}], 0x1, 0x122, 0x7) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'exec ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0x44) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) (async) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000180)="b5e7634772be131adc91c1b65d35e529fa9b31b41cb0300376d958c0bcfc1d39754e1522cbcdf77240c7e477d121867fb19e06d6fb70eba4b89e5646d9e4dc9e4ada9ee022205edef740296bb7b43ba9bf53130f274c2dbbb42dc5fcf44b70d0934db5f5c65bf3bb4232124966d0e6c9035e30e2cd8b6f682348abbea7bf7d31665d01dcff2e4a3e5b3126f13673467a99b4b211bd2d252b187f2ade8fb675d157c9146b6eea2d9429a42763b3a5fc390a1fe449d745f22b6205e4fd2b81010d8e", 0xc1}], 0x1, 0x122, 0x7) (async) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000100)={'exec ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0x44) (async) [ 2256.635572] audit: type=1400 audit(1660326071.517:1875): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=22206D27D23285D30A1F9C319CBEB438C43EAF8FE07175BC50567CA41456A4B3D7C354EFF05C5FB66994FDB745C1CBDBFFDCA35966660C1BA2E7FFECF17758FFC4EC88E7EF7C3B923C34C5A80EB3E3659687BC3B3DE2A44F5E89E7AC91C150A5998610B25BA1561263A1044C888863BC958211FE6C2EA060DC52F0DFCDD62340AB9085FE4647301E30EA251663FE9FC4F6 pid=6410 comm="syz-executor.5" 17:41:11 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) 17:41:11 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) 17:41:11 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000180)="b5e7634772be131adc91c1b65d35e529fa9b31b41cb0300376d958c0bcfc1d39754e1522cbcdf77240c7e477d121867fb19e06d6fb70eba4b89e5646d9e4dc9e4ada9ee022205edef740296bb7b43ba9bf53130f274c2dbbb42dc5fcf44b70d0934db5f5c65bf3bb4232124966d0e6c9035e30e2cd8b6f682348abbea7bf7d31665d01dcff2e4a3e5b3126f13673467a99b4b211bd2d252b187f2ade8fb675d157c9146b6eea2d9429a42763b3a5fc390a1fe449d745f22b6205e4fd2b81010d8e", 0xc1}], 0x1, 0x122, 0x7) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000100)={'exec ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0x44) [ 2256.679189] audit: type=1400 audit(1660326071.567:1876): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=6423 comm="syz-executor.2" 17:41:11 executing program 4: getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000100)=""/68, 0x44) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:11 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) (async, rerun: 32) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) (rerun: 32) [ 2256.714786] audit: type=1400 audit(1660326071.587:1877): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=22206D27D23285D30A1F9C319CBEB438C43EAF8FE07175BC50567CA41456A4B3D7C354EFF05C5FB66994FDB745C1CBDBFFDCA35966660C1BA2E7FFECF17758FFC4EC88E7EF7C3B923C34C5A80EB3E3659687BC3B3DE2A44F5E89E7AC91C150A5998610B25BA1561263A1044C888863BC958211FE6C2EA060DC52F0DFCDD62340AB9085FE4647301E30EA251663FE9FC4F6 pid=6421 comm="syz-executor.5" 17:41:11 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000140)={0x0, 0x9, 0x1, [0x5, 0x6, 0x8, 0x0, 0x4], [0x6, 0x100000000, 0x7, 0x8, 0x80, 0x81, 0xffffffffffff7fff, 0x100000000, 0x8, 0xc80, 0x8, 0x6, 0x9, 0x5, 0xe09, 0x2, 0x443b, 0x3, 0x81, 0xffffffffffffffff, 0x4, 0x7f, 0x79, 0x40, 0x7, 0xff, 0x101, 0x1, 0x4, 0x0, 0x6, 0xdfe, 0x9, 0x3, 0x7ff, 0x100000000, 0x1, 0x9, 0x0, 0x8, 0x1, 0x1ff, 0x10000, 0xffffffffffffffff, 0x8932, 0x2, 0x5, 0x8, 0x0, 0x5, 0x1, 0x8001, 0x5, 0x1, 0x8000, 0x101, 0x3611, 0x3, 0x3, 0x10000, 0x67, 0x0, 0x9, 0x101, 0x0, 0xce7, 0x64c00, 0x8, 0x20, 0x7fffffff, 0x80e5, 0x8941, 0x8, 0xe2e6, 0x5, 0x2, 0x8, 0x10001, 0x33e9, 0x5, 0x3, 0xac9, 0x6d160f99, 0x7, 0x9, 0x1, 0xffffffffffffffff, 0x4, 0x9, 0x0, 0x10000, 0x7, 0x8001, 0x4, 0xfffffffffffffff8, 0x800, 0x5, 0xb2c, 0x200, 0x8b, 0x400, 0x7f, 0x3e8, 0x9, 0x1, 0x8001, 0x8, 0xba, 0x100000000, 0x7f, 0x200, 0x9, 0x6, 0x1000, 0x10001, 0x8, 0xffffffffffffff7b, 0x44, 0x1, 0x100000000, 0x1]}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000580)={0x0, 0x6, 0x8000000000000000, 0x1}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000980)={0x1, 0x2, {0x8000, @struct={0x0, 0x6}, r1, 0xffffffff00000000, 0x4, 0x1000, 0xd18, 0x9, 0x35, @usage=0x9, 0x8001, 0x4, [0x6, 0x6fc400000000, 0x1, 0x7ff, 0x3, 0x5]}, {0x0, @usage=0x401, 0x0, 0xfffffffffffffffa, 0x2, 0x4, 0x100000001, 0x1, 0x60, @struct={0x6, 0xfffff682}, 0x8, 0x7, [0x8000, 0x8b, 0x6, 0x2, 0x2, 0x4]}, {0x8b, @usage, r2, 0x3ff, 0x5f, 0x2, 0x4, 0xbe6, 0x80, @usage=0x8, 0x7ff, 0x1, [0xfff, 0x0, 0x1ff, 0x1, 0x20, 0xfffffffffffffffa]}, {0x80000000, 0xdd, 0xfffffffffffffff9}}) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:11 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000140)={0x0, 0x9, 0x1, [0x5, 0x6, 0x8, 0x0, 0x4], [0x6, 0x100000000, 0x7, 0x8, 0x80, 0x81, 0xffffffffffff7fff, 0x100000000, 0x8, 0xc80, 0x8, 0x6, 0x9, 0x5, 0xe09, 0x2, 0x443b, 0x3, 0x81, 0xffffffffffffffff, 0x4, 0x7f, 0x79, 0x40, 0x7, 0xff, 0x101, 0x1, 0x4, 0x0, 0x6, 0xdfe, 0x9, 0x3, 0x7ff, 0x100000000, 0x1, 0x9, 0x0, 0x8, 0x1, 0x1ff, 0x10000, 0xffffffffffffffff, 0x8932, 0x2, 0x5, 0x8, 0x0, 0x5, 0x1, 0x8001, 0x5, 0x1, 0x8000, 0x101, 0x3611, 0x3, 0x3, 0x10000, 0x67, 0x0, 0x9, 0x101, 0x0, 0xce7, 0x64c00, 0x8, 0x20, 0x7fffffff, 0x80e5, 0x8941, 0x8, 0xe2e6, 0x5, 0x2, 0x8, 0x10001, 0x33e9, 0x5, 0x3, 0xac9, 0x6d160f99, 0x7, 0x9, 0x1, 0xffffffffffffffff, 0x4, 0x9, 0x0, 0x10000, 0x7, 0x8001, 0x4, 0xfffffffffffffff8, 0x800, 0x5, 0xb2c, 0x200, 0x8b, 0x400, 0x7f, 0x3e8, 0x9, 0x1, 0x8001, 0x8, 0xba, 0x100000000, 0x7f, 0x200, 0x9, 0x6, 0x1000, 0x10001, 0x8, 0xffffffffffffff7b, 0x44, 0x1, 0x100000000, 0x1]}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000580)={0x0, 0x6, 0x8000000000000000, 0x1}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000980)={0x1, 0x2, {0x8000, @struct={0x0, 0x6}, r1, 0xffffffff00000000, 0x4, 0x1000, 0xd18, 0x9, 0x35, @usage=0x9, 0x8001, 0x4, [0x6, 0x6fc400000000, 0x1, 0x7ff, 0x3, 0x5]}, {0x0, @usage=0x401, 0x0, 0xfffffffffffffffa, 0x2, 0x4, 0x100000001, 0x1, 0x60, @struct={0x6, 0xfffff682}, 0x8, 0x7, [0x8000, 0x8b, 0x6, 0x2, 0x2, 0x4]}, {0x8b, @usage, r2, 0x3ff, 0x5f, 0x2, 0x4, 0xbe6, 0x80, @usage=0x8, 0x7ff, 0x1, [0xfff, 0x0, 0x1ff, 0x1, 0x20, 0xfffffffffffffffa]}, {0x80000000, 0xdd, 0xfffffffffffffff9}}) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000140)={0x0, 0x9, 0x1, [0x5, 0x6, 0x8, 0x0, 0x4], [0x6, 0x100000000, 0x7, 0x8, 0x80, 0x81, 0xffffffffffff7fff, 0x100000000, 0x8, 0xc80, 0x8, 0x6, 0x9, 0x5, 0xe09, 0x2, 0x443b, 0x3, 0x81, 0xffffffffffffffff, 0x4, 0x7f, 0x79, 0x40, 0x7, 0xff, 0x101, 0x1, 0x4, 0x0, 0x6, 0xdfe, 0x9, 0x3, 0x7ff, 0x100000000, 0x1, 0x9, 0x0, 0x8, 0x1, 0x1ff, 0x10000, 0xffffffffffffffff, 0x8932, 0x2, 0x5, 0x8, 0x0, 0x5, 0x1, 0x8001, 0x5, 0x1, 0x8000, 0x101, 0x3611, 0x3, 0x3, 0x10000, 0x67, 0x0, 0x9, 0x101, 0x0, 0xce7, 0x64c00, 0x8, 0x20, 0x7fffffff, 0x80e5, 0x8941, 0x8, 0xe2e6, 0x5, 0x2, 0x8, 0x10001, 0x33e9, 0x5, 0x3, 0xac9, 0x6d160f99, 0x7, 0x9, 0x1, 0xffffffffffffffff, 0x4, 0x9, 0x0, 0x10000, 0x7, 0x8001, 0x4, 0xfffffffffffffff8, 0x800, 0x5, 0xb2c, 0x200, 0x8b, 0x400, 0x7f, 0x3e8, 0x9, 0x1, 0x8001, 0x8, 0xba, 0x100000000, 0x7f, 0x200, 0x9, 0x6, 0x1000, 0x10001, 0x8, 0xffffffffffffff7b, 0x44, 0x1, 0x100000000, 0x1]}) (async) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000580)={0x0, 0x6, 0x8000000000000000, 0x1}) (async) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000980)={0x1, 0x2, {0x8000, @struct={0x0, 0x6}, r1, 0xffffffff00000000, 0x4, 0x1000, 0xd18, 0x9, 0x35, @usage=0x9, 0x8001, 0x4, [0x6, 0x6fc400000000, 0x1, 0x7ff, 0x3, 0x5]}, {0x0, @usage=0x401, 0x0, 0xfffffffffffffffa, 0x2, 0x4, 0x100000001, 0x1, 0x60, @struct={0x6, 0xfffff682}, 0x8, 0x7, [0x8000, 0x8b, 0x6, 0x2, 0x2, 0x4]}, {0x8b, @usage, r2, 0x3ff, 0x5f, 0x2, 0x4, 0xbe6, 0x80, @usage=0x8, 0x7ff, 0x1, [0xfff, 0x0, 0x1ff, 0x1, 0x20, 0xfffffffffffffffa]}, {0x80000000, 0xdd, 0xfffffffffffffff9}}) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) [ 2256.768766] audit: type=1400 audit(1660326071.667:1878): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=22206D27D23285D30A1F9C319CBEB438C43EAF8FE07175BC50567CA41456A4B3D7C354EFF05C5FB66994FDB745C1CBDBFFDCA35966660C1BA2E7FFECF17758FFC4EC88E7EF7C3B923C34C5A80EB3E3659687BC3B3DE2A44F5E89E7AC91C150A5998610B25BA1561263A1044C888863BC958211FE6C2EA060DC52F0DFCDD62340AB9085FE4647301E30EA251663FE9FC4F6 pid=6445 comm="syz-executor.5" 17:41:11 executing program 4: getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000100)=""/68, 0x44) (async, rerun: 64) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 64) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) [ 2256.816048] audit: type=1400 audit(1660326071.767:1879): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=22206D27D23285D30A1F9C319CBEB438C43EAF8FE07175BC50567CA41456A4B3D7C354EFF05C5FB66994FDB745C1CBDBFFDCA35966660C1BA2E7FFECF17758FFC4EC88E7EF7C3B923C34C5A80EB3E3659687BC3B3DE2A44F5E89E7AC91C150A5998610B25BA1561263A1044C888863BC958211FE6C2EA060DC52F0DFCDD62340AB9085FE4647301E30EA251663FE9FC4F6 pid=6458 comm="syz-executor.5" 17:41:11 executing program 4: getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000100)=""/68, 0x44) (async) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) 17:41:11 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) 17:41:11 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x100, 0xa, 0x14, 0xd, "e8e7310dec4fa54d31b4cef11638191d2e5202119a70b4477a900a76821eaab98ed8f92ff70d0736b126e02979a2312deb4cab436c0549afb58c4aeed76cc6b5", "774254d1389dafd4775ded3541e784dfaba3185e5bf232421578e5c4d40150bd", [0x100000000, 0xffffffff]}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)={'stack ', '\x9aP\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x00\x00\x00\x00\xc8\xa2:CgL]\xcc\xaa6e\xea\xd8\xa4w\xdb\xc0\xac\xfb\xff\x03\x00\x00\xb6C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4\x00\x00\x00\x00'}, 0xfffffffffffffc53) 17:41:11 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000140)={0x0, 0x9, 0x1, [0x5, 0x6, 0x8, 0x0, 0x4], [0x6, 0x100000000, 0x7, 0x8, 0x80, 0x81, 0xffffffffffff7fff, 0x100000000, 0x8, 0xc80, 0x8, 0x6, 0x9, 0x5, 0xe09, 0x2, 0x443b, 0x3, 0x81, 0xffffffffffffffff, 0x4, 0x7f, 0x79, 0x40, 0x7, 0xff, 0x101, 0x1, 0x4, 0x0, 0x6, 0xdfe, 0x9, 0x3, 0x7ff, 0x100000000, 0x1, 0x9, 0x0, 0x8, 0x1, 0x1ff, 0x10000, 0xffffffffffffffff, 0x8932, 0x2, 0x5, 0x8, 0x0, 0x5, 0x1, 0x8001, 0x5, 0x1, 0x8000, 0x101, 0x3611, 0x3, 0x3, 0x10000, 0x67, 0x0, 0x9, 0x101, 0x0, 0xce7, 0x64c00, 0x8, 0x20, 0x7fffffff, 0x80e5, 0x8941, 0x8, 0xe2e6, 0x5, 0x2, 0x8, 0x10001, 0x33e9, 0x5, 0x3, 0xac9, 0x6d160f99, 0x7, 0x9, 0x1, 0xffffffffffffffff, 0x4, 0x9, 0x0, 0x10000, 0x7, 0x8001, 0x4, 0xfffffffffffffff8, 0x800, 0x5, 0xb2c, 0x200, 0x8b, 0x400, 0x7f, 0x3e8, 0x9, 0x1, 0x8001, 0x8, 0xba, 0x100000000, 0x7f, 0x200, 0x9, 0x6, 0x1000, 0x10001, 0x8, 0xffffffffffffff7b, 0x44, 0x1, 0x100000000, 0x1]}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000580)={0x0, 0x6, 0x8000000000000000, 0x1}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000980)={0x1, 0x2, {0x8000, @struct={0x0, 0x6}, r1, 0xffffffff00000000, 0x4, 0x1000, 0xd18, 0x9, 0x35, @usage=0x9, 0x8001, 0x4, [0x6, 0x6fc400000000, 0x1, 0x7ff, 0x3, 0x5]}, {0x0, @usage=0x401, 0x0, 0xfffffffffffffffa, 0x2, 0x4, 0x100000001, 0x1, 0x60, @struct={0x6, 0xfffff682}, 0x8, 0x7, [0x8000, 0x8b, 0x6, 0x2, 0x2, 0x4]}, {0x8b, @usage, r2, 0x3ff, 0x5f, 0x2, 0x4, 0xbe6, 0x80, @usage=0x8, 0x7ff, 0x1, [0xfff, 0x0, 0x1ff, 0x1, 0x20, 0xfffffffffffffffa]}, {0x80000000, 0xdd, 0xfffffffffffffff9}}) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:11 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x100, 0xa, 0x14, 0xd, "e8e7310dec4fa54d31b4cef11638191d2e5202119a70b4477a900a76821eaab98ed8f92ff70d0736b126e02979a2312deb4cab436c0549afb58c4aeed76cc6b5", "774254d1389dafd4775ded3541e784dfaba3185e5bf232421578e5c4d40150bd", [0x100000000, 0xffffffff]}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)={'stack ', '\x9aP\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x00\x00\x00\x00\xc8\xa2:CgL]\xcc\xaa6e\xea\xd8\xa4w\xdb\xc0\xac\xfb\xff\x03\x00\x00\xb6C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4\x00\x00\x00\x00'}, 0xfffffffffffffc53) 17:41:11 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) 17:41:11 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x100, 0xa, 0x14, 0xd, "e8e7310dec4fa54d31b4cef11638191d2e5202119a70b4477a900a76821eaab98ed8f92ff70d0736b126e02979a2312deb4cab436c0549afb58c4aeed76cc6b5", "774254d1389dafd4775ded3541e784dfaba3185e5bf232421578e5c4d40150bd", [0x100000000, 0xffffffff]}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)={'stack ', '\x9aP\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x00\x00\x00\x00\xc8\xa2:CgL]\xcc\xaa6e\xea\xd8\xa4w\xdb\xc0\xac\xfb\xff\x03\x00\x00\xb6C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4\x00\x00\x00\x00'}, 0xfffffffffffffc53) [ 2256.864857] audit: type=1400 audit(1660326071.817:1880): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=22206D27D23285D30A1F9C319CBEB438C43EAF8FE07175BC50567CA41456A4B3D7C354EFF05C5FB66994FDB745C1CBDBFFDCA35966660C1BA2E7FFECF17758FFC4EC88E7EF7C3B923C34C5A80EB3E3659687BC3B3DE2A44F5E89E7AC91C150A5998610B25BA1561263A1044C888863BC958211FE6C2EA060DC52F0DFCDD62340AB9085FE4647301E30EA251663FE9FC4F6 pid=6461 comm="syz-executor.5" 17:41:11 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="047461636b2022206d27d23285d30a1f9c319cbed638c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fccf6838e03dd9df292d24193f55f2dbbecc1fff3d1d936d71ce5c248f27d8b66b705523fe09379898caaf89d33e926c7ad7b8ce53fd91dfac7778f24c111b758"], 0x97) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f00000000c0)=[0x3, 0x2], 0x2) r3 = dup2(r0, r1) openat$cgroup_ro(r3, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) 17:41:11 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="047461636b2022206d27d23285d30a1f9c319cbed638c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fccf6838e03dd9df292d24193f55f2dbbecc1fff3d1d936d71ce5c248f27d8b66b705523fe09379898caaf89d33e926c7ad7b8ce53fd91dfac7778f24c111b758"], 0x97) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f00000000c0)=[0x3, 0x2], 0x2) r3 = dup2(r0, r1) openat$cgroup_ro(r3, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="047461636b2022206d27d23285d30a1f9c319cbed638c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fccf6838e03dd9df292d24193f55f2dbbecc1fff3d1d936d71ce5c248f27d8b66b705523fe09379898caaf89d33e926c7ad7b8ce53fd91dfac7778f24c111b758"], 0x97) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f00000000c0)=[0x3, 0x2], 0x2) (async) dup2(r0, r1) (async) openat$cgroup_ro(r3, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) (async) 17:41:11 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) 17:41:11 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000100)={{0x8, 0x1}, 0x100, './file0\x00'}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYRES32=r2], 0xfffffffffffffe66) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000002c0)={0x80000000, &(0x7f00000000c0), &(0x7f0000000240)}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0xd, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x808408}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x40, 0x0, 0x4, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x38}}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xffff}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x8004}, 0x4) 17:41:11 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000100)={{0x8, 0x1}, 0x100, './file0\x00'}) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYRES32=r2], 0xfffffffffffffe66) (async) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000002c0)={0x80000000, &(0x7f00000000c0), &(0x7f0000000240)}) (async) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0xd, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x808408}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x40, 0x0, 0x4, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x38}}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xffff}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x8004}, 0x4) 17:41:11 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) clock_getres(0x3, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) 17:41:11 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) (async) clock_getres(0x3, &(0x7f0000000000)) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) 17:41:12 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) (async) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000100)={{0x8, 0x1}, 0x100, './file0\x00'}) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYRES32=r2], 0xfffffffffffffe66) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000002c0)={0x80000000, &(0x7f00000000c0), &(0x7f0000000240)}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0xd, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) (async) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x808408}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x40, 0x0, 0x4, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x38}}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xffff}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x8004}, 0x4) 17:41:12 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="047461636b2022206d27d23285d30a1f9c319cbed638c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fccf6838e03dd9df292d24193f55f2dbbecc1fff3d1d936d71ce5c248f27d8b66b705523fe09379898caaf89d33e926c7ad7b8ce53fd91dfac7778f24c111b758"], 0x97) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f00000000c0)=[0x3, 0x2], 0x2) r3 = dup2(r0, r1) openat$cgroup_ro(r3, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="047461636b2022206d27d23285d30a1f9c319cbed638c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fccf6838e03dd9df292d24193f55f2dbbecc1fff3d1d936d71ce5c248f27d8b66b705523fe09379898caaf89d33e926c7ad7b8ce53fd91dfac7778f24c111b758"], 0x97) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f00000000c0)=[0x3, 0x2], 0x2) (async) dup2(r0, r1) (async) openat$cgroup_ro(r3, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) (async) 17:41:12 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) clock_getres(0x3, &(0x7f0000000000)) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) 17:41:12 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc505684a41456a4b3d7c354eff05c5fb66994fdb745c1cbf1ffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fc4f6"], 0x97) 17:41:12 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1000}}, './file0\x00'}) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f00000001c0)={{r2}, {@void, @max}}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) accept$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) 17:41:12 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc505684a41456a4b3d7c354eff05c5fb66994fdb745c1cbf1ffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fc4f6"], 0x97) 17:41:12 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1000}}, './file0\x00'}) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f00000001c0)={{r2}, {@void, @max}}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) accept$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1000}}, './file0\x00'}) (async) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f00000001c0)={{r2}, {@void, @max}}) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) (async) accept$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) (async) 17:41:12 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f0000001b00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001ac0)={&(0x7f0000001a80)={0x10, 0x3fb, 0x100, 0x70bd29, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8080}, 0xc000) fsync(r1) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f00000001c0)={0x0, 0x2, 0x1, [0x2, 0x0, 0x9, 0x80000001, 0xffffffffffffffff], [0x0, 0x9, 0x4, 0x8001, 0x7, 0x7, 0x400, 0x5, 0x3, 0x6, 0x1, 0x100, 0x0, 0x5b10332, 0x955, 0xffffffffffffff01, 0x9, 0x1, 0x80, 0x2, 0x2, 0x196040, 0x5, 0xb84, 0x4, 0x0, 0x8, 0x2, 0x3, 0x100, 0x8, 0x1, 0x3, 0x4, 0x1f, 0x1, 0x6, 0x9, 0x3f, 0x4, 0x2, 0x6, 0xfffffffffffffffa, 0x7fff, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0xffff, 0x5, 0x9, 0x5, 0x100000000, 0xcfed, 0x101, 0x4, 0x7dfa, 0xf366, 0x3, 0xffffffffffffffff, 0x5, 0xce34, 0x22, 0xffffffffffffffff, 0x6, 0x1, 0x9, 0x4, 0x3, 0xfc, 0x8, 0x5, 0xffffffffffffffff, 0x8000000000000000, 0x8000000000000000, 0x8, 0x6, 0x7fffffffffffffff, 0x0, 0x3ff, 0x0, 0x7, 0x8a0, 0x6, 0x100, 0x8, 0x0, 0x7fff, 0x3, 0x8000000000000001, 0x2ef6, 0x401, 0x64, 0x2, 0x1f, 0x7fffffffffffffff, 0xffffffffffffffff, 0x5, 0x0, 0x8000000000000000, 0x4, 0x2, 0x66, 0x101, 0x5, 0x1b36, 0x7, 0x8000000000000001, 0x81, 0x1, 0x3ff, 0x8000000000000001, 0x9, 0x0, 0x3, 0x101, 0x100, 0xffffffff, 0x61, 0x3, 0x6]}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000600)={0x17, 0x0, {0x8, @struct={0x0, 0x401}, 0x0, 0x2, 0x5, 0x8, 0x2, 0x100, 0x4, @struct={0xd20, 0xffffff00}, 0x6, 0x800, [0x8, 0x200, 0x5, 0x3]}, {0x4, @struct={0x14, 0x548}, 0x0, 0xffff, 0x23, 0x0, 0xee0, 0x5, 0x1, @struct={0x8}, 0x2, 0x3, [0x80000000, 0x4, 0xa4, 0x1000, 0x7, 0x6]}, {0x7f, @usage=0x3c0, r2, 0x100000001, 0x7f, 0x9f1a, 0x9, 0x2, 0xc0b, @usage=0x81, 0x9, 0x2, [0x8000000000000001, 0x7, 0x401, 0x825, 0x5, 0x3ec7]}, {0xb14, 0x8b1, 0x7}}) r3 = accept$nfc_llcp(r1, &(0x7f0000000080), &(0x7f0000000000)=0x60) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x1, 0x0, 0x4, 0x2, 0x3, "9fd81a6ae1aaa0063856398fda8af144e811a0284c437ddad08d0199901e8b4013aeb32ef6de9d2ea43cd7c0132f0469cea199bc0d0e4032344d1bdab908c8", 0xb}, 0x60) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r1, 0xc01064ac, &(0x7f0000001a00)={0x0, 0x1000, &(0x7f0000000a00)=""/4096}) 17:41:12 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="737461636b2022206d27d23285d30a1f9c319cbeb438c43eaf8fe07175bc505684a41456a4b3d7c354eff05c5fb66994fdb745c1cbf1ffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fc4f6"], 0x97) 17:41:12 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000080)={0x0, 0x2}, 0x2) 17:41:12 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1000}}, './file0\x00'}) (rerun: 32) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f00000001c0)={{r2}, {@void, @max}}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) accept$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) 17:41:12 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f0000001b00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001ac0)={&(0x7f0000001a80)={0x10, 0x3fb, 0x100, 0x70bd29, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8080}, 0xc000) fsync(r1) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f00000001c0)={0x0, 0x2, 0x1, [0x2, 0x0, 0x9, 0x80000001, 0xffffffffffffffff], [0x0, 0x9, 0x4, 0x8001, 0x7, 0x7, 0x400, 0x5, 0x3, 0x6, 0x1, 0x100, 0x0, 0x5b10332, 0x955, 0xffffffffffffff01, 0x9, 0x1, 0x80, 0x2, 0x2, 0x196040, 0x5, 0xb84, 0x4, 0x0, 0x8, 0x2, 0x3, 0x100, 0x8, 0x1, 0x3, 0x4, 0x1f, 0x1, 0x6, 0x9, 0x3f, 0x4, 0x2, 0x6, 0xfffffffffffffffa, 0x7fff, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0xffff, 0x5, 0x9, 0x5, 0x100000000, 0xcfed, 0x101, 0x4, 0x7dfa, 0xf366, 0x3, 0xffffffffffffffff, 0x5, 0xce34, 0x22, 0xffffffffffffffff, 0x6, 0x1, 0x9, 0x4, 0x3, 0xfc, 0x8, 0x5, 0xffffffffffffffff, 0x8000000000000000, 0x8000000000000000, 0x8, 0x6, 0x7fffffffffffffff, 0x0, 0x3ff, 0x0, 0x7, 0x8a0, 0x6, 0x100, 0x8, 0x0, 0x7fff, 0x3, 0x8000000000000001, 0x2ef6, 0x401, 0x64, 0x2, 0x1f, 0x7fffffffffffffff, 0xffffffffffffffff, 0x5, 0x0, 0x8000000000000000, 0x4, 0x2, 0x66, 0x101, 0x5, 0x1b36, 0x7, 0x8000000000000001, 0x81, 0x1, 0x3ff, 0x8000000000000001, 0x9, 0x0, 0x3, 0x101, 0x100, 0xffffffff, 0x61, 0x3, 0x6]}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000600)={0x17, 0x0, {0x8, @struct={0x0, 0x401}, 0x0, 0x2, 0x5, 0x8, 0x2, 0x100, 0x4, @struct={0xd20, 0xffffff00}, 0x6, 0x800, [0x8, 0x200, 0x5, 0x3]}, {0x4, @struct={0x14, 0x548}, 0x0, 0xffff, 0x23, 0x0, 0xee0, 0x5, 0x1, @struct={0x8}, 0x2, 0x3, [0x80000000, 0x4, 0xa4, 0x1000, 0x7, 0x6]}, {0x7f, @usage=0x3c0, r2, 0x100000001, 0x7f, 0x9f1a, 0x9, 0x2, 0xc0b, @usage=0x81, 0x9, 0x2, [0x8000000000000001, 0x7, 0x401, 0x825, 0x5, 0x3ec7]}, {0xb14, 0x8b1, 0x7}}) r3 = accept$nfc_llcp(r1, &(0x7f0000000080), &(0x7f0000000000)=0x60) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x1, 0x0, 0x4, 0x2, 0x3, "9fd81a6ae1aaa0063856398fda8af144e811a0284c437ddad08d0199901e8b4013aeb32ef6de9d2ea43cd7c0132f0469cea199bc0d0e4032344d1bdab908c8", 0xb}, 0x60) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r1, 0xc01064ac, &(0x7f0000001a00)={0x0, 0x1000, &(0x7f0000000a00)=""/4096}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$int_out(r0, 0x1, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) (async) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f0000001b00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001ac0)={&(0x7f0000001a80)={0x10, 0x3fb, 0x100, 0x70bd29, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8080}, 0xc000) (async) fsync(r1) (async) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f00000001c0)={0x0, 0x2, 0x1, [0x2, 0x0, 0x9, 0x80000001, 0xffffffffffffffff], [0x0, 0x9, 0x4, 0x8001, 0x7, 0x7, 0x400, 0x5, 0x3, 0x6, 0x1, 0x100, 0x0, 0x5b10332, 0x955, 0xffffffffffffff01, 0x9, 0x1, 0x80, 0x2, 0x2, 0x196040, 0x5, 0xb84, 0x4, 0x0, 0x8, 0x2, 0x3, 0x100, 0x8, 0x1, 0x3, 0x4, 0x1f, 0x1, 0x6, 0x9, 0x3f, 0x4, 0x2, 0x6, 0xfffffffffffffffa, 0x7fff, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0xffff, 0x5, 0x9, 0x5, 0x100000000, 0xcfed, 0x101, 0x4, 0x7dfa, 0xf366, 0x3, 0xffffffffffffffff, 0x5, 0xce34, 0x22, 0xffffffffffffffff, 0x6, 0x1, 0x9, 0x4, 0x3, 0xfc, 0x8, 0x5, 0xffffffffffffffff, 0x8000000000000000, 0x8000000000000000, 0x8, 0x6, 0x7fffffffffffffff, 0x0, 0x3ff, 0x0, 0x7, 0x8a0, 0x6, 0x100, 0x8, 0x0, 0x7fff, 0x3, 0x8000000000000001, 0x2ef6, 0x401, 0x64, 0x2, 0x1f, 0x7fffffffffffffff, 0xffffffffffffffff, 0x5, 0x0, 0x8000000000000000, 0x4, 0x2, 0x66, 0x101, 0x5, 0x1b36, 0x7, 0x8000000000000001, 0x81, 0x1, 0x3ff, 0x8000000000000001, 0x9, 0x0, 0x3, 0x101, 0x100, 0xffffffff, 0x61, 0x3, 0x6]}) (async) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000600)={0x17, 0x0, {0x8, @struct={0x0, 0x401}, 0x0, 0x2, 0x5, 0x8, 0x2, 0x100, 0x4, @struct={0xd20, 0xffffff00}, 0x6, 0x800, [0x8, 0x200, 0x5, 0x3]}, {0x4, @struct={0x14, 0x548}, 0x0, 0xffff, 0x23, 0x0, 0xee0, 0x5, 0x1, @struct={0x8}, 0x2, 0x3, [0x80000000, 0x4, 0xa4, 0x1000, 0x7, 0x6]}, {0x7f, @usage=0x3c0, r2, 0x100000001, 0x7f, 0x9f1a, 0x9, 0x2, 0xc0b, @usage=0x81, 0x9, 0x2, [0x8000000000000001, 0x7, 0x401, 0x825, 0x5, 0x3ec7]}, {0xb14, 0x8b1, 0x7}}) (async) accept$nfc_llcp(r1, &(0x7f0000000080), &(0x7f0000000000)=0x60) (async) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x1, 0x0, 0x4, 0x2, 0x3, "9fd81a6ae1aaa0063856398fda8af144e811a0284c437ddad08d0199901e8b4013aeb32ef6de9d2ea43cd7c0132f0469cea199bc0d0e4032344d1bdab908c8", 0xb}, 0x60) (async) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r1, 0xc01064ac, &(0x7f0000001a00)={0x0, 0x1000, &(0x7f0000000a00)=""/4096}) (async) 17:41:12 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000080)={0x0, 0x2}, 0x2) 17:41:12 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000100)={0x4, 0x0, {0x6, @usage=0x1, 0x0, 0x401, 0x3f, 0x16b, 0x800, 0x8, 0x42, @usage=0x8, 0x3, 0x4, [0x7, 0x1ff, 0x3ff, 0x6, 0x83b, 0x2]}, {0x0, @usage=0x8000, 0x0, 0x3, 0xfffffffffffffff9, 0x2, 0xafea, 0x2, 0x2, @usage=0xac, 0x1, 0x1, [0x7, 0x4, 0x3, 0x101, 0x4, 0xff]}, {0x9, @struct={0x8, 0xfffff000}, 0x0, 0x8, 0x3f, 0x8, 0x4, 0x6, 0x0, @usage=0xfffffffffffffff9, 0x80000001, 0xfffff800, [0x9c2c, 0x1, 0x7, 0x9, 0x0, 0xa2e4]}, {0x0, 0x8f, 0x4}}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x84000, 0x0) sendmsg$nl_crypto(r2, &(0x7f0000000ac0)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000a80)={&(0x7f0000000980)=@getstat={0xe0, 0x15, 0x800, 0x70bd2b, 0x25dfdbfd, {{'essiv-cbc-aes-sha256-neon\x00'}, '\x00', '\x00', 0x0, 0x2000}, ["", "", "", "", "", ""]}, 0xe0}, 0x1, 0x0, 0x0, 0x40800}, 0x4000000) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000500)={r1, 0x5, 0x1, [0x80000001, 0xfff, 0x0, 0x10001, 0x6], [0x3, 0x4, 0x20, 0xffffffffffffff9a, 0x7, 0xffffffffffff0001, 0x8, 0x100000000, 0x4, 0xfffffffffffffff7, 0x400, 0x1, 0x8, 0x6, 0xc5a2, 0x1, 0x100000001, 0x10a, 0x8000, 0xfffffffeffffffff, 0xffffffffffff7fff, 0x0, 0x4, 0x10000, 0x80000001, 0x5, 0xffffffffffffff00, 0x81, 0xffff, 0x8000000000000001, 0x80, 0x7, 0x14d, 0x4000000, 0x5, 0x5, 0x2, 0xf556, 0xdaf, 0x1, 0x1, 0x40, 0x1ff, 0x1, 0x7, 0x0, 0x7129d585, 0xffffffff, 0x6, 0x7c, 0x33, 0x810b, 0xfffffffffffffffe, 0x3, 0xc42, 0x10001, 0x289f, 0x7cdd, 0x8, 0x1, 0xfe50, 0x6, 0x0, 0x8, 0x8000000000000001, 0x5, 0x0, 0x9, 0x5, 0x2, 0x8000, 0x80, 0x2b14, 0xda, 0x64, 0x3, 0x7, 0x6, 0x1, 0xb4, 0xf54, 0x4, 0x80000000, 0x6, 0x8055, 0x6, 0x7f, 0x2, 0xd46, 0x4, 0x0, 0x5cb17c14, 0x2, 0x8001, 0x5, 0x6, 0x5, 0x1, 0x101, 0x8, 0x1, 0x7f, 0xb413, 0xffffffff00000001, 0x72, 0x800, 0x3, 0x17, 0x7fffffffffffffff, 0x9, 0x7fff, 0x1, 0x7ff, 0x5, 0x7, 0x4ccf935a, 0x6, 0x2, 0x5, 0x8001, 0x1]}) 17:41:12 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) (async, rerun: 32) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) (rerun: 32) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f0000001b00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001ac0)={&(0x7f0000001a80)={0x10, 0x3fb, 0x100, 0x70bd29, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8080}, 0xc000) (async) fsync(r1) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f00000001c0)={0x0, 0x2, 0x1, [0x2, 0x0, 0x9, 0x80000001, 0xffffffffffffffff], [0x0, 0x9, 0x4, 0x8001, 0x7, 0x7, 0x400, 0x5, 0x3, 0x6, 0x1, 0x100, 0x0, 0x5b10332, 0x955, 0xffffffffffffff01, 0x9, 0x1, 0x80, 0x2, 0x2, 0x196040, 0x5, 0xb84, 0x4, 0x0, 0x8, 0x2, 0x3, 0x100, 0x8, 0x1, 0x3, 0x4, 0x1f, 0x1, 0x6, 0x9, 0x3f, 0x4, 0x2, 0x6, 0xfffffffffffffffa, 0x7fff, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0xffff, 0x5, 0x9, 0x5, 0x100000000, 0xcfed, 0x101, 0x4, 0x7dfa, 0xf366, 0x3, 0xffffffffffffffff, 0x5, 0xce34, 0x22, 0xffffffffffffffff, 0x6, 0x1, 0x9, 0x4, 0x3, 0xfc, 0x8, 0x5, 0xffffffffffffffff, 0x8000000000000000, 0x8000000000000000, 0x8, 0x6, 0x7fffffffffffffff, 0x0, 0x3ff, 0x0, 0x7, 0x8a0, 0x6, 0x100, 0x8, 0x0, 0x7fff, 0x3, 0x8000000000000001, 0x2ef6, 0x401, 0x64, 0x2, 0x1f, 0x7fffffffffffffff, 0xffffffffffffffff, 0x5, 0x0, 0x8000000000000000, 0x4, 0x2, 0x66, 0x101, 0x5, 0x1b36, 0x7, 0x8000000000000001, 0x81, 0x1, 0x3ff, 0x8000000000000001, 0x9, 0x0, 0x3, 0x101, 0x100, 0xffffffff, 0x61, 0x3, 0x6]}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000600)={0x17, 0x0, {0x8, @struct={0x0, 0x401}, 0x0, 0x2, 0x5, 0x8, 0x2, 0x100, 0x4, @struct={0xd20, 0xffffff00}, 0x6, 0x800, [0x8, 0x200, 0x5, 0x3]}, {0x4, @struct={0x14, 0x548}, 0x0, 0xffff, 0x23, 0x0, 0xee0, 0x5, 0x1, @struct={0x8}, 0x2, 0x3, [0x80000000, 0x4, 0xa4, 0x1000, 0x7, 0x6]}, {0x7f, @usage=0x3c0, r2, 0x100000001, 0x7f, 0x9f1a, 0x9, 0x2, 0xc0b, @usage=0x81, 0x9, 0x2, [0x8000000000000001, 0x7, 0x401, 0x825, 0x5, 0x3ec7]}, {0xb14, 0x8b1, 0x7}}) r3 = accept$nfc_llcp(r1, &(0x7f0000000080), &(0x7f0000000000)=0x60) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x1, 0x0, 0x4, 0x2, 0x3, "9fd81a6ae1aaa0063856398fda8af144e811a0284c437ddad08d0199901e8b4013aeb32ef6de9d2ea43cd7c0132f0469cea199bc0d0e4032344d1bdab908c8", 0xb}, 0x60) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r1, 0xc01064ac, &(0x7f0000001a00)={0x0, 0x1000, &(0x7f0000000a00)=""/4096}) 17:41:12 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000100)={0x4, 0x0, {0x6, @usage=0x1, 0x0, 0x401, 0x3f, 0x16b, 0x800, 0x8, 0x42, @usage=0x8, 0x3, 0x4, [0x7, 0x1ff, 0x3ff, 0x6, 0x83b, 0x2]}, {0x0, @usage=0x8000, 0x0, 0x3, 0xfffffffffffffff9, 0x2, 0xafea, 0x2, 0x2, @usage=0xac, 0x1, 0x1, [0x7, 0x4, 0x3, 0x101, 0x4, 0xff]}, {0x9, @struct={0x8, 0xfffff000}, 0x0, 0x8, 0x3f, 0x8, 0x4, 0x6, 0x0, @usage=0xfffffffffffffff9, 0x80000001, 0xfffff800, [0x9c2c, 0x1, 0x7, 0x9, 0x0, 0xa2e4]}, {0x0, 0x8f, 0x4}}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x84000, 0x0) sendmsg$nl_crypto(r2, &(0x7f0000000ac0)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000a80)={&(0x7f0000000980)=@getstat={0xe0, 0x15, 0x800, 0x70bd2b, 0x25dfdbfd, {{'essiv-cbc-aes-sha256-neon\x00'}, '\x00', '\x00', 0x0, 0x2000}, ["", "", "", "", "", ""]}, 0xe0}, 0x1, 0x0, 0x0, 0x40800}, 0x4000000) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000500)={r1, 0x5, 0x1, [0x80000001, 0xfff, 0x0, 0x10001, 0x6], [0x3, 0x4, 0x20, 0xffffffffffffff9a, 0x7, 0xffffffffffff0001, 0x8, 0x100000000, 0x4, 0xfffffffffffffff7, 0x400, 0x1, 0x8, 0x6, 0xc5a2, 0x1, 0x100000001, 0x10a, 0x8000, 0xfffffffeffffffff, 0xffffffffffff7fff, 0x0, 0x4, 0x10000, 0x80000001, 0x5, 0xffffffffffffff00, 0x81, 0xffff, 0x8000000000000001, 0x80, 0x7, 0x14d, 0x4000000, 0x5, 0x5, 0x2, 0xf556, 0xdaf, 0x1, 0x1, 0x40, 0x1ff, 0x1, 0x7, 0x0, 0x7129d585, 0xffffffff, 0x6, 0x7c, 0x33, 0x810b, 0xfffffffffffffffe, 0x3, 0xc42, 0x10001, 0x289f, 0x7cdd, 0x8, 0x1, 0xfe50, 0x6, 0x0, 0x8, 0x8000000000000001, 0x5, 0x0, 0x9, 0x5, 0x2, 0x8000, 0x80, 0x2b14, 0xda, 0x64, 0x3, 0x7, 0x6, 0x1, 0xb4, 0xf54, 0x4, 0x80000000, 0x6, 0x8055, 0x6, 0x7f, 0x2, 0xd46, 0x4, 0x0, 0x5cb17c14, 0x2, 0x8001, 0x5, 0x6, 0x5, 0x1, 0x101, 0x8, 0x1, 0x7f, 0xb413, 0xffffffff00000001, 0x72, 0x800, 0x3, 0x17, 0x7fffffffffffffff, 0x9, 0x7fff, 0x1, 0x7ff, 0x5, 0x7, 0x4ccf935a, 0x6, 0x2, 0x5, 0x8001, 0x1]}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (async) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000100)={0x4, 0x0, {0x6, @usage=0x1, 0x0, 0x401, 0x3f, 0x16b, 0x800, 0x8, 0x42, @usage=0x8, 0x3, 0x4, [0x7, 0x1ff, 0x3ff, 0x6, 0x83b, 0x2]}, {0x0, @usage=0x8000, 0x0, 0x3, 0xfffffffffffffff9, 0x2, 0xafea, 0x2, 0x2, @usage=0xac, 0x1, 0x1, [0x7, 0x4, 0x3, 0x101, 0x4, 0xff]}, {0x9, @struct={0x8, 0xfffff000}, 0x0, 0x8, 0x3f, 0x8, 0x4, 0x6, 0x0, @usage=0xfffffffffffffff9, 0x80000001, 0xfffff800, [0x9c2c, 0x1, 0x7, 0x9, 0x0, 0xa2e4]}, {0x0, 0x8f, 0x4}}) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x84000, 0x0) (async) sendmsg$nl_crypto(r2, &(0x7f0000000ac0)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000a80)={&(0x7f0000000980)=@getstat={0xe0, 0x15, 0x800, 0x70bd2b, 0x25dfdbfd, {{'essiv-cbc-aes-sha256-neon\x00'}, '\x00', '\x00', 0x0, 0x2000}, ["", "", "", "", "", ""]}, 0xe0}, 0x1, 0x0, 0x0, 0x40800}, 0x4000000) (async) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000500)={r1, 0x5, 0x1, [0x80000001, 0xfff, 0x0, 0x10001, 0x6], [0x3, 0x4, 0x20, 0xffffffffffffff9a, 0x7, 0xffffffffffff0001, 0x8, 0x100000000, 0x4, 0xfffffffffffffff7, 0x400, 0x1, 0x8, 0x6, 0xc5a2, 0x1, 0x100000001, 0x10a, 0x8000, 0xfffffffeffffffff, 0xffffffffffff7fff, 0x0, 0x4, 0x10000, 0x80000001, 0x5, 0xffffffffffffff00, 0x81, 0xffff, 0x8000000000000001, 0x80, 0x7, 0x14d, 0x4000000, 0x5, 0x5, 0x2, 0xf556, 0xdaf, 0x1, 0x1, 0x40, 0x1ff, 0x1, 0x7, 0x0, 0x7129d585, 0xffffffff, 0x6, 0x7c, 0x33, 0x810b, 0xfffffffffffffffe, 0x3, 0xc42, 0x10001, 0x289f, 0x7cdd, 0x8, 0x1, 0xfe50, 0x6, 0x0, 0x8, 0x8000000000000001, 0x5, 0x0, 0x9, 0x5, 0x2, 0x8000, 0x80, 0x2b14, 0xda, 0x64, 0x3, 0x7, 0x6, 0x1, 0xb4, 0xf54, 0x4, 0x80000000, 0x6, 0x8055, 0x6, 0x7f, 0x2, 0xd46, 0x4, 0x0, 0x5cb17c14, 0x2, 0x8001, 0x5, 0x6, 0x5, 0x1, 0x101, 0x8, 0x1, 0x7f, 0xb413, 0xffffffff00000001, 0x72, 0x800, 0x3, 0x17, 0x7fffffffffffffff, 0x9, 0x7fff, 0x1, 0x7ff, 0x5, 0x7, 0x4ccf935a, 0x6, 0x2, 0x5, 0x8001, 0x1]}) (async) 17:41:12 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000080)={0x0, 0x2}, 0x2) 17:41:12 executing program 2: setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) 17:41:12 executing program 5: sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1fe}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x20}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7fff}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000001) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xf4\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xf7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\bc\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x86\x16FG0\x1e0\xea\xa5\x16c\xfe\x9f\xc4\xf6\x8fC*\xc1\xe85Q\xec\xf1\xe3\xd1\xbb\x01M\xf0?}\x7f\x18[\xf134T\v[\xc7\x01$\x93`75U\xb0\b\x94\xe1\xff\x8c\xd6yC\xc8]\xc9\xb5\xd4\x8b\xe6\xc6\x88\\\xc7\xf2\x13:\x91\xdd\x00\x002\xbcu\xec\xa6\xc4{\xe5\x9a\x95\xdc\x91\x0e}\xbc\xbd\xfd\xadG\x1e2\x8a\x1e#\r\xdc>#\xa2\xd1.\xb2\v\x9c\xeb\x9fX\xdck\x80\xfc\x1c\x8f\xf0e\xa2*,\xa3\xb1!\xae\x80\xeex\xba\x91\xc0\x1a\x80\xf6\xed\x11\xbcI\x90\xff\xd0\x14\x82\x14\x10\xf5\x84\x93Ot\xddt\x83>\xbaR\xa8\xab\xae;t\xc1!//y\r\xeb\xe12}\xb0}\x054P\xcb\x17\xa0YZ\x8a>\x04\xf1\xf3\'\x93OOf\xc6\xe3\xecd\xd8>\x15\x86\xdc\x81\xd44)W\xc8\xa1\xbe\x8c\x9aJ\xde\x96n\b\xff^\ty\xcb\\jx\xbc\xd7@\x9c\xcfh\xe8pu\x03\xdd\xab\xf6\xb9L\xab\x12\x9c7g\xee`\x80;\x9b&\xbb'}, 0x1bc) 17:41:12 executing program 2: setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) (async) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) 17:41:12 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) (async) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000100)={0x4, 0x0, {0x6, @usage=0x1, 0x0, 0x401, 0x3f, 0x16b, 0x800, 0x8, 0x42, @usage=0x8, 0x3, 0x4, [0x7, 0x1ff, 0x3ff, 0x6, 0x83b, 0x2]}, {0x0, @usage=0x8000, 0x0, 0x3, 0xfffffffffffffff9, 0x2, 0xafea, 0x2, 0x2, @usage=0xac, 0x1, 0x1, [0x7, 0x4, 0x3, 0x101, 0x4, 0xff]}, {0x9, @struct={0x8, 0xfffff000}, 0x0, 0x8, 0x3f, 0x8, 0x4, 0x6, 0x0, @usage=0xfffffffffffffff9, 0x80000001, 0xfffff800, [0x9c2c, 0x1, 0x7, 0x9, 0x0, 0xa2e4]}, {0x0, 0x8f, 0x4}}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x84000, 0x0) sendmsg$nl_crypto(r2, &(0x7f0000000ac0)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000a80)={&(0x7f0000000980)=@getstat={0xe0, 0x15, 0x800, 0x70bd2b, 0x25dfdbfd, {{'essiv-cbc-aes-sha256-neon\x00'}, '\x00', '\x00', 0x0, 0x2000}, ["", "", "", "", "", ""]}, 0xe0}, 0x1, 0x0, 0x0, 0x40800}, 0x4000000) (async) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000500)={r1, 0x5, 0x1, [0x80000001, 0xfff, 0x0, 0x10001, 0x6], [0x3, 0x4, 0x20, 0xffffffffffffff9a, 0x7, 0xffffffffffff0001, 0x8, 0x100000000, 0x4, 0xfffffffffffffff7, 0x400, 0x1, 0x8, 0x6, 0xc5a2, 0x1, 0x100000001, 0x10a, 0x8000, 0xfffffffeffffffff, 0xffffffffffff7fff, 0x0, 0x4, 0x10000, 0x80000001, 0x5, 0xffffffffffffff00, 0x81, 0xffff, 0x8000000000000001, 0x80, 0x7, 0x14d, 0x4000000, 0x5, 0x5, 0x2, 0xf556, 0xdaf, 0x1, 0x1, 0x40, 0x1ff, 0x1, 0x7, 0x0, 0x7129d585, 0xffffffff, 0x6, 0x7c, 0x33, 0x810b, 0xfffffffffffffffe, 0x3, 0xc42, 0x10001, 0x289f, 0x7cdd, 0x8, 0x1, 0xfe50, 0x6, 0x0, 0x8, 0x8000000000000001, 0x5, 0x0, 0x9, 0x5, 0x2, 0x8000, 0x80, 0x2b14, 0xda, 0x64, 0x3, 0x7, 0x6, 0x1, 0xb4, 0xf54, 0x4, 0x80000000, 0x6, 0x8055, 0x6, 0x7f, 0x2, 0xd46, 0x4, 0x0, 0x5cb17c14, 0x2, 0x8001, 0x5, 0x6, 0x5, 0x1, 0x101, 0x8, 0x1, 0x7f, 0xb413, 0xffffffff00000001, 0x72, 0x800, 0x3, 0x17, 0x7fffffffffffffff, 0x9, 0x7fff, 0x1, 0x7ff, 0x5, 0x7, 0x4ccf935a, 0x6, 0x2, 0x5, 0x8001, 0x1]}) 17:41:12 executing program 5: sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1fe}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x20}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7fff}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000001) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xf4\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xf7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\bc\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x86\x16FG0\x1e0\xea\xa5\x16c\xfe\x9f\xc4\xf6\x8fC*\xc1\xe85Q\xec\xf1\xe3\xd1\xbb\x01M\xf0?}\x7f\x18[\xf134T\v[\xc7\x01$\x93`75U\xb0\b\x94\xe1\xff\x8c\xd6yC\xc8]\xc9\xb5\xd4\x8b\xe6\xc6\x88\\\xc7\xf2\x13:\x91\xdd\x00\x002\xbcu\xec\xa6\xc4{\xe5\x9a\x95\xdc\x91\x0e}\xbc\xbd\xfd\xadG\x1e2\x8a\x1e#\r\xdc>#\xa2\xd1.\xb2\v\x9c\xeb\x9fX\xdck\x80\xfc\x1c\x8f\xf0e\xa2*,\xa3\xb1!\xae\x80\xeex\xba\x91\xc0\x1a\x80\xf6\xed\x11\xbcI\x90\xff\xd0\x14\x82\x14\x10\xf5\x84\x93Ot\xddt\x83>\xbaR\xa8\xab\xae;t\xc1!//y\r\xeb\xe12}\xb0}\x054P\xcb\x17\xa0YZ\x8a>\x04\xf1\xf3\'\x93OOf\xc6\xe3\xecd\xd8>\x15\x86\xdc\x81\xd44)W\xc8\xa1\xbe\x8c\x9aJ\xde\x96n\b\xff^\ty\xcb\\jx\xbc\xd7@\x9c\xcfh\xe8pu\x03\xdd\xab\xf6\xb9L\xab\x12\x9c7g\xee`\x80;\x9b&\xbb'}, 0x1bc) 17:41:12 executing program 2: setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) (async) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) 17:41:12 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) fsync(r0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7374613f00000000000000a08af71a8fc8a23a4365ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42d4d3e687a31ed5a2ce5f2bb58f0c9dbed3abafe2070fc67e6cdf758257e69f80905be6e2cd2b9a6a4f0127ab2f47b51e4ffdd3c322e3efaad78ef24a21e44c6d9627238fc031a1eddc8da74b127b12fe934193eea1d9000080000000099cfb681a7f3f7e53efba857cda1be085f7f2b233d508189ed298407e9825e1069"], 0xfffffffffffffe66) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(0xffffffffffffffff, 0x80286722, &(0x7f0000000080)={&(0x7f0000000000), 0x0, 0x7, 0x91}) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(0xffffffffffffffff, 0xc00464be, &(0x7f0000000000)={0x1}) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, &(0x7f0000000040)={0x1, 0x9c, &(0x7f00000000c0)=""/156}) 17:41:12 executing program 5: sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1fe}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x20}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7fff}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000001) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xf4\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xf7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\bc\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x86\x16FG0\x1e0\xea\xa5\x16c\xfe\x9f\xc4\xf6\x8fC*\xc1\xe85Q\xec\xf1\xe3\xd1\xbb\x01M\xf0?}\x7f\x18[\xf134T\v[\xc7\x01$\x93`75U\xb0\b\x94\xe1\xff\x8c\xd6yC\xc8]\xc9\xb5\xd4\x8b\xe6\xc6\x88\\\xc7\xf2\x13:\x91\xdd\x00\x002\xbcu\xec\xa6\xc4{\xe5\x9a\x95\xdc\x91\x0e}\xbc\xbd\xfd\xadG\x1e2\x8a\x1e#\r\xdc>#\xa2\xd1.\xb2\v\x9c\xeb\x9fX\xdck\x80\xfc\x1c\x8f\xf0e\xa2*,\xa3\xb1!\xae\x80\xeex\xba\x91\xc0\x1a\x80\xf6\xed\x11\xbcI\x90\xff\xd0\x14\x82\x14\x10\xf5\x84\x93Ot\xddt\x83>\xbaR\xa8\xab\xae;t\xc1!//y\r\xeb\xe12}\xb0}\x054P\xcb\x17\xa0YZ\x8a>\x04\xf1\xf3\'\x93OOf\xc6\xe3\xecd\xd8>\x15\x86\xdc\x81\xd44)W\xc8\xa1\xbe\x8c\x9aJ\xde\x96n\b\xff^\ty\xcb\\jx\xbc\xd7@\x9c\xcfh\xe8pu\x03\xdd\xab\xf6\xb9L\xab\x12\x9c7g\xee`\x80;\x9b&\xbb'}, 0x1bc) 17:41:12 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000080)={0x0, 0x2}, 0x2) 17:41:12 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="047461636b2022206d27d23285d30a1f9c319cbed638c43eaf8fe07175bc50567ca41456a4b3d7c354eff05c5fb66994fdb745c1cbdbffdca35966660c1ba2e7ffecf17758ffc4ec88e7ef7c3b923c34c5a80eb3e3659687bc3b3de2a44f5e89e7ac91c150a5998610b25ba1561263a1044c888863bc958211fe6c2ea060dc52f0dfcdd62340ab9085fe4647301e30ea251663fe9fccf6838e03dd9df292d24193f55f2dbbecc1fff3d1d936d71ce5c248f27d8b66b705523fe09379898caaf89d33e926c7ad7b8ce53fd91dfac7778f24c111b758"], 0x97) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f00000000c0)=[0x3, 0x2], 0x2) r3 = dup2(r0, r1) openat$cgroup_ro(r3, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) 17:41:12 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#Xu\x9f/\xe8\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc\xefa\xbe\xfeC\xd6\xfa|\xb2\xce\xe1\xd3s5$\xed'}, 0x3d) 17:41:12 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, '\x00'}) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e9f, @multicast2}, 0x10) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000080)=0x14) ioctl$int_out(r0, 0x1, 0x0) 17:41:12 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) fsync(r0) (async) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7374613f00000000000000a08af71a8fc8a23a4365ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42d4d3e687a31ed5a2ce5f2bb58f0c9dbed3abafe2070fc67e6cdf758257e69f80905be6e2cd2b9a6a4f0127ab2f47b51e4ffdd3c322e3efaad78ef24a21e44c6d9627238fc031a1eddc8da74b127b12fe934193eea1d9000080000000099cfb681a7f3f7e53efba857cda1be085f7f2b233d508189ed298407e9825e1069"], 0xfffffffffffffe66) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(0xffffffffffffffff, 0x80286722, &(0x7f0000000080)={&(0x7f0000000000), 0x0, 0x7, 0x91}) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(0xffffffffffffffff, 0xc00464be, &(0x7f0000000000)={0x1}) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, &(0x7f0000000040)={0x1, 0x9c, &(0x7f00000000c0)=""/156}) 17:41:12 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 17:41:12 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'stack ', '*,@\x00'}, 0xa) ioctl$int_out(r0, 0x1, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) 17:41:12 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\fwX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6\x00\x00\x00\x00\x00\x00'}, 0x97) 17:41:12 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f0000000080)={{0x10001, 0x2e6}, 0x100, './file0\x00'}) ioctl$int_out(r0, 0x1, 0x0) 17:41:12 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, '\x00'}) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e9f, @multicast2}, 0x10) (async) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000080)=0x14) (async) ioctl$int_out(r0, 0x1, 0x0) 17:41:12 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 17:41:12 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, '\x00'}) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e9f, @multicast2}, 0x10) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000080)=0x14) ioctl$int_out(r0, 0x1, 0x0) 17:41:12 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={'stack ', '^]^}!\x00'}, 0xc) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x6, 0x4, 0x0, "28c304c3ba533f11d9edb23bfe60bfd56eb101554966af1c84ac59b55510fdeae398450017e926237d2d7634f6256c37d4311ae76be043cc1d2f6f82f67598", 0x39}, 0x60) 17:41:12 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) fsync(r0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7374613f00000000000000a08af71a8fc8a23a4365ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42d4d3e687a31ed5a2ce5f2bb58f0c9dbed3abafe2070fc67e6cdf758257e69f80905be6e2cd2b9a6a4f0127ab2f47b51e4ffdd3c322e3efaad78ef24a21e44c6d9627238fc031a1eddc8da74b127b12fe934193eea1d9000080000000099cfb681a7f3f7e53efba857cda1be085f7f2b233d508189ed298407e9825e1069"], 0xfffffffffffffe66) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(0xffffffffffffffff, 0x80286722, &(0x7f0000000080)={&(0x7f0000000000), 0x0, 0x7, 0x91}) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(0xffffffffffffffff, 0xc00464be, &(0x7f0000000000)={0x1}) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, &(0x7f0000000040)={0x1, 0x9c, &(0x7f00000000c0)=""/156}) openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) fsync(r0) (async) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7374613f00000000000000a08af71a8fc8a23a4365ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42d4d3e687a31ed5a2ce5f2bb58f0c9dbed3abafe2070fc67e6cdf758257e69f80905be6e2cd2b9a6a4f0127ab2f47b51e4ffdd3c322e3efaad78ef24a21e44c6d9627238fc031a1eddc8da74b127b12fe934193eea1d9000080000000099cfb681a7f3f7e53efba857cda1be085f7f2b233d508189ed298407e9825e1069"], 0xfffffffffffffe66) (async) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(0xffffffffffffffff, 0x80286722, &(0x7f0000000080)={&(0x7f0000000000), 0x0, 0x7, 0x91}) (async) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(0xffffffffffffffff, 0xc00464be, &(0x7f0000000000)={0x1}) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) (async) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, &(0x7f0000000040)={0x1, 0x9c, &(0x7f00000000c0)=""/156}) (async) 17:41:12 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x92P\xb2\x88\xc9/\xaf\x13\xe5\xf8#X\xa0\x8a\xf7\x1a\x8f\xc8\xa2:CgL]\xcc\xaa6e\xea\x12\x88\xfb\x80\x17r\x0e\x00\x00\x00\x00\xcauu\x97C\x8a\x95\xff\xc8\x181\\\xe3\xcc|\xb2\xce\xe5\xc4-\xa2\x88\xfa'}, 0xfffffffffffffe66) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x4) openat$userio(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) 17:41:12 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000000080)={&(0x7f0000000000)=""/55, 0x37, 0x0, 0x2}) 17:41:12 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) (async) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) (async) 17:41:12 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, '\x00'}) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e9f, @multicast2}, 0x10) (async) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000080)=0x14) ioctl$int_out(r0, 0x1, 0x0) 17:41:12 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x40600, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:12 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) 17:41:12 executing program 4: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)=[0x2, 0x8, 0x8, 0x6, 0x6, 0xcab1, 0x8000, 0x4, 0x101]) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) socketpair(0x1e, 0x4, 0x0, &(0x7f0000000240)) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c9242fc1bd423f8fc8a23a43674c5dccaa3665ea232839c117720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fa0000000000"], 0xfffffffffffffe66) 17:41:12 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c92faf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2dee5c42da288fa"], 0xfffffffffffffe66) 17:41:12 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000080)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 17:41:12 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x97) 17:41:12 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x97) 17:41:12 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) (fail_nth: 1) 17:41:12 executing program 4: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)=[0x2, 0x8, 0x8, 0x6, 0x6, 0xcab1, 0x8000, 0x4, 0x101]) (async) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) socketpair(0x1e, 0x4, 0x0, &(0x7f0000000240)) (async) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c9242fc1bd423f8fc8a23a43674c5dccaa3665ea232839c117720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fa0000000000"], 0xfffffffffffffe66) 17:41:12 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) (fail_nth: 1) 17:41:12 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) (fail_nth: 1) 17:41:12 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$int_out(r0, 0x1, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000080)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 17:41:12 executing program 4: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)=[0x2, 0x8, 0x8, 0x6, 0x6, 0xcab1, 0x8000, 0x4, 0x101]) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) socketpair(0x1e, 0x4, 0x0, &(0x7f0000000240)) (async) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b209250b288c9242fc1bd423f8fc8a23a43674c5dccaa3665ea232839c117720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fa0000000000"], 0xfffffffffffffe66) [ 2257.646744] FAULT_INJECTION: forcing a failure. [ 2257.646744] name failslab, interval 1, probability 0, space 0, times 0 [ 2257.669708] FAULT_INJECTION: forcing a failure. [ 2257.669708] name failslab, interval 1, probability 0, space 0, times 0 [ 2257.700198] CPU: 1 PID: 6688 Comm: syz-executor.3 Not tainted 4.14.290-syzkaller #0 [ 2257.708011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2257.717362] Call Trace: [ 2257.719951] dump_stack+0x1b2/0x281 [ 2257.723585] should_fail.cold+0x10a/0x149 [ 2257.727735] should_failslab+0xd6/0x130 [ 2257.731711] __kmalloc_track_caller+0x2bc/0x400 [ 2257.732152] FAULT_INJECTION: forcing a failure. [ 2257.732152] name failslab, interval 1, probability 0, space 0, times 0 [ 2257.736374] ? proc_pid_attr_write+0x16c/0x320 [ 2257.736389] memdup_user+0x22/0xa0 [ 2257.736399] proc_pid_attr_write+0x16c/0x320 [ 2257.736412] __vfs_write+0xe4/0x630 [ 2257.736419] ? proc_pid_wchan+0xf0/0xf0 [ 2257.736427] ? __handle_mm_fault+0x80f/0x4620 [ 2257.736444] ? kernel_read+0x110/0x110 [ 2257.776015] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2257.781455] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2257.786456] vfs_write+0x17f/0x4d0 [ 2257.789980] SyS_write+0xf2/0x210 [ 2257.793414] ? SyS_read+0x210/0x210 [ 2257.797025] ? __do_page_fault+0x159/0xad0 [ 2257.801242] ? do_syscall_64+0x4c/0x640 [ 2257.805196] ? SyS_read+0x210/0x210 [ 2257.808805] do_syscall_64+0x1d5/0x640 [ 2257.812677] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2257.817847] RIP: 0033:0x7f2fa849b279 [ 2257.821540] RSP: 002b:00007f2fa6e10168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2257.829231] RAX: ffffffffffffffda RBX: 00007f2fa85adf80 RCX: 00007f2fa849b279 [ 2257.836496] RDX: 0000000000000007 RSI: 00000000200001c0 RDI: 0000000000000003 [ 2257.843747] RBP: 00007f2fa6e101d0 R08: 0000000000000000 R09: 0000000000000000 [ 2257.850997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2257.858251] R13: 00007ffdff356dff R14: 00007f2fa6e10300 R15: 0000000000022000 [ 2257.865517] CPU: 0 PID: 6701 Comm: syz-executor.1 Not tainted 4.14.290-syzkaller #0 [ 2257.873311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2257.882659] Call Trace: [ 2257.885240] dump_stack+0x1b2/0x281 [ 2257.888863] should_fail.cold+0x10a/0x149 [ 2257.893006] should_failslab+0xd6/0x130 [ 2257.896969] __kmalloc_track_caller+0x2bc/0x400 [ 2257.901622] ? proc_pid_attr_write+0x16c/0x320 [ 2257.906189] memdup_user+0x22/0xa0 [ 2257.909743] proc_pid_attr_write+0x16c/0x320 [ 2257.914137] __vfs_write+0xe4/0x630 [ 2257.917745] ? proc_pid_wchan+0xf0/0xf0 [ 2257.921702] ? __handle_mm_fault+0x80f/0x4620 [ 2257.926178] ? kernel_read+0x110/0x110 [ 2257.930054] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2257.935492] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2257.940493] vfs_write+0x17f/0x4d0 [ 2257.944020] SyS_write+0xf2/0x210 [ 2257.947462] ? SyS_read+0x210/0x210 [ 2257.951070] ? __do_page_fault+0x159/0xad0 [ 2257.955286] ? do_syscall_64+0x4c/0x640 [ 2257.959240] ? SyS_read+0x210/0x210 [ 2257.962865] do_syscall_64+0x1d5/0x640 [ 2257.966741] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2257.971914] RIP: 0033:0x7f6bbbeec279 [ 2257.975780] RSP: 002b:00007f6bba861168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2257.983470] RAX: ffffffffffffffda RBX: 00007f6bbbffef80 RCX: 00007f6bbbeec279 [ 2257.990721] RDX: 0000000000000350 RSI: 0000000020000b00 RDI: 0000000000000003 17:41:12 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) close(r0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x101) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c90caf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1280fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fa596e5d11e1244a8ad5c1fdb7fdbd6c9b44c6e960227f7c06e9b65d32ebc53dbcdcbdb7a20f01716448"], 0x45) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000180)={0x0, 0x200, 0x10001, 0x1}) 17:41:12 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x97) 17:41:12 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000080)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$int_out(r0, 0x1, 0x0) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000080)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) [ 2257.997981] RBP: 00007f6bba8611d0 R08: 0000000000000000 R09: 0000000000000000 [ 2258.005244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2258.012519] R13: 00007ffcd7dff57f R14: 00007f6bba861300 R15: 0000000000022000 [ 2258.021579] CPU: 1 PID: 6696 Comm: syz-executor.0 Not tainted 4.14.290-syzkaller #0 [ 2258.029389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2258.038737] Call Trace: [ 2258.041321] dump_stack+0x1b2/0x281 [ 2258.044952] should_fail.cold+0x10a/0x149 [ 2258.049102] should_failslab+0xd6/0x130 [ 2258.053078] __kmalloc_track_caller+0x2bc/0x400 [ 2258.057744] ? proc_pid_attr_write+0x16c/0x320 [ 2258.062328] memdup_user+0x22/0xa0 [ 2258.065870] proc_pid_attr_write+0x16c/0x320 [ 2258.070286] __vfs_write+0xe4/0x630 [ 2258.071529] FAULT_INJECTION: forcing a failure. [ 2258.071529] name failslab, interval 1, probability 0, space 0, times 0 [ 2258.073910] ? proc_pid_wchan+0xf0/0xf0 [ 2258.073920] ? __handle_mm_fault+0x80f/0x4620 [ 2258.073931] ? kernel_read+0x110/0x110 [ 2258.073950] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2258.073966] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2258.107960] vfs_write+0x17f/0x4d0 [ 2258.111486] SyS_write+0xf2/0x210 [ 2258.114924] ? SyS_read+0x210/0x210 [ 2258.118532] ? __do_page_fault+0x159/0xad0 [ 2258.122761] ? do_syscall_64+0x4c/0x640 [ 2258.126721] ? SyS_read+0x210/0x210 [ 2258.130340] do_syscall_64+0x1d5/0x640 [ 2258.134220] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2258.139397] RIP: 0033:0x7f688deec279 [ 2258.143094] RSP: 002b:00007f688c861168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 17:41:13 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) (fail_nth: 2) [ 2258.150790] RAX: ffffffffffffffda RBX: 00007f688dffef80 RCX: 00007f688deec279 [ 2258.158048] RDX: 0000000000000350 RSI: 0000000020000b00 RDI: 0000000000000003 [ 2258.165303] RBP: 00007f688c8611d0 R08: 0000000000000000 R09: 0000000000000000 [ 2258.172571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2258.179833] R13: 00007ffc5fa1aa4f R14: 00007f688c861300 R15: 0000000000022000 [ 2258.187104] CPU: 0 PID: 6719 Comm: syz-executor.1 Not tainted 4.14.290-syzkaller #0 17:41:13 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) close(r0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x101) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c90caf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1280fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fa596e5d11e1244a8ad5c1fdb7fdbd6c9b44c6e960227f7c06e9b65d32ebc53dbcdcbdb7a20f01716448"], 0x45) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000180)={0x0, 0x200, 0x10001, 0x1}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) close(r0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) (async) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x101) (async) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c90caf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1280fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fa596e5d11e1244a8ad5c1fdb7fdbd6c9b44c6e960227f7c06e9b65d32ebc53dbcdcbdb7a20f01716448"], 0x45) (async) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000180)={0x0, 0x200, 0x10001, 0x1}) (async) 17:41:13 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x97) [ 2258.194901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2258.204256] Call Trace: [ 2258.206846] dump_stack+0x1b2/0x281 [ 2258.210481] should_fail.cold+0x10a/0x149 [ 2258.214634] should_failslab+0xd6/0x130 [ 2258.218613] kmem_cache_alloc+0x40/0x3c0 [ 2258.222765] audit_log_start.part.0+0x20e/0x650 [ 2258.227436] ? kauditd_thread+0x630/0x630 [ 2258.231586] ? audit_filter+0x2a6/0x960 [ 2258.235566] ? audit_compare_dname_path+0x90/0x90 [ 2258.240407] ? aa_lookupn_profile+0x120/0x950 [ 2258.244900] ? __aafs_ns_mkdir+0x9d0/0x9d0 [ 2258.249125] audit_log_start+0x45/0x70 [ 2258.253008] ? audit_file_mask+0x110/0x110 [ 2258.257242] common_lsm_audit+0xb2/0x1a70 [ 2258.261388] ? ipv6_skb_to_auditdata+0xcb0/0xcb0 [ 2258.266143] ? aa_lookupn_profile+0x151/0x950 [ 2258.270642] aa_audit+0x1cb/0x620 [ 2258.274092] ? audit_file_mask+0x110/0x110 [ 2258.278341] aa_audit_file+0x2c0/0x540 [ 2258.282229] ? file_audit_cb+0x670/0x670 [ 2258.286377] ? aa_label_parse+0x512/0xa20 [ 2258.290535] ? lock_acquire+0x170/0x3f0 [ 2258.294511] aa_change_profile+0xcd3/0x2440 [ 2258.298842] ? kernel_poison_pages+0x1b/0x250 [ 2258.303341] ? aa_change_hat+0xf60/0xf60 [ 2258.307398] ? depot_save_stack+0x10d/0x3f0 [ 2258.311713] ? __lock_acquire+0x5fc/0x3f20 [ 2258.315939] ? do_syscall_64+0x1d5/0x640 [ 2258.319989] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2258.325446] ? __lock_acquire+0x5fc/0x3f20 [ 2258.329687] apparmor_setprocattr+0x98c/0xa80 [ 2258.334186] ? apparmor_cred_free+0x70/0x70 [ 2258.338498] ? aa_file_perm+0x2dd/0xab0 [ 2258.342910] ? proc_pid_attr_write+0x1c0/0x320 [ 2258.347577] ? __might_fault+0x177/0x1b0 [ 2258.351618] security_setprocattr+0x74/0xb0 [ 2258.355920] proc_pid_attr_write+0x22b/0x320 [ 2258.360368] __vfs_write+0xe4/0x630 [ 2258.364009] ? proc_pid_wchan+0xf0/0xf0 [ 2258.367962] ? __handle_mm_fault+0x80f/0x4620 [ 2258.372436] ? kernel_read+0x110/0x110 [ 2258.376308] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2258.381734] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2258.386730] vfs_write+0x17f/0x4d0 [ 2258.390248] SyS_write+0xf2/0x210 [ 2258.393678] ? SyS_read+0x210/0x210 [ 2258.397282] ? __do_page_fault+0x159/0xad0 [ 2258.401518] ? do_syscall_64+0x4c/0x640 [ 2258.405469] ? SyS_read+0x210/0x210 [ 2258.409072] do_syscall_64+0x1d5/0x640 [ 2258.412959] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2258.418123] RIP: 0033:0x7f6bbbeec279 [ 2258.421809] RSP: 002b:00007f6bba861168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2258.429668] RAX: ffffffffffffffda RBX: 00007f6bbbffef80 RCX: 00007f6bbbeec279 [ 2258.436935] RDX: 0000000000000350 RSI: 0000000020000b00 RDI: 0000000000000003 [ 2258.444199] RBP: 00007f6bba8611d0 R08: 0000000000000000 R09: 0000000000000000 17:41:13 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000001c0)={'exec ', '&\x00'}, 0x7) (fail_nth: 2) 17:41:13 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f0000000480)={{0xfff, 0x5}, 0x100, './file0\x00'}) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB="d4", @ANYRES16=0x0, @ANYBLOB="02006bbd7000fbdbdf250400000005002f00010500380304e0830751f131d5ebc03de5ac78d7b44e03921809ebff2ceb9e4f80d2fcb684ca60c48425d5f79794f6502b64d8ab0eedb4c2136f612a53f86aad696b75c0267fbebbe686218e1d3897f1ab55aab39b", @ANYRES32=0x0, @ANYBLOB="050029000100000008002c00fbffffff05003500050000000800310006000000080032000500000008003c0001000080"], 0x64}, 0x1, 0x0, 0x0, 0x8c0}, 0x40) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000080)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r3, 0x80286722, &(0x7f0000000400)={&(0x7f0000001b00)=""/4096, 0x1000, 0x2, 0x5}) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f00000003c0), 0x4) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) 17:41:13 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'exec ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x96) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x210, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80000}, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x210, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80000}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, r3, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x4000800) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x20, r3, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, r2, 0x200, 0x70bd25, 0x25dfd3fc}, 0x14}}, 0x8c0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r2, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7fffffff}]}, 0x40}, 0x1, 0x0, 0x0, 0x24008014}, 0x48000) 17:41:13 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) close(r0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x101) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="737461636b209250b288c90caf13e5f82358a08af71a8fc8a23a43674c5dccaa3665ea1280fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fa596e5d11e1244a8ad5c1fdb7fdbd6c9b44c6e960227f7c06e9b65d32ebc53dbcdcbdb7a20f01716448"], 0x45) (async) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000180)={0x0, 0x200, 0x10001, 0x1}) 17:41:13 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) (fail_nth: 2) 17:41:13 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000b00)={'stack ', '#\x14\xe9_(\xfb\x16\xee\xb6\xfa)\xdd\x1a1\x92D\x1asKP\xf9\xb1p\xc6\xb9(g\x95W~\xdf\xba\xb1\xff\x16\r.a\xeb\x05\xa0\x87\xe8\x12\x87$j\x88xZ\x8c`\xd4(\x14;\x1br\x0e\xe7\x7f\x84Sh\xb60\x98\xdb\xb3\x1ay:\x7f\a)\xbc$\xdc%\x8dc\x88\x01Ud*\'\xcc\xf1\xe7\x02\xe5\xac\xcc\xa7\x06\x9e<\x12_5\x88/\x93\xbc\xcbN\xe9b\xe13\xd5bWwWG \xba\xb7K8\xb9\xbb\xb3\x02\x17\xfdP\x0fD\x89;\x19gd2\xb8\xd7\x96B\xda\x8e\x91\xab\x13\xb8\xff\xbd\\\x87s\xc0z0\xa9\xf5D\xf25\xce\xf6\x01h\x8e\xc8\x14p\x06\xc9\"\xa4\x9f\x12\x97\xd5\xc0!\x10=\xc7\xd3\xb9r\xee\x11\x1f\x06V\x94eeV\x9f%\x0e\xe7]\xbb\xbdi\xc5\x91oD82b{\xdd=\xcc\xeb:\xd4\xa4\x15o$83w\x8aR\xa0R)\xab\x14\xbc:\x8b`\xef\"\xcf,\x01\xc8\xe5\b~=\x9f\xa8\x10f\xfd\x7fVP/\xc2q\xa69\x88M\x16\xcb\x90\x14\xbbCk!3wz\xf3\xb8\x1e\x84\x02r\xc2\xf6\xde\xe4\xcc\xda\xfb\xce\xf1\xbb\x95* \x1d\x17\x91\xb8b\xbafn\f_6\xe0\xb6\x8ftPB\x961\x90\xd7Q\x02Kh\xc1\xacd\xd2\x18\n\a\xfbi\xb5BH\x99\xbcX8d\x98\"t\xc9}1i\x02\xd0\xc4\x04!N\xa0\xd9x\xbf.U\x1e\x8e\x11y\x88\x96\xfc\xea\xc3\x8f\xcd-\xe9f\xdd\xd5\xe4\xce\xdb\xa1\x85\x16\xf7\xc2\xda\xa6\x0eO\xe4c\x7fN\xbbf6\x01>\x8b\xbc[O\xf2y\xec\x1b\xaf\xa5_\xe7\xc5%\x16\xaa\x06X/k\xb6\x11\x1as\x11\x98U\x04\x94$7_\xf9\xfe\t\xb5S\xca\xc67\xc8\xe4\xaa%\xf2b,M\xa9\x18\x9e\xc5\xa0e\t:\xf9\xc2\x1aA\xa0\x80\x7f\x87\x06\xad\x9f\x1ac\xab~W5\xc6\xcf\xcf\xe4&\xa4&\xd0n\xff\xb2\xd8e[!)z\xbb\x83\xcd\x98\x8cqc\xc8\x18\a\xda\x80\x9a8\x1b\x05\x94,\x03\x1fToNX\xe6,\xc5\nyv&k3\xd4j\xeb\xde\xaf\xa3\xe3\xf9v\xed\x15{\xcf\xa5p\x06#\x1a\x05+\xc7ZL\xdc\x856\xdbg\xc3\xa8\rI\x06\xe1\xb0\x18\x93(M\x131\xfb\x1bN\xa6\xf7\x88\"-\xb7Z%\x06G\xd20\xb5]\xe4w\xba\x81WZ\xf7\xc7\xfe\xce\x8d\x0f[wU\xf2\xe4#\xa0O\xf0\xd5s\x89\xbc\n\xc1{X)\xecs\x8aC\x18o\xef\x9a\xf8\x0f\xef\xd4)~T\xe2\xec\x94N\x03,\xc4\xb4k\xb8\xbc\xa4\xa2#N]\xa1\xa6\x822\xbf\xbc\xed:Q\xc6xg\x16\xeb\x15A\xa2\xea\xbd\xab\r\x04R\x81\xbf\xd2\xbay9_H\x0f\xb8m\x97\xda\xab\x8d\x81*@\xbe\xb0\xe1\xc1i?w\xa1\x0f\xba\xe4+~gT8\xf9\xf4\xbf\xbe!\xba?B\xee7\x8f\xbf,R\xc4\x82\xf9\xe3\xcc\x9f\xf8\xfds\x84\x95\xe6+\xad\x8fD\x90\xab\xd4\x1b8z\xbbH\xe8\x99S\b\xc0\x83\xdb\x8b\xbd\xd0!\xcf\x1e\xb1\xedD\x90\x9b\x1f\xaf\xc7\xae\xd3\x89\xbe\xdd\xbe4\xdf\xc8*e\xf8m\xf4Sd7\x1f\xf1\xda\x9e\x19\x84G\x00'/842}, 0x350) (fail_nth: 3) [ 2258.451445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2258.458693] R13: 00007ffcd7dff57f R14: 00007f6bba861300 R15: 0000000000022000 17:41:13 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f0000000480)={{0xfff, 0x5}, 0x100, './file0\x00'}) (async) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB="d4", @ANYRES16=0x0, @ANYBLOB="02006bbd7000fbdbdf250400000005002f00010500380304e0830751f131d5ebc03de5ac78d7b44e03921809ebff2ceb9e4f80d2fcb684ca60c48425d5f79794f6502b64d8ab0eedb4c2136f612a53f86aad696b75c0267fbebbe686218e1d3897f1ab55aab39b", @ANYRES32=0x0, @ANYBLOB="050029000100000008002c00fbffffff05003500050000000800310006000000080032000500000008003c0001000080"], 0x64}, 0x1, 0x0, 0x0, 0x8c0}, 0x40) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000080)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r3, 0x80286722, &(0x7f0000000400)={&(0x7f0000001b00)=""/4096, 0x1000, 0x2, 0x5}) (async) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f00000003c0), 0x4) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) 17:41:13 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7374f82358a08af71a8fc8a23a43674c5dccaa3665ea1288fb8017720e00000000ca757597438a95ffc818315ce3cc7cb2cee5c42da288fa4b6a1080a23c3bd3a4292abaf3ec561101c5afef26f424526b6b062af94b795903b334a14dffe1e74188c9f140865f77c1d839d044"], 0xfffffffffffffe66) 17:41:13 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'exec ', '\" m\'\xd22\x85\xd3\n\x1f\x9c1\x9c\xbe\xb48\xc4>\xaf\x8f\xe0qu\xbcPV|\xa4\x14V\xa4\xb3\xd7\xc3T\xef\xf0\\_\xb6i\x94\xfd\xb7E\xc1\xcb\xdb\xff\xdc\xa3Yff\f\x1b\xa2\xe7\xff\xec\xf1wX\xff\xc4\xec\x88\xe7\xef|;\x92<4\xc5\xa8\x0e\xb3\xe3e\x96\x87\xbc;=\xe2\xa4O^\x89\xe7\xac\x91\xc1P\xa5\x99\x86\x10\xb2[\xa1V\x12c\xa1\x04L\x88\x88c\xbc\x95\x82\x11\xfel.\xa0`\xdcR\xf0\xdf\xcd\xd6#@\xab\x90\x85\xfeFG0\x1e0\xea%\x16c\xfe\x9f\xc4\xf6'}, 0x96) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x210, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80000}, 0x0) (async) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x210, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80000}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, r3, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}}, 0x4000800) (async) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x20, r3, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) (async) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, r2, 0x200, 0x70bd25, 0x25dfd3fc}, 0x14}}, 0x8c0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r2, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7fffffff}]}, 0x40}, 0x1, 0x0, 0x0, 0x24008014}, 0x48000) [ 2258.511134] FAULT_INJECTION: forcing a failure. [ 2258.511134] name failslab, interval 1, probability 0, space 0, times 0 [ 2258.529552] FAULT_INJECTION: forcing a failure. [ 2258.529552] name failslab, interval 1, probability 0, space 0, times 0 [ 2258.548529] CPU: 0 PID: 6744 Comm: syz-executor.0 Not tainted 4.14.290-syzkaller #0 [ 2258.556345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2258.565695] Call Trace: [ 2258.568279] dump_stack+0x1b2/0x281 [ 2258.571906] should_fail.cold+0x10a/0x149 [ 2258.576056] should_failslab+0xd6/0x130 [ 2258.580032] kmem_cache_alloc+0x40/0x3c0 [ 2258.584106] audit_log_start.part.0+0x20e/0x650 [ 2258.588777] ? kauditd_thread+0x630/0x630 [ 2258.592927] ? audit_filter+0x2a6/0x960 [ 2258.596167] FAULT_INJECTION: forcing a failure. [ 2258.596167] name failslab, interval 1, probability 0, space 0, times 0 17:41:13 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_out(r0, 0x1, 0x0) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f0000000480)={{0xfff, 0x5}, 0x100, './file0\x00'}) (async) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB="d4", @ANYRES16=0x0, @ANYBLOB="02006bbd7000fbdbdf250400000005002f00010500380304e0830751f131d5ebc03de5ac78d7b44e03921809ebff2ceb9e4f80d2fcb684ca60c48425d5f79794f6502b64d8ab0eedb4c2136f612a53f86aad696b75c0267fbebbe686218e1d3897f1ab55aab39b", @ANYRES32=0x0, @ANYBLOB="050029000100000008002c00fbffffff05003500050000000800310006000000080032000500000008003c0001000080"], 0x64}, 0x1, 0x0, 0x0, 0x8c0}, 0x40) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000080)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) (async) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r3, 0x80286722, &(0x7f0000000400)={&(0x7f0000001b00)=""/4096, 0x1000, 0x2, 0x5}) (async) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f00000003c0), 0x4) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) [ 2258.596930] ? audit_compare_dname_path+0x90/0x90 [ 2258.612933] ? aa_lookupn_profile+0x120/0x950 [ 2258.617429] ? __aafs_ns_mkdir+0x9d0/0x9d0 [ 2258.621655] audit_log_start+0x45/0x70 [ 2258.625550] ? audit_file_mask+0x110/0x110 [ 2258.629778] common_lsm_audit+0xb2/0x1a70 [ 2258.633922] ? ipv6_skb_to_auditdata+0xcb0/0xcb0 [ 2258.638672] ? aa_lookupn_profile+0x151/0x950 [ 2258.643156] aa_audit+0x1cb/0x620 [ 2258.646601] ? audit_file_mask+0x110/0x110 [ 2258.650825] aa_audit_file+0x2c0/0x540 [ 2258.654702] ? file_audit_cb+0x670/0x670 17:41:13 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) fsync(r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$int_out(r0, 0x1, 0x0) [ 2258.658768] ? aa_label_parse+0x512/0xa20 [ 2258.662904] ? lock_acquire+0x170/0x3f0 [ 2258.666868] aa_change_profile+0xcd3/0x2440 [ 2258.671204] ? kernel_poison_pages+0x1b/0x250 [ 2258.675788] ? aa_change_hat+0xf60/0xf60 [ 2258.679834] ? depot_save_stack+0x10d/0x3f0 [ 2258.684154] ? __lock_acquire+0x5fc/0x3f20 [ 2258.688394] ? do_syscall_64+0x1d5/0x640 [ 2258.692449] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2258.697801] ? __lock_acquire+0x5fc/0x3f20 [ 2258.702030] apparmor_setprocattr+0x98c/0xa80 [ 2258.706518] ? apparmor_cred_free+0x70/0x70 17:41:13 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) fsync(r1) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async, rerun: 64) ioctl$int_out(r0, 0x1, 0x0) (rerun: 64) [ 2258.710831] ? aa_file_perm+0x2dd/0xab0 [ 2258.714808] ? proc_pid_attr_write+0x1c0/0x320 [ 2258.719394] ? __might_fault+0x177/0x1b0 [ 2258.723453] security_setprocattr+0x74/0xb0 [ 2258.727766] proc_pid_attr_write+0x22b/0x320 [ 2258.732167] __vfs_write+0xe4/0x630 [ 2258.735788] ? proc_pid_wchan+0xf0/0xf0 [ 2258.739771] ? __handle_mm_fault+0x80f/0x4620 [ 2258.744298] ? kernel_read+0x110/0x110 [ 2258.748183] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2258.753615] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2258.758616] vfs_write+0x17f/0x4d0 [ 2258.762139] SyS_write+0xf2/0x210 [ 2258.765585] ? SyS_read+0x210/0x210 [ 2258.769198] ? __do_page_fault+0x159/0xad0 [ 2258.773419] ? do_syscall_64+0x4c/0x640 [ 2258.777374] ? SyS_read+0x210/0x210 [ 2258.780987] do_syscall_64+0x1d5/0x640 [ 2258.784875] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2258.790053] RIP: 0033:0x7f688deec279 [ 2258.793751] RSP: 002b:00007f688c861168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2258.801454] RAX: ffffffffffffffda RBX: 00007f688dffef80 RCX: 00007f688deec279 [ 2258.808705] RDX: 0000000000000350 RSI: 0000000020000b00 RDI: 0000000000000003 [ 2258.815955] RBP: 00007f688c8611d0 R08: 0000000000000000 R09: 0000000000000000 [ 2258.823208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2258.830476] R13: 00007ffc5fa1aa4f R14: 00007f688c861300 R15: 0000000000022000 [ 2258.839218] CPU: 0 PID: 6746 Comm: syz-executor.3 Not tainted 4.14.290-syzkaller #0 [ 2258.847043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2258.856386] Call Trace: [ 2258.858970] dump_stack+0x1b2/0x281 [ 2258.862594] should_fail.cold+0x10a/0x149 [ 2258.866736] should_failslab+0xd6/0x130 [ 2258.870706] kmem_cache_alloc+0x28e/0x3c0 [ 2258.874847] prepare_creds+0x39/0x490 [ 2258.878655] aa_set_current_onexec+0x1e/0x200 [ 2258.883148] aa_change_profile+0x120e/0x2440 [ 2258.887549] ? aa_change_hat+0xf60/0xf60 [ 2258.891596] ? depot_save_stack+0x10d/0x3f0 [ 2258.895908] ? __lock_acquire+0x5fc/0x3f20 [ 2258.900130] ? do_syscall_64+0x1d5/0x640 [ 2258.904177] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2258.909527] ? __lock_acquire+0x5fc/0x3f20 [ 2258.913759] apparmor_setprocattr+0x972/0xa80 [ 2258.918244] ? apparmor_cred_free+0x70/0x70 [ 2258.922561] ? aa_file_perm+0x2dd/0xab0 [ 2258.926519] ? proc_pid_attr_write+0x1c0/0x320 [ 2258.931091] ? __might_fault+0x177/0x1b0 [ 2258.935140] security_setprocattr+0x74/0xb0 [ 2258.939458] proc_pid_attr_write+0x22b/0x320 [ 2258.943860] __vfs_write+0xe4/0x630 [ 2258.947481] ? proc_pid_wchan+0xf0/0xf0 [ 2258.951447] ? __handle_mm_fault+0x80f/0x4620 [ 2258.955937] ? kernel_read+0x110/0x110 [ 2258.959835] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2258.965285] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2258.970303] vfs_write+0x17f/0x4d0 [ 2258.973843] SyS_write+0xf2/0x210 [ 2258.977288] ? SyS_read+0x210/0x210 [ 2258.980934] ? __do_page_fault+0x159/0xad0 [ 2258.985180] ? do_syscall_64+0x4c/0x640 [ 2258.989147] ? SyS_read+0x210/0x210 [ 2258.992770] do_syscall_64+0x1d5/0x640 [ 2258.996656] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2259.001832] RIP: 0033:0x7f2fa849b279 [ 2259.005526] RSP: 002b:00007f2fa6e10168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2259.013226] RAX: ffffffffffffffda RBX: 00007f2fa85adf80 RCX: 00007f2fa849b279 [ 2259.020483] RDX: 0000000000000007 RSI: 00000000200001c0 RDI: 0000000000000003 [ 2259.027740] RBP: 00007f2fa6e101d0 R08: 0000000000000000 R09: 0000000000000000 [ 2259.034997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2259.042252] R13: 00007ffdff356dff R14: 00007f2fa6e10300 R15: 0000000000022000 [ 2259.049521] CPU: 1 PID: 6748 Comm: syz-executor.1 Not tainted 4.14.290-syzkaller #0 [ 2259.050624] AppArmor WARN aa_audit_file: ((!((&sa)->apparmor_audit_data)->request)): [ 2259.057313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2259.057317] Call Trace: [ 2259.057332] dump_stack+0x1b2/0x281 [ 2259.057345] should_fail.cold+0x10a/0x149 [ 2259.057357] should_failslab+0xd6/0x130 [ 2259.057369] kmem_cache_alloc_node+0x54/0x410 [ 2259.057382] __alloc_skb+0x5c/0x510 [ 2259.057395] audit_log_start.part.0+0x233/0x650 [ 2259.057407] ? kauditd_thread+0x630/0x630 [ 2259.057417] ? audit_filter+0x2a6/0x960 [ 2259.057431] ? audit_compare_dname_path+0x90/0x90 [ 2259.057448] ? aa_lookupn_profile+0x120/0x950 [ 2259.057458] ? __aafs_ns_mkdir+0x9d0/0x9d0 [ 2259.057466] audit_log_start+0x45/0x70 [ 2259.057476] ? audit_file_mask+0x110/0x110 [ 2259.057486] common_lsm_audit+0xb2/0x1a70 [ 2259.065831] ------------[ cut here ]------------ [ 2259.074899] ? ipv6_skb_to_auditdata+0xcb0/0xcb0 [ 2259.077465] WARNING: CPU: 0 PID: 6746 at security/apparmor/file.c:136 aa_audit_file.cold+0x18/0x4f [ 2259.081064] ? aa_lookupn_profile+0x151/0x950 [ 2259.085181] Kernel panic - not syncing: panic_on_warn set ... [ 2259.085181] [ 2259.089141] aa_audit+0x1cb/0x620 [ 2259.169323] ? audit_file_mask+0x110/0x110 [ 2259.173541] aa_audit_file+0x2c0/0x540 [ 2259.177410] ? file_audit_cb+0x670/0x670 [ 2259.181458] ? aa_label_parse+0x512/0xa20 [ 2259.185592] ? lock_acquire+0x170/0x3f0 [ 2259.189551] aa_change_profile+0xcd3/0x2440 [ 2259.193861] ? kernel_poison_pages+0x1b/0x250 [ 2259.198337] ? aa_change_hat+0xf60/0xf60 [ 2259.202382] ? depot_save_stack+0x10d/0x3f0 [ 2259.206687] ? __lock_acquire+0x5fc/0x3f20 [ 2259.210904] ? do_syscall_64+0x1d5/0x640 [ 2259.214951] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2259.220315] ? __lock_acquire+0x5fc/0x3f20 [ 2259.224537] apparmor_setprocattr+0x98c/0xa80 [ 2259.229014] ? apparmor_cred_free+0x70/0x70 [ 2259.233320] ? aa_file_perm+0x2dd/0xab0 [ 2259.237282] ? proc_pid_attr_write+0x1c0/0x320 [ 2259.241871] ? __might_fault+0x177/0x1b0 [ 2259.245915] security_setprocattr+0x74/0xb0 [ 2259.250218] proc_pid_attr_write+0x22b/0x320 [ 2259.254612] __vfs_write+0xe4/0x630 [ 2259.258231] ? proc_pid_wchan+0xf0/0xf0 [ 2259.262185] ? __handle_mm_fault+0x80f/0x4620 [ 2259.266677] ? kernel_read+0x110/0x110 [ 2259.270556] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2259.275990] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2259.280990] vfs_write+0x17f/0x4d0 [ 2259.284512] SyS_write+0xf2/0x210 [ 2259.287947] ? SyS_read+0x210/0x210 [ 2259.291555] ? __do_page_fault+0x159/0xad0 [ 2259.295770] ? do_syscall_64+0x4c/0x640 [ 2259.299726] ? SyS_read+0x210/0x210 [ 2259.303333] do_syscall_64+0x1d5/0x640 [ 2259.307207] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2259.312376] RIP: 0033:0x7f6bbbeec279 [ 2259.316067] RSP: 002b:00007f6bba861168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2259.323759] RAX: ffffffffffffffda RBX: 00007f6bbbffef80 RCX: 00007f6bbbeec279 [ 2259.331010] RDX: 0000000000000350 RSI: 0000000020000b00 RDI: 0000000000000003 [ 2259.338260] RBP: 00007f6bba8611d0 R08: 0000000000000000 R09: 0000000000000000 [ 2259.345530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2259.352778] R13: 00007ffcd7dff57f R14: 00007f6bba861300 R15: 0000000000022000 [ 2259.360055] CPU: 0 PID: 6746 Comm: syz-executor.3 Not tainted 4.14.290-syzkaller #0 [ 2259.367844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2259.377190] Call Trace: [ 2259.379772] dump_stack+0x1b2/0x281 [ 2259.383413] panic+0x1f9/0x42d [ 2259.386601] ? add_taint.cold+0x16/0x16 [ 2259.390578] ? aa_audit_file.cold+0x18/0x4f [ 2259.394898] ? __warn.cold+0x5/0x44 [ 2259.398528] ? aa_audit_file.cold+0x18/0x4f [ 2259.402842] __warn.cold+0x20/0x44 [ 2259.406380] ? ist_end_non_atomic+0x10/0x10 [ 2259.410696] ? aa_audit_file.cold+0x18/0x4f [ 2259.415013] report_bug+0x208/0x250 [ 2259.418637] do_error_trap+0x195/0x2d0 [ 2259.422521] ? math_error+0x2d0/0x2d0 [ 2259.426318] ? ___preempt_schedule+0x16/0x18 [ 2259.430730] ? vprintk_emit+0x247/0x620 [ 2259.434702] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2259.439544] invalid_op+0x1b/0x40 [ 2259.442993] RIP: 0010:aa_audit_file.cold+0x18/0x4f [ 2259.447914] RSP: 0018:ffff88809f6977c8 EFLAGS: 00010282 [ 2259.453270] RAX: 0000000000000049 RBX: 1ffff11013ed2efc RCX: 0000000000000000 [ 2259.460522] RDX: 0000000000040000 RSI: ffffffff814430d0 RDI: ffffed1013ed2eef [ 2259.467772] RBP: ffff88809f6979f0 R08: 0000000000000049 R09: 0000000000000000 [ 2259.475021] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000fffffff4 [ 2259.482275] R13: ffff88823f8bd680 R14: ffff88809f697840 R15: 0000000000000000 [ 2259.489535] ? vprintk_func+0x60/0x160 [ 2259.493422] ? aa_audit_file.cold+0x18/0x4f [ 2259.497721] ? file_audit_cb+0x670/0x670 [ 2259.501759] ? prepare_creds+0x39/0x490 [ 2259.505730] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2259.511177] ? prepare_creds+0x3c9/0x490 [ 2259.515227] aa_change_profile+0xcd3/0x2440 [ 2259.519543] ? aa_change_hat+0xf60/0xf60 [ 2259.523582] ? depot_save_stack+0x10d/0x3f0 [ 2259.527889] ? __lock_acquire+0x5fc/0x3f20 [ 2259.532102] ? do_syscall_64+0x1d5/0x640 [ 2259.536142] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2259.541485] ? __lock_acquire+0x5fc/0x3f20 [ 2259.545706] apparmor_setprocattr+0x972/0xa80 [ 2259.550199] ? apparmor_cred_free+0x70/0x70 [ 2259.554509] ? aa_file_perm+0x2dd/0xab0 [ 2259.558470] ? proc_pid_attr_write+0x1c0/0x320 [ 2259.563031] ? __might_fault+0x177/0x1b0 [ 2259.567071] security_setprocattr+0x74/0xb0 [ 2259.571458] proc_pid_attr_write+0x22b/0x320 [ 2259.575845] __vfs_write+0xe4/0x630 [ 2259.579449] ? proc_pid_wchan+0xf0/0xf0 [ 2259.583402] ? __handle_mm_fault+0x80f/0x4620 [ 2259.587873] ? kernel_read+0x110/0x110 [ 2259.591741] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2259.597173] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2259.602166] vfs_write+0x17f/0x4d0 [ 2259.605687] SyS_write+0xf2/0x210 [ 2259.609117] ? SyS_read+0x210/0x210 [ 2259.612718] ? __do_page_fault+0x159/0xad0 [ 2259.616934] ? do_syscall_64+0x4c/0x640 [ 2259.620896] ? SyS_read+0x210/0x210 [ 2259.624505] do_syscall_64+0x1d5/0x640 [ 2259.628378] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2259.633547] RIP: 0033:0x7f2fa849b279 [ 2259.637234] RSP: 002b:00007f2fa6e10168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2259.644922] RAX: ffffffffffffffda RBX: 00007f2fa85adf80 RCX: 00007f2fa849b279 [ 2259.652194] RDX: 0000000000000007 RSI: 00000000200001c0 RDI: 0000000000000003 [ 2259.659438] RBP: 00007f2fa6e101d0 R08: 0000000000000000 R09: 0000000000000000 [ 2259.666683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2259.673935] R13: 00007ffdff356dff R14: 00007f2fa6e10300 R15: 0000000000022000 [ 2259.681439] Kernel Offset: disabled [ 2259.685118] Rebooting in 86400 seconds..