0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:13 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x430) 06:04:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000040)={0x4, &(0x7f0000000380)=[{}, {}, {}, {}]}) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) 06:04:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0xdf00}, 0x0) 06:04:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80000, 0x1, 0x3, 0x9, 0x7f, 0x1, 0x5, 0x0, 0x100000001, 0x2, 0x3, 0x787, 0xa8, 0x100, 0x5, 0x2, 0xc3ff, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0xbf00}, 0x0) 06:04:14 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000011000000000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x1, 0x3, 0x9, 0x7f, 0x1, 0x5, 0x0, 0x100000001, 0x2, 0x3, 0x787, 0xa8, 0x100, 0x5, 0x2, 0xc3ff, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x34, 0x8040) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x8000) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) 06:04:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair(0x0, 0x1, 0x2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$KVM_S390_VCPU_FAULT(r2, 0x4008ae52, &(0x7f0000000040)=0x1c00000000000000) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000180)={0x1, 0x0, [{0x12, 0x0, 0x6579}]}) 06:04:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000380), &(0x7f00000001c0)) r1 = gettid() r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x80, 0x0) getpeername$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000100)=0x10) process_vm_writev(r1, &(0x7f0000000140)=[{&(0x7f0000000500)=""/167, 0xa7}], 0x1, &(0x7f0000000240)=[{&(0x7f00000005c0)=""/172, 0xac}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r4, 0x5421, &(0x7f0000008ff8)=0x3f) r5 = getpid() execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100), &(0x7f0000000140)) fcntl$setown(r3, 0x8, r5) fcntl$setsig(r3, 0xa, 0x12) dup2(r3, r4) tkill(r1, 0x13) open(&(0x7f0000363ff8)='./file0\x00', 0x401, 0x0) 06:04:14 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000050000000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x305400) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @loopback}}, 0x7, 0x3}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000080)={r3, 0xc8, &(0x7f0000000200)=[@in6={0xa, 0x4e24, 0x480000000000000, @mcast1, 0x2}, @in6={0xa, 0x4e20, 0x1000, @empty, 0x401}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e22, 0xffffffffffff8000, @empty, 0x9}, @in6={0xa, 0x4e24, 0x10000, @local, 0xffffffffffffff0f}, @in6={0xa, 0x4e21, 0x7fff, @local, 0x5}, @in6={0xa, 0x4e23, 0x7, @remote, 0x734}, @in={0x2, 0x4e23, @rand_addr=0x842f}]}, &(0x7f0000000300)=0x10) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000380)={'veth1_to_team\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}) 06:04:14 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000001100000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_TSC_KHZ(r3, 0xaea3) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000100)={0x2794a437d75b4f29, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000040)={0x7b}) 06:04:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x9, 0x7f, 0x1, 0x5, 0x0, 0x100000001, 0x2, 0x3, 0x787, 0xa8, 0x100, 0x5, 0x2, 0xc3ff, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x97000000}, 0x0) [ 1773.607110] __bpf_mt_check_bytecode: 10 callbacks suppressed [ 1773.607116] xt_bpf: check failed: parse error 06:04:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xff34) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000340)={@dev, 0x0, r0}) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r0, 0x1, 0x6, @random="03130d7e6393"}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00'}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000001500)={&(0x7f0000000140)={0x10, 0x3}, 0xc, &(0x7f00000014c0)={&(0x7f0000000180)=@newsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@local}, {@in=@multicast1=0xe0000008, 0x0, 0x3c}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}}, 0x0) 06:04:15 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000070000000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x1) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/218) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x129a}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) [ 1773.900220] xt_bpf: check failed: parse error 06:04:15 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000050000000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x8f000000}, 0x0) [ 1774.066116] xt_bpf: check failed: parse error 06:04:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x7f, 0x1, 0x5, 0x0, 0x100000001, 0x2, 0x3, 0x787, 0xa8, 0x100, 0x5, 0x2, 0xc3ff, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x800) bind$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @host}, 0x10) ioctl$NBD_DISCONNECT(r2, 0xab08) 06:04:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 06:04:17 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000020000000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:17 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8002, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000040)) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x29, 0x1b, &(0x7f00000001c0), 0x2b4) close(r2) 06:04:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0xaf00}, 0x0) 06:04:17 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000050000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) [ 1776.259482] xt_bpf: check failed: parse error 06:04:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x9c) r2 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x0, 0x8800) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000300)={0x6000, &(0x7f0000000280), 0x4, r2, 0x8}) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000002000)) r4 = socket(0xf, 0x804, 0x200) accept4(r0, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f00000003c0)=0x80, 0x800) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xe4, r5, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xc62}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfffffffffffffffc}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x80000000}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7fffffff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7fffffff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x800}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7523}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x8040}, 0x90) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f0000000880)={{&(0x7f0000012000/0x2000)=nil, 0x2000}}) [ 1776.322966] QAT: Invalid ioctl [ 1776.367874] QAT: Invalid ioctl 06:04:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7f, 0x1, 0x5, 0x0, 0x100000001, 0x2, 0x3, 0x787, 0xa8, 0x100, 0x5, 0x2, 0xc3ff, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) [ 1776.422271] xt_bpf: check failed: parse error 06:04:17 executing program 5: socketpair$unix(0x1, 0x2000000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() ptrace$setregs(0xd, r1, 0xfffffffffffffffd, &(0x7f0000000200)="ebb6f9e99492d4df8b8bbbd06007886835d8d47d5883641dd5972fd7d71134b3384284097d3977223699c240227c02db6f8424b0ef55709f5794537044207f083fda32844bd2836da8fc713c46ae9cd068fb328b413c506cda016856b3f579b76d2a31e2aebe965656a77799a5363db3da8b456311ff1f0252efc5272a59e7c3b43a22d7980aecb1b292bb9f6d8584b33ef90bd2a679ab27798b0d84ab7cf7bfd416a892b4fd0e0191577630cb30102f896e0a80b8e761887e7bba3e9ee2795a") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x74, &(0x7f0000000140)={0x0, @in={{0x2, 0x1a0ffffffff}}}, &(0x7f00000002c0)=0x84) close(r3) close(r0) r4 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xbadc, 0x0) ioctl$KDSETKEYCODE(r4, 0x4b4d, &(0x7f00000000c0)={0x9, 0x180}) 06:04:17 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000200000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:18 executing program 4: pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f00000001c0)={0x0, 0x0, @pic={0x7, 0x9, 0x7, 0x3, 0x3, 0x1, 0x1, 0x80, 0x2, 0x80, 0x401, 0x1, 0x0, 0x2, 0xfffffffffffffffa, 0x200}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0x10) r5 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x9, 0x80000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000440)={r4, 0x8}, &(0x7f0000000480)=0x8) finit_module(r2, &(0x7f0000000100)='!#\x00', 0x3) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40485404, &(0x7f0000000780)={{0x3, 0x2, 0x9, 0x1, 0x100}, 0x0, 0x400000003f}) r7 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f00000004c0)={r6, 0xfffffffffffffc00}, 0x8) write$USERIO_CMD_SEND_INTERRUPT(r5, &(0x7f0000000540)={0x2, 0x1}, 0x2) connect$l2tp(r7, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x100000000000, 0x0, 0x0, 0x80000}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x81}}, 0xe8) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040), 0x10) sendmmsg(r7, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r5, 0x84, 0x6c, &(0x7f0000000640)=ANY=[@ANYBLOB="3100000094f7502931ffffb32d2fa288a26cf5251b7ee89c29d5877cbd55453917ff3f02c592af9ae50000000000000000008fafb89ada0e7873f7c9c43d000000000000006ee3f26a06001f53633ba3b83e9746cf3a89ce62aaad799312b2cacee7014f7590ca2ce3c15c5c39e0922d152cd88315b3869bcb16b4d90bcc6bf4fd45ea5571030f4761f7633f3ea74190f8055ff1e39372c67b0000f246e03ec70fabf7cdd12a8f76982637a09010"], &(0x7f0000000500)=0x1) ioctl$PIO_SCRNMAP(r5, 0x4b41, &(0x7f0000000580)="6658e4995fc0f130fe149fac9fdf8a97ccbdf3cbbce79fadac20da30de5a5fa301fe93fe7fc164e5f3d3ee17c626001456677ba900b4005f50cf9bc5d770a5cf656c570c179261d2edb56f976eaef084ccb81fa517c815f584b855053ccf9f3d4102708a09797ab83bb2be9e70754dd554822619cacd775fcd14b26c9013ebda48a64c36776fdc73c634d71aa1ba6acf672ac1d49e9227f2084f55084f4491fd360e6a") getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={0x0, @multicast2, @dev}, &(0x7f00000000c0)=0xc) 06:04:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0xb300}, 0x0) [ 1776.796768] xt_bpf: check failed: parse error 06:04:18 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x200) write$P9_RREADDIR(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x122) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) 06:04:18 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000100)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={r3, @in={{0x2, 0x4e20, @remote}}}, 0x84) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x800000000004, 0x20011, r2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0xd, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000000)=0x2c2) 06:04:18 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000020000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0xbe00000000000000}, 0x0) 06:04:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f, 0x1, 0x5, 0x0, 0x100000001, 0x2, 0x3, 0x787, 0xa8, 0x100, 0x5, 0x2, 0xc3ff, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) [ 1777.089039] xt_bpf: check failed: parse error 06:04:18 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000880000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:18 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3800000000000, 0x80) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x10008) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) 06:04:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x93000000}, 0x0) 06:04:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x100000001, 0x2, 0x3, 0x787, 0xa8, 0x100, 0x5, 0x2, 0xc3ff, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) [ 1777.322107] xt_bpf: check failed: parse error 06:04:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x3, 0x20100) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f00000001c0)={0x1, 0xba, 0x40}) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000080)='comm\x00') ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000140)="ff9388e338ede00956d630305d96d5335b962ec43a65bed2c7a521fc4eac40316917e78239503592141a76aac73d05397e1805a16dfdf754cb75d54f229a86") sched_setaffinity(r3, 0x8, &(0x7f0000000040)) 06:04:18 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000600000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x100000001, 0x2, 0x3, 0x787, 0xa8, 0x100, 0x5, 0x2, 0xc3ff, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) [ 1777.652508] xt_bpf: check failed: parse error 06:04:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0xc7000000}, 0x0) 06:04:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f0000000540)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000a802000038010000ffffffffffffffff00000000ffffffff28020000ffffffffffffffff28020000ffffffff03000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x308) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 06:04:19 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000300000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x2, 0x3, 0x787, 0xa8, 0x100, 0x5, 0x2, 0xc3ff, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0xf900}, 0x0) [ 1778.018084] xt_bpf: check failed: parse error 06:04:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 06:04:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x200000014, &(0x7f0000000080)=0x6, 0x4) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT=0x0], 0x17) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x2f8, &(0x7f0000000700)=[{&(0x7f0000000500)=""/247, 0xf7}], 0x38e, &(0x7f0000000280)=""/148, 0xcb, 0x6}, 0x800000) sendmmsg(r0, &(0x7f0000000000), 0x1f, 0x0) 06:04:19 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000600000000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) munmap(&(0x7f0000364000/0x2000)=nil, 0x2000) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf0000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x80000, 0x0) getsockname$inet(r2, &(0x7f0000000100)={0x2, 0x0, @rand_addr}, &(0x7f0000000180)=0x10) timerfd_create(0x3, 0x80000) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f00000000c0)=0x6) shmget(0x3, 0x3000, 0xbfffffffffffffff, &(0x7f0000ffa000/0x3000)=nil) 06:04:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0xdf}, 0x0) 06:04:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x2, 0x3, 0x787, 0xa8, 0x100, 0x5, 0x2, 0xc3ff, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x165f1c0c, 0x7, 0x94}) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) 06:04:20 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000110000000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:20 executing program 4: timer_create(0x7, &(0x7f0000af8000)={0x0, 0x34, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000240)}}, &(0x7f0000b86ffc)) r0 = accept4(0xffffffffffffff9c, &(0x7f0000002440)=@hci, &(0x7f00000024c0)=0x80, 0x800) r1 = syz_genetlink_get_family_id$team(&(0x7f0000002540)='team\x00') recvmsg(0xffffffffffffffff, &(0x7f0000002a80)={&(0x7f0000002600)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f00000029c0)=[{&(0x7f0000002680)=""/22, 0x16}, {&(0x7f00000026c0)=""/112, 0x70}, {&(0x7f0000002740)=""/23, 0x17}, {&(0x7f0000002780)=""/85, 0x55}, {&(0x7f0000002800)=""/173, 0xad}, {&(0x7f00000028c0)=""/17, 0x11}, {&(0x7f0000002900)=""/186, 0xba}], 0x7, &(0x7f0000002a40)=""/1, 0x1, 0x6}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b00)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000002c00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000002d80)={@loopback, @local, 0x0}, &(0x7f0000002dc0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002e40)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000003380)={0x11, 0x0, 0x0}, &(0x7f00000033c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003400)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003440)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000003540)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000003680)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004b80)={0x0, @local, @dev}, &(0x7f0000004bc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004cc0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000004dc0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000005340)={&(0x7f0000002500)={0x10, 0x0, 0x0, 0x40004000}, 0xc, &(0x7f0000005300)={&(0x7f0000004e00)={0x4fc, r1, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1f8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xd8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x54a}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x200, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x380d}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x7fffffff, 0x8, 0xe6, 0x2}, {0x2, 0x4, 0x8, 0x6bbdd7f1}, {0xc9, 0x8, 0xc95c, 0x3f}, {0x452, 0x3, 0x4, 0x4}, {0x25c8a15f, 0xdde0, 0x0, 0x4}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r9}, {0xd8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xff}}, {0x8, 0x6, r10}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x6, 0x9, 0xffff, 0x771}, {0x400, 0x3, 0x40, 0x7f}, {0x4, 0x40, 0x9, 0x6}, {0x5, 0x7, 0x0, 0x8}, {0x3, 0x2, 0x5, 0x9}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r11}}}]}}]}, 0x4fc}, 0x1, 0x0, 0x0, 0x40000}, 0x20000080) prctl$seccomp(0x16, 0x1, &(0x7f00004ebff0)={0x0, &(0x7f0000185ff8)}) r12 = open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x80) ioctl$sock_inet6_tcp_SIOCATMARK(r12, 0x8905, &(0x7f0000000040)) r13 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002140)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r12, &(0x7f0000002280)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x4000008}, 0xc, &(0x7f0000002240)={&(0x7f0000002180)=ANY=[@ANYBLOB="94000000", @ANYRES16=r13, @ANYBLOB="00042dbd7000ffdbdf25100000003c00030008000400330a000014000600fe80000000000000000000000000000a080008002300000014000600ff02000000000000000000000000000108000500ffff00003c000200080006000032000008000600ff7fffff080009000400000008000800e52b0000080002004e23000008000400ff7f00000800040006000000"], 0x94}, 0x1, 0x0, 0x0, 0x80}, 0x90) timer_settime(0x0, 0x0, &(0x7f0000040fe0)={{}, {0x0, 0x9}}, &(0x7f0000040000)) ioctl$KVM_SET_NESTED_STATE(r12, 0x4080aebf, &(0x7f0000005380)={0x2, 0x0, 0x2080, {0x3004, 0x11001}, [], "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", "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"}) sendmsg$IPVS_CMD_GET_INFO(r12, &(0x7f0000002400)={&(0x7f00000022c0), 0xc, &(0x7f00000023c0)={&(0x7f0000002300)={0x90, r13, 0x38, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0xa}}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8001}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xf0}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffffff9}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x90}, 0x1, 0x0, 0x0, 0x8000}, 0x4008804) [ 1778.760033] audit: type=1326 audit(1540188260.191:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11439 comm="syz-executor4" exe="/root/syz-executor4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 06:04:20 executing program 4: pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$sndseq(r0, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000604ffc)) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x8000) [ 1778.818505] __bpf_mt_check_bytecode: 1 callbacks suppressed [ 1778.818512] xt_bpf: check failed: parse error 06:04:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x787, 0xa8, 0x100, 0x5, 0x2, 0xc3ff, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0xd2}, 0x0) 06:04:20 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000030000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x378) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) 06:04:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000140)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) socket$vsock_stream(0x28, 0x1, 0x0) sendmmsg(r0, &(0x7f0000004c80)=[{{0x0, 0x18020000, &(0x7f0000004b40), 0x6c, &(0x7f0000004bc0)}}], 0x31e9cd3487dc94, 0x0) 06:04:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) munmap(&(0x7f0000364000/0x2000)=nil, 0x2000) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf0000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x80000, 0x0) getsockname$inet(r2, &(0x7f0000000100)={0x2, 0x0, @rand_addr}, &(0x7f0000000180)=0x10) timerfd_create(0x3, 0x80000) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f00000000c0)=0x6) shmget(0x3, 0x3000, 0xbfffffffffffffff, &(0x7f0000ffa000/0x3000)=nil) [ 1779.172190] xt_bpf: check failed: parse error 06:04:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x410000, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) 06:04:20 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000080)="fef3bd8bf3cc3aec91c6a6743887ffcdf520eb15aa7e8eb0cd2edcad82a81613af8f3d547d1f0f9bda0c3da82d14387a0b") 06:04:20 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000110000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:20 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000080)="fef3bd8bf3cc3aec91c6a6743887ffcdf520eb15aa7e8eb0cd2edcad82a81613af8f3d547d1f0f9bda0c3da82d14387a0b") 06:04:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x9}, 0x0) [ 1779.519219] xt_bpf: check failed: parse error 06:04:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x787, 0xa8, 0x100, 0x5, 0x2, 0xc3ff, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:21 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000080)="fef3bd8bf3cc3aec91c6a6743887ffcdf520eb15aa7e8eb0cd2edcad82a81613af8f3d547d1f0f9bda0c3da82d14387a0b") 06:04:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000700000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000000)={'team_slave_0\x00', {0x2, 0x4e22, @broadcast}}) 06:04:21 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000080)="fef3bd8bf3cc3aec91c6a6743887ffcdf520eb15aa7e8eb0cd2edcad82a81613af8f3d547d1f0f9bda0c3da82d14387a0b") [ 1779.840883] xt_bpf: check failed: parse error 06:04:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x787, 0xa8, 0x100, 0x5, 0x2, 0xc3ff, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x2, 0x9, 0x0, 0x2, 0xe, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_spirange={0x2, 0x10, 0x4d6, 0x4d5}, @sadb_sa={0x2, 0x1, 0x4d2, 0xf43, 0xca6d, 0xb6, 0x3, 0x1}, @sadb_x_sa2={0x2, 0x13, 0x5, 0x0, 0x0, 0x70bd2b, 0x3505}, @sadb_lifetime={0x4, 0x4, 0x0, 0x1f, 0x7, 0x3}, @sadb_ident={0x2, 0xb, 0xfffffffffffffff7, 0x0, 0x7ff}]}, 0x70}}, 0x8800) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) r1 = socket(0x11, 0x3, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'nat\x00', 0xc2, "eb89a7daf3d6360c3ce65e7e489c147b20c9f46fff84749c1ec4dfed781aa270e326d6ce9eaf0018049bc79607f5b752c6964b9b0622fb7c184b75291334d1952bbbf457c3069f97ff2897d7ed4f15503eefd2b7410caa9ba2a24326e7639af2f0fd326e83f40d8af5855eebea63a89f882cf684d017f05cc25258ea7fb81e9afd7a58de3650400e3fa4b4ddac9d3ddaeef0abd9dbd05a64c9bb4da931256e0db88315eca7d16905f98d3c5db66637a08ed283d278785115d2a6887d704b2f43e379"}, &(0x7f0000000140)=0xe6) 06:04:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0xac00000000000000}, 0x0) 06:04:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000040000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:21 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x2, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x8001) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x1e, 0x703000) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x52, 0xc000) ioctl$PPPIOCGFLAGS(r4, 0x8004745a, &(0x7f0000000040)) recvmsg(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff46, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc360}, 0xfffffffffffffffd) r5 = inotify_add_watch(r2, &(0x7f00000001c0)='./file0\x00', 0x2000000) inotify_rm_watch(r3, r5) 06:04:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x787, 0xa8, 0x100, 0x5, 0x2, 0xc3ff, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) [ 1780.287990] xt_bpf: check failed: parse error 06:04:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000070000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x100000001, 0x8000) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000040)={0xf004, 0xf000, 0x7, 0x5, 0x3868}) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) 06:04:21 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000060000000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0xbc00}, 0x0) 06:04:22 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:22 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x20000, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000200)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x400, 0x0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000100)) unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000180), &(0x7f00000001c0)=0x10) fsetxattr(r1, &(0x7f0000000340)=ANY=[], &(0x7f0000000300)='ppp0\x00', 0x5, 0x2) openat$audio(0xffffffffffffff9c, &(0x7f0000000500)='/dev/audio\x00', 0x800, 0x0) timer_create(0x7, &(0x7f0000000000)={0x0, 0xfffffffffffffffc, 0x3, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e20, @local}}, 0x5, 0x1, 0x40, 0x0, 0x40}, &(0x7f0000000480)=0x98) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f00000004c0)={r5, 0x101}, 0x8) listen(r4, 0x20000000) r6 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r6, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r4, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000340), &(0x7f0000000380)=0xc) bind$bt_rfcomm(r7, &(0x7f0000000280)={0x1f, {0x7, 0x5, 0x2, 0xfff, 0x3}, 0x9}, 0xa) setsockopt$inet6_int(r6, 0x29, 0x33, &(0x7f0000000240)=0x100000000001f, 0x4) sendmmsg(r7, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x11000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl(r4, 0x7, &(0x7f0000000540)="1cebfbdbb9159714a6c6ddf6bf44a01833e9ab875748529abe416e9d7fb5b9b5f3c4cceea3a73146c504157148f3e9b051640931faccd5f3a2048de4ff4710fcbbff3a5be50afec5b2d8c8e5df14ededdb621a6456f488a4753ce483aca8defa1ffcf3c75cc57c96023ce63a4528e200e479bc2ee705e8") setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000002c0)=0x2, 0x4) setns(r3, 0x0) 06:04:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa8, 0x100, 0x5, 0x2, 0xc3ff, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) [ 1780.675816] xt_bpf: check failed: parse error 06:04:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sequencer\x00', 0x400000, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000540)={'bpq0\x00', 0x0}) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000580)={r2, @rand_addr=0x80000000, @remote}, 0xc) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x7fb, 0x29ef5a96}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={r3, 0x4}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000640)={r4, 0x40}, 0x8) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(camellia)\x00'}, 0x28) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x3) r5 = accept$alg(r0, 0x0, 0x0) r6 = msgget$private(0x0, 0x100) msgrcv(r6, &(0x7f0000000680)={0x0, ""/102}, 0x6e, 0x0, 0x800) syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') recvmsg(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) recvmmsg(r0, &(0x7f0000000440)=[{{&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)=""/137, 0x89}], 0x1, &(0x7f0000000380)=""/170, 0xaa, 0x10000000000000}, 0x1}], 0x1, 0x10021, 0x0) getsockopt$inet_tcp_buf(r7, 0x6, 0x52c890c7380193fa, &(0x7f0000000840)=""/4096, &(0x7f0000000480)=0x1000) 06:04:22 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000030000000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:22 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) [ 1780.960480] xt_bpf: check failed: parse error 06:04:22 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x5, 0x2, 0xc3ff, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:22 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:22 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000010000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x300fe, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x8, 0x1ff, 0x8000, 0x82bc, 0x80000001}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={r2}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={r2, 0x800}, 0x8) r3 = accept$alg(r0, 0x0, 0x0) recvmsg(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) 06:04:22 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:22 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) [ 1781.316004] xt_bpf: check failed: parse error 06:04:22 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x430) 06:04:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0xc3ff, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:22 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:22 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000000300)=[{{&(0x7f0000000000)=@sco, 0x80, &(0x7f0000000080)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/247, 0xf7}], 0x2, 0x0, 0x0, 0x3ff}, 0xfe6}], 0x1, 0x100, &(0x7f00000003c0)={r1, r2+10000000}) fgetxattr(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="7379735b82a16c5fb32263657373776c616e316263707573657400001000000000000000000000"], &(0x7f0000000540)=""/142, 0x8e) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r3 = accept$alg(r0, 0x0, 0x0) recvmsg(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000400)='/dev/vcs#\x00', 0x8, 0x410000) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000600)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0x8) syz_open_dev$rtc(&(0x7f00000006c0)='/dev/rtc#\x00', 0x6, 0x4800) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r4, 0x40505331, &(0x7f0000000640)={{0xe520156200000, 0x3f}, {0x5, 0x8f5e}, 0x1000, 0x0, 0x311}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r4, 0x40505331, &(0x7f0000000700)={{0x7, 0x8}, {0x1, 0x1}, 0x5, 0x3, 0x7}) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f00000004c0)={r5, 0x7}, 0x8) [ 1781.513295] xt_bpf: check failed: parse error 06:04:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000500000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:23 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:23 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:23 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:23 executing program 4: syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x2, 0xc3ff, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) [ 1781.777333] xt_bpf: check failed: parse error 06:04:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x430) 06:04:23 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:23 executing program 5: syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:23 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000080)='./file0\x00', 0x21000080) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000000)={0x3ff, 0x1, 0x0, 0xfdd1}, 0xc) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) 06:04:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000060000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:23 executing program 5: syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff28, 0x101000) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:23 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0xc3ff, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000006000000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:23 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000600000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:23 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4000, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) 06:04:24 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:24 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000040000000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:24 executing program 5 (fault-call:1 fault-nth:0): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:24 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) [ 1782.897900] FAULT_INJECTION: forcing a failure. [ 1782.897900] name failslab, interval 1, probability 0, space 0, times 0 [ 1782.940079] CPU: 0 PID: 11735 Comm: syz-executor5 Not tainted 4.19.0-rc8+ #296 [ 1782.947473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1782.956852] Call Trace: [ 1782.959485] dump_stack+0x1c4/0x2b6 [ 1782.963134] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1782.968364] should_fail.cold.4+0xa/0x17 [ 1782.972440] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1782.977559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1782.983110] ? check_preemption_disabled+0x48/0x280 [ 1782.988134] ? __lock_acquire+0x7ec/0x4ec0 [ 1782.992385] ? graph_lock+0x170/0x170 [ 1782.996209] ? perf_trace_lock_acquire+0x15b/0x800 [ 1783.001150] ? graph_lock+0x170/0x170 [ 1783.004974] ? mark_held_locks+0x130/0x130 [ 1783.009238] ? find_held_lock+0x36/0x1c0 [ 1783.013310] ? __lock_is_held+0xb5/0x140 [ 1783.017409] ? ___might_sleep+0x1ed/0x300 [ 1783.021577] ? arch_local_save_flags+0x40/0x40 [ 1783.026187] __should_failslab+0x124/0x180 [ 1783.030437] should_failslab+0x9/0x14 [ 1783.034277] __kmalloc_track_caller+0x2d0/0x750 [ 1783.039005] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1783.044319] ? rcu_bh_qs+0xc0/0xc0 [ 1783.047894] ? find_vpid+0xf0/0xf0 [ 1783.051453] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1783.057026] ? proc_pid_attr_write+0x198/0x540 [ 1783.057076] memdup_user+0x2c/0xa0 [ 1783.057096] proc_pid_attr_write+0x198/0x540 [ 1783.057120] __vfs_write+0x119/0x9f0 [ 1783.057142] ? check_preemption_disabled+0x48/0x280 [ 1783.078428] ? proc_loginuid_write+0x4f0/0x4f0 [ 1783.083036] ? kernel_read+0x120/0x120 [ 1783.086952] ? __lock_is_held+0xb5/0x140 [ 1783.091051] ? rcu_read_lock_sched_held+0x108/0x120 [ 1783.096087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1783.101639] ? __sb_start_write+0x1b2/0x370 [ 1783.106040] vfs_write+0x1fc/0x560 [ 1783.109620] ksys_write+0x101/0x260 [ 1783.113283] ? __ia32_sys_read+0xb0/0xb0 [ 1783.117360] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1783.122845] __x64_sys_write+0x73/0xb0 [ 1783.126752] do_syscall_64+0x1b9/0x820 [ 1783.130649] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1783.136040] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1783.140992] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1783.145846] ? trace_hardirqs_on_caller+0x310/0x310 [ 1783.150874] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1783.155914] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1783.160951] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1783.165816] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1783.171013] RIP: 0033:0x457569 06:04:24 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x430) 06:04:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) [ 1783.174251] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1783.193159] RSP: 002b:00007f5ab0c97c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1783.200879] RAX: ffffffffffffffda RBX: 00007f5ab0c97c90 RCX: 0000000000457569 [ 1783.208150] RDX: 0000000000000008 RSI: 0000000020000040 RDI: 0000000000000003 [ 1783.215424] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1783.222695] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5ab0c986d4 [ 1783.229973] R13: 00000000004c54ee R14: 00000000004d8e08 R15: 0000000000000004 06:04:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) sendmsg$nl_crypto(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x280}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=@alg={0xf0, 0x10, 0x400, 0x70bd2b, 0x25dfdbfb, {{'digest_null-generic\x00'}, [], [], 0x400, 0x2400}, [{0x8, 0x1, 0x4}, {0x8, 0x1, 0x2}]}, 0xf0}, 0x1, 0x0, 0x0, 0x10}, 0x80) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept$alg(r0, 0x0, 0x0) r3 = dup2(r2, r2) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @broadcast}, &(0x7f0000000080)=0xffffffffffffff97) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) 06:04:24 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000002000000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:25 executing program 5 (fault-call:1 fault-nth:1): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:25 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000006000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) [ 1783.663804] FAULT_INJECTION: forcing a failure. [ 1783.663804] name failslab, interval 1, probability 0, space 0, times 0 06:04:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) [ 1783.764220] CPU: 1 PID: 11773 Comm: syz-executor5 Not tainted 4.19.0-rc8+ #296 [ 1783.771641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1783.781011] Call Trace: [ 1783.783619] dump_stack+0x1c4/0x2b6 [ 1783.787275] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1783.792504] should_fail.cold.4+0xa/0x17 [ 1783.796610] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1783.801727] ? __lock_acquire+0x7ec/0x4ec0 [ 1783.805979] ? graph_lock+0x170/0x170 [ 1783.809795] ? graph_lock+0x170/0x170 [ 1783.813602] ? proc_pid_attr_write+0x28a/0x540 [ 1783.818203] ? find_held_lock+0x36/0x1c0 [ 1783.822286] ? __lock_is_held+0xb5/0x140 [ 1783.826397] ? ___might_sleep+0x1ed/0x300 [ 1783.830567] ? arch_local_save_flags+0x40/0x40 [ 1783.835165] ? mutex_trylock+0x2b0/0x2b0 [ 1783.839243] __should_failslab+0x124/0x180 [ 1783.843494] should_failslab+0x9/0x14 [ 1783.847323] __kmalloc+0x2d4/0x760 [ 1783.850888] ? graph_lock+0x170/0x170 [ 1783.854724] ? mark_held_locks+0x130/0x130 [ 1783.858985] ? apparmor_setprocattr+0x2ab/0x1150 [ 1783.863763] apparmor_setprocattr+0x2ab/0x1150 [ 1783.868369] ? apparmor_task_kill+0xcb0/0xcb0 [ 1783.872883] ? lock_downgrade+0x900/0x900 [ 1783.877054] ? arch_local_save_flags+0x40/0x40 [ 1783.881704] security_setprocattr+0x66/0xc0 [ 1783.886045] proc_pid_attr_write+0x301/0x540 [ 1783.890494] __vfs_write+0x119/0x9f0 [ 1783.894239] ? check_preemption_disabled+0x48/0x280 [ 1783.899264] ? proc_loginuid_write+0x4f0/0x4f0 [ 1783.903863] ? kernel_read+0x120/0x120 [ 1783.907766] ? __lock_is_held+0xb5/0x140 [ 1783.911854] ? rcu_read_lock_sched_held+0x108/0x120 [ 1783.916886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1783.922430] ? __sb_start_write+0x1b2/0x370 [ 1783.926766] vfs_write+0x1fc/0x560 [ 1783.930336] ksys_write+0x101/0x260 [ 1783.933988] ? __ia32_sys_read+0xb0/0xb0 [ 1783.938070] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1783.943548] __x64_sys_write+0x73/0xb0 [ 1783.947445] do_syscall_64+0x1b9/0x820 [ 1783.951349] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1783.956726] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1783.961666] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1783.966520] ? trace_hardirqs_on_caller+0x310/0x310 [ 1783.971560] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1783.976608] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1783.981651] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1783.986511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1783.991746] RIP: 0033:0x457569 [ 1783.994950] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1784.013859] RSP: 002b:00007f5ab0c97c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1784.021601] RAX: ffffffffffffffda RBX: 00007f5ab0c97c90 RCX: 0000000000457569 [ 1784.028875] RDX: 0000000000000008 RSI: 0000000020000040 RDI: 0000000000000003 [ 1784.036148] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1784.043420] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5ab0c986d4 [ 1784.050705] R13: 00000000004c54ee R14: 00000000004d8e08 R15: 0000000000000004 06:04:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) [ 1784.100508] __bpf_mt_check_bytecode: 7 callbacks suppressed [ 1784.100514] xt_bpf: check failed: parse error 06:04:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:25 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000400626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x4000) ioctl$TIOCNOTTY(r2, 0x5422) 06:04:25 executing program 5 (fault-call:1 fault-nth:2): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x8, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:25 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) [ 1784.389619] xt_bpf: check failed: parse error 06:04:25 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000088000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) [ 1784.579068] xt_bpf: check failed: parse error 06:04:26 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000005000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:26 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '&:\n'}, 0x8) 06:04:26 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000008800000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) [ 1784.711380] xt_bpf: check failed: parse error 06:04:26 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x430) 06:04:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040)={0x2, 0x3276}, 0x2) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) accept$alg(r1, 0x0, 0x0) 06:04:26 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xe4, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000040)=0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000140)=0xc) prctl$setptracer(0x59616d61, r2) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r3 = accept$alg(r1, 0x0, 0x0) recvmsg(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) [ 1784.941507] xt_bpf: check failed: parse error [ 1784.950473] xt_bpf: check failed: parse error [ 1784.957303] audit: type=1400 audit(1540188266.381:138): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=11856 comm="syz-executor5" 06:04:26 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', ':&\n'}, 0x8) 06:04:26 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) [ 1785.101181] audit: type=1400 audit(1540188266.531:139): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=11867 comm="syz-executor4" 06:04:26 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000600000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:26 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:26 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', ':=\n'}, 0x8) [ 1785.273638] audit: type=1400 audit(1540188266.701:140): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=11872 comm="syz-executor4" [ 1785.308860] xt_bpf: check failed: parse error 06:04:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:26 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x53) r1 = dup2(r0, r0) write$FUSE_INTERRUPT(r1, &(0x7f0000002000)={0x10, 0x0, 0x1}, 0x10) recvmmsg(r0, &(0x7f0000001e40)=[{{&(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000780)=""/52, 0x34}, {&(0x7f00000008c0)=""/224, 0xe0}, {&(0x7f00000009c0)=""/99, 0x63}, {&(0x7f0000000a40)=""/21, 0x15}], 0x4, 0x0, 0x0, 0x4}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)=""/155, 0x9b}], 0x1, &(0x7f0000000bc0)=""/33, 0x21, 0x5}, 0x5}, {{&(0x7f0000000c00)=@ipx, 0x80, &(0x7f0000001d80)=[{&(0x7f0000000c80)=""/177, 0xb1}, {&(0x7f0000000d40)=""/4096, 0x1000}, {&(0x7f0000001d40)=""/1, 0x1}], 0x3, &(0x7f0000001dc0)=""/126, 0x7e, 0x5}, 0x7}], 0x3, 0x100, &(0x7f0000001f00)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000001f40)={0x0, 0x2, 0x30}, &(0x7f0000001f80)=0xc) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000001fc0)=@sack_info={r3, 0x200, 0x16}, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) ptrace$peekuser(0x3, r4, 0x8) r5 = accept$alg(r0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'syzkaller1\x00', 0x40000517b}) recvmsg(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340), 0x17d, &(0x7f00000007c0)=""/16, 0xfffffffffffffd47}, 0x2) sendmmsg$alg(r5, &(0x7f0000000080)=[{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000140)="4dbfdf94f8ecf0a596a407bb334c34d80b0ff04a0c6bffd16b4fc72aed0c5a94b03d7752ee4dc54f700f947838cec8142ea5aca5613fff140f542b71ca28c0f03981f18ae9b46f791863a0cefe35cb5cb050c76ebd43df0bf5e63edcae3ed109a5345e423dcd13ab81ef8ad90e814f6282a5aaad1c4b588af1ec701c417597b8a590571c3ee9b68019ec68f58106f37460b54674d810b0563cb44e33085f8bea853fbb2b6cf753bc64200aacc969eef511d4f12715b020a21c790abf06f034547c02b5d10424a4874a1b3c558fbb421512caa90c7a4eb0e58dbc687b90a2ad1f272617df510d80c59178", 0xea}, {&(0x7f0000000240)="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", 0xfa}, {&(0x7f0000000340)="9ed14ad6e850e3a6e0c3e1272b6ab6c04e8128abab35078d40fc7469758491b44074d1706e0cfce477c0743703c0567c1b82fc20c63c41eae092ae3ac9d67f35be6452d3b67748ecd4a34ad652ba36c824de2303b2668622a90efc4ce78c9f6dd804af3def38f13f3a7de1fcbef9523b7a95873c412dc0993bce3fc973cfb901fcc1fc6ea5b6e4f61adc174d41328356403328eff0adb1828f01fd03921a2d382d7f", 0xa2}, {&(0x7f0000000400)="675bdd9bfdc8dc6afec37dd6d8308ff153ec774774ac02f4485a050b8a8c839a98fbc7a762149c841133617e753a35403a1db7cb1551e8625e1a3f595cd51c07d51c41d400a07a31851e234a69cfb69295c63af7b2942c4b041808aa119c307844b8db4f637ba82d101862d5a731d5c16d909ed24dbb35e4908ac06c18ea16a0bc0af9b455ad950c92fe9c7347", 0x8d}, {&(0x7f00000004c0)="eb0fb1b57be518be4ddb92d1ab3d3e36d906eaf75be05f1f5793e7b14f0700f2dd9e5fcc25b1cb9be43305f91fb7289de7e865fc56d75cf5123349fd0a8e1b59281c5764cedae3dfaf87eab1c6477ca71fc12a68d6c55159793e77f955c7244b7b5d32e641eb10ba5eee4125eeaf693a4169961f4569fa43daf6fafa88b0c17ed315d5d0acf304ba3e38dd9cfc2f1090abfac2c92042e517ed89e9b545563758a068cb73f5d2dad11327797e14d136a94b7730670958fb070613617479d50fd337cbb9c9", 0xc4}, {&(0x7f00000005c0)="e983eb2d2b196aea21175351328a2dc423b141a45f624f85da787d5dac0cdd97f44fb2df5d3adec6be19f56822a70398609910d81439bd3e8d37e3ee4ed6fc41c7bfbf25f69221553ba7c5845c2b47d0445e016b280eaf2041cbb49156ef32b4c234f932b9fc26ef50d6847e23ad4ddd3552a4818621ca635da574286270c04de087c774bece7bfc27560d9418d805", 0x8f}, {&(0x7f0000000040)="2ba26cade60eb9e909a1bd16118f27d9aefddc4b297d9c936731d631173ecbf026132049f162d0c16313a41b925087e248cfffa9c69f", 0x36}], 0x7, 0x0, 0x0, 0x1}], 0x1, 0x24040004) [ 1785.378413] audit: type=1400 audit(1540188266.801:141): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":=" pid=11880 comm="syz-executor5" 06:04:26 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000500000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:26 executing program 4: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:27 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x20000048) 06:04:27 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x989, 0x8c000) signalfd4(r0, &(0x7f00000000c0)={0x8}, 0x8, 0x800) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000080)={0x3, 0x100000001, 0x7, 0x4, 0xffffffff, 0x4}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) mmap$xdp(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x8, 0x10010, r0, 0x0) 06:04:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10, 0x80800) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x200, 0x220000) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2c) write$P9_RLOPEN(r2, &(0x7f0000000400)={0x18, 0xd, 0x2, {{0xe1, 0x1}, 0x992}}, 0x18) bind$alg(r0, &(0x7f0000000440)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0xfffffffffffffe23) r3 = accept$alg(r0, 0x0, 0x0) recvmsg(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x0, &(0x7f0000000280)=""/16, 0x10}, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000300)=0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f00000000c0)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000100)={r5, 0x80000, r2}) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x1, 0x0, 0x6, 0x0, 0xffffffffffff4bb1, 0x2008, 0x0, 0x1, 0x10001, 0x20, 0x0, 0x7, 0x5, 0x4, 0x2, 0x1, 0x3ff, 0x4, 0x6, 0x4f3, 0x8000, 0x976b, 0x5, 0x4, 0x20, 0x200, 0x4170, 0x168fa684, 0x3f, 0x4, 0xfffffffffffffe00, 0x6, 0x9, 0xffffffff, 0x5439, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x3}, 0x8a84, 0xffffffff, 0x42, 0x1, 0x3f, 0x2fe, 0x6}, r4, 0x6, r2, 0x1) 06:04:27 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x430) [ 1785.667724] xt_bpf: check failed: parse error [ 1785.687729] audit: type=1400 audit(1540188266.931:142): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=11892 comm="syz-executor4" 06:04:27 executing program 4: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x440341, 0x0) r3 = getuid() r4 = getgid() write$FUSE_CREATE_OPEN(r2, &(0x7f0000000280)={0xa0, 0x0, 0x6, {{0x0, 0x2, 0x4, 0x6, 0x7, 0x7, {0x1, 0x5, 0xb2a, 0x6, 0x4, 0x0, 0x7, 0x5, 0x6, 0x9, 0x2, r3, r4, 0x40, 0x7}}, {0x0, 0x1}}}, 0xa0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0xc2, "fb862c46bd184ca3f1b661d737a904f97ab5bdeaee6dbfe5f983f445f85de9a0cbdcd95c15a4666e8caae887e9ff6627cfdbfd27888ffbe3164f0123a5fe5df65ac46a4005d26f4e324ed6035d2747b39522ba7994596067f6b4d43441ee909321a7af34a9e25590ee335993402d7a09dea07a25a0789bf2ccd90bc918a3d25c258c5a8958c9c57ecb8d91815ca265ddb2560dc12fbb9351e8340164c5107fe3b11867143c8fcdefb77e17c05d84c8fe34556b07a1508a3f21709c3f0a5d8ec2e7d9"}, &(0x7f0000000040)=0xca) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000080)={r6, 0x4, 0x2, [0x6, 0x7]}, 0xc) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) 06:04:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) [ 1785.818060] xt_bpf: check failed: parse error 06:04:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:27 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYRESOCT=r0], 0x1) 06:04:27 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000006000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:27 executing program 4: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) [ 1786.128803] xt_bpf: check failed: parse error 06:04:27 executing program 5: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="65b9ac038fa2d7bf12786563203a3a0a"], 0x8) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x2) 06:04:27 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000200000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:27 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:27 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000300000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:27 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="657865636a9578e6"], 0x8) 06:04:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380)="c546395850c18c60af2518d59f37810255f4f0d12d4b58ea09448bd03bccfe5108973e0930df97061af5edb0c613594184ae57f2beca0f0e9c7960ee92b95005d0ab93fe4d74a62453e2adda486dec8413aae1bb57509dbbb6a666b4d35309c91c8dd2b4be41cd2ed53e6ce714f6e6647fe60c9eee991fbd165feab0fdfd34a4a42f66f5ad93ab7064ae162a0db3181886baea1ee76d57798387b1d73bba5edd15e2213b2271012c2a91a3105cd326cfa2b0776ff679822d449903c2b6a9dc61fc6af7a74d50bf030b6e9f7e95a5dceb8eed2fdba8ba33ed7b", 0xd9) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) ioctl$sock_ifreq(r0, 0x89b7, &(0x7f0000000180)={'gre0\x00', @ifru_names='sit0\x00'}) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={r1}) recvfrom$unix(r2, &(0x7f0000000200)=""/122, 0x7a, 0x20, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000280)='vboxnet0\x00', 0xffffffffffffffff}, 0x30) ptrace$getregs(0xe, r3, 0x0, &(0x7f0000000300)=""/49) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000480)={'yam0\x00', {0x2, 0x4e22, @loopback}}) r4 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000140)=0x54) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) getpgid(r3) 06:04:27 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:27 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000600626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:27 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x879, 0x40000) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x1}) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:27 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x424000, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000280)={0x0, 0xaf56}, 0x2) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[], 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xf8, 0x841c0) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000040)) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000002c0)={0x0, 0x8, 0xffff, 0x3ff, 0xef5, 0x100000001}) fsetxattr$security_ima(r2, &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "142a71701bc7bd3a9beed312e98f0a"}, 0x10, 0x2) 06:04:28 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:28 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="6536e21924b3cec7"], 0x2f2) 06:04:28 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000300626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:28 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000500626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:28 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="65786561203a440acc68938105d37b825bbfc791ae707b03ba30c4a1e71fd2e76cf147f014a2867581a778a2da7c1a"], 0x8) 06:04:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) sendmmsg(r0, &(0x7f00000020c0)=[{{&(0x7f0000000380)=@xdp={0x2c, 0x4, r2, 0x1e}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000400)="44cb36346565bc202560dbc7505e6765c7bac6d1d1ad6dc83646be9d4f2869f0ce0c0c80eb49659efe7261d953ac486d8e987a35ad73f388ddd4da9c019ae3baa61b0c6ea13b74125ba2c6eab825af31511700973bf1f80951de59cf01e16a5be2568f5a9315a89f842a8d27f8baefcfc7519e0a8e5675a535d227257ef56a967884457610f16c17fe64daa2752d8f2e7168bcaeafd536be6dda9a5069b88f4d4354745163a278108491d5dc035d911275b395eafb0d", 0xb6}, {&(0x7f00000004c0)="e61d2deb3bac24f785098011c6a6f2", 0xf}], 0x2, &(0x7f0000000840)=[{0x98, 0x3e, 0x5b10ace, "e605d6198d81c5724264ec43d8c31954f37d3a686c78a90b041062303ced04599860d5a228063ef929e77095e49700a050e65ad7183e8c100181d9787fe42d9053bf80a48c1048f5de6d959506688a1bb4e80109b9fb34a3513ce7740fd4fdcf6bb824ddb18c586c8c085ea8f7c8888c1ee33f776fd82b7d3af133899538eadfc64db1"}, {0x70, 0x10b, 0x8, "30e8138c4b41e8620e20be2a683e5450f14fe1bf0f77b7cdf9f72d666a18e6d6d9ac81df5b5e5318b66213d60967f5be402e655aeaf2ab53253f8720d50469d44a0e063c4edd86f0f63968a2ed6438097eee7330e12226e57bdb9dbcfaab95b5"}, {0x68, 0x0, 0x3, "550f41020ade9d758c9def43ad639c93f2e7aaa11c5aa8134b5a156f23ec56670f42b773e3f203968682dde3423c4321f5774c897bd2f88e65ced0663fc1b5cebd89177140a262ab5e71ad6e3f550d310c9e"}, {0x108, 0x103, 0x9, "fb5cab75698e29914e0bcd819b2f03231de418d213cfa326d65a6a00b4d474b66b97aea6338064dfa41bbb991ef214ec64b89a8443a50d91e3f71258e970ff3b3e2db37857bfa3b2c334c12ea7ef8562b4b531b66e1ba0a973cddd53c35328346b58e54566732ddbda5ea0c4aab349827a3e19f934c2d0b5117d7a516106181e7f9a23fc6b26d7c312ce0ebbb3a4de071eb93969478593fcb79504bc340b166bebd0f2ed361ae62b136f51ca87c1eb7f5beced1d0398cb20326e22dd014f2f121cd2dbd50550a19680d8dac882ae9bc3ceff712faadb60a55aecf377946b63863a7554b2f7b7df725aff9ae2dfac92ba0b13"}, {0x48, 0x0, 0x0, "060ef5c4c7db5c75765ce89838ca3485a350b8460af8d17639f62f006bf63a4fa645b583f7a0584c844abddaa836398aa6ee"}], 0x2c0, 0xc0}, 0x8000000000000000}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000540)="9364d2be8fb2c2cfb60e12bc6f923d160153fabed13f889fb4822059cac8", 0x1e}, {&(0x7f0000000580)="3a4bb5beeab2a3bef1e65b", 0xb}, {&(0x7f00000005c0)="c02294ec903596d2bedfb9e33806978d33406765b9b688d25f3f0ba7440610894be6df6b31361c", 0x27}, {&(0x7f0000000600)="9ebc0a2e3fa3c6302a48061c488905affb3b0ce5f60c15cb25e2a29eebe564805044f9452a7709a047deae04a37f166ed588282d620b67aa1904c726", 0x3c}], 0x4, &(0x7f0000000b00)=[{0x100, 0x111, 0x1, "6768137e4d0992f67166079c44a8605ad08d9473d91ef0b434a7e0111311b191b70f4a193fa4bcb5a792abe408743ef9086944933a5424dc98efaaceb62ee528dd4838e6734fe93ee52dc8926739dd9b6d79c10a64230932190bbd89944dd8f60893368aebcd69775dfea2cc01a428ccc1be618bac198ef23a546109fcb0a6333bcdb130038eeedb66f79a55281e6388d2ba56ca954c505bf6c19c778e2b9b376917369d84d59ed1248aa120a520003dfa2edff02302b99df0818987240c1fa98ddb73fe00d37e38d52e2828e4df7abd8b632aaf23c9185fa94a344a377ec7e8045f123f5bafe4bef0dec08b1b86f7"}, {0x90, 0x116, 0x4, "8e6824852ab328c49127ec508345a9a460c9b59009a3dabe37edfc1036e30e4f2a7d7c7388149b4e91ea73c086496fba3cf593606cfffece944fda6b4caec699b6f7c1be01da5014fe580adb14132fed5f478a6e9cb59f15d3b9a9dd41604260d350904eccdc8e8f922558346464beeb11c59e7794a7b19131"}], 0x190, 0x4000000}, 0xb6}, {{&(0x7f0000000680)=@ipx={0x4, 0x8, 0x3, "42f39b6b02ce", 0x4}, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000000cc0)="94211b7b91f5806be7d29095fe01ced7f64aafefa98dce6571e4dc91c36499863f02431d05f263b0b200c9e4ee03e0714cda0782dd81e2de5e312d90f51e5a9d47cf073963739a9e65702f221c957e0b0487696dc937c7b45ebac23fcb2393b67c4b241f28f1d43c807b98a65b73c4591303d94e03f15bea4493dc648b0d8d73e84826fadfd910c022473d9df74b42c9045b4048a2552bb28633f66bc404808f9a324596da3f1b04a24eabbeaff374db29a41da1dbc3c90051298bc98176fec054c3e833740ff1a5077ee637f6e7d457b4c7daedd4f72d375e1d279832", 0xdd}, {&(0x7f0000000700)="f293f2d7b288463968a07cf9117524b8a7023037cbdfe65722", 0x19}, {&(0x7f0000000740)="92ed7bbd3721edc15199e7f603286251416c107cc2c2eaade2cbd31cd960949af9220a01f102083883f665c46d051a667d91ce10e33da5101fa91b3071", 0x3d}, {&(0x7f0000000dc0)="900791d2aca13b117f8d2816192ce35e93840d36033e6a5c6282d722711fc6f9b768e5da02c523e1fbf4d2fe1e75f060c3a0c265db06ec44c449f11236ae5b89c95d2c614a948d6172101004781f06db645e8cc6", 0x54}, {&(0x7f0000000e40)="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", 0x1000}, {&(0x7f0000001e40)="b940245cf66f08eb3cb4de60760d6a8abe3987d55cf9c58fcbd100b147f06e650d6de75ff92e6f938e042ec58133335df0fec2d1a0d4b46dadcd562139d5b11807fe", 0x42}, {&(0x7f0000001ec0)="58ea34e5cc467316b054cd7932be5c05b4bc432b74113923512f3c24bda7e19fe81fd2ee9d625cc3d48b5af405aaf65fbe9beab2d2c80ac710fe09bf60ee4ddcd4d3b95860b15a811ed5b1ade0878be90f3bd8d5ea7514dbc6857a5ed02f19c58402888b39a71c07b439bd930a40650c7aae0e", 0x73}, {&(0x7f0000000780)="705bc6", 0x3}, {&(0x7f0000001f40)="eb8a7dfb02396bed05496970b0e63a3d1d8a1cbac494c609d3cba78efd57b94926dcee14ebed142661ba7ef474ecc55c959cb28ffd974f73a508b30d043891ac1be2be27c23fc64c9a", 0x49}], 0x9, &(0x7f0000002080), 0x0, 0x800}, 0x40}], 0x3, 0x40000) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) [ 1786.836995] audit: type=1400 audit(1540188268.261:143): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=11999 comm="syz-executor5" 06:04:28 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x400400, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x40000) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000040)=[0xc0, 0x2]) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB='st!ck ::\n'], 0x5) 06:04:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:28 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000007000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:28 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="75786563203a03fe"], 0x8) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f00000000c0)={0x5, 0x0, 0x10000, 0x2}) 06:04:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x290200, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) [ 1787.117493] audit: type=1400 audit(1540188268.541:144): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=12026 comm="syz-executor5" 06:04:28 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000020000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:28 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="65786563203a3a495a44d91c356ffe4b661c8e0a"], 0x8) 06:04:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x40f7, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) [ 1787.174753] audit: type=1400 audit(1540188268.561:145): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=12026 comm="syz-executor5" [ 1787.262887] audit: type=1400 audit(1540188268.661:146): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="::I" pid=12034 comm="syz-executor5" 06:04:28 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x20000, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000080)=0x7) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:28 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000008800626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:28 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x430) 06:04:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000100626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x40, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:29 executing program 5: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$P9_RCREATE(r0, &(0x7f0000000080)={0x18, 0x73, 0x1, {{0x41, 0x1, 0x1}, 0x2}}, 0x18) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$KDSKBLED(r2, 0x4b65, 0x596) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='vxec ::-%P\n'], 0x8) 06:04:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000200626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) [ 1787.782964] audit: type=1400 audit(1540188269.211:147): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=12071 comm="syz-executor5" 06:04:29 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '&:\n'}, 0x8) 06:04:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000060000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:29 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000080)) 06:04:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x7, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:29 executing program 3 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:29 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="e2899debe10068b26500003a3a0a"], 0x8) 06:04:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000700000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000006000000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) [ 1788.101842] FAULT_INJECTION: forcing a failure. [ 1788.101842] name failslab, interval 1, probability 0, space 0, times 0 [ 1788.133211] CPU: 0 PID: 12102 Comm: syz-executor3 Not tainted 4.19.0-rc8+ #296 [ 1788.140637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 06:04:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x40, 0x0, 0xf8, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:29 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) read(r0, &(0x7f0000000080)=""/137, 0x89) [ 1788.150007] Call Trace: [ 1788.152621] dump_stack+0x1c4/0x2b6 [ 1788.156270] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1788.161479] ? mark_held_locks+0x130/0x130 [ 1788.161510] should_fail.cold.4+0xa/0x17 [ 1788.161532] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1788.161548] ? __lock_acquire+0x7ec/0x4ec0 [ 1788.161565] ? find_held_lock+0x36/0x1c0 [ 1788.161581] ? graph_lock+0x170/0x170 [ 1788.161600] ? graph_lock+0x170/0x170 [ 1788.161623] ? mark_held_locks+0x130/0x130 [ 1788.169933] ? find_held_lock+0x36/0x1c0 [ 1788.169966] ? __lock_is_held+0xb5/0x140 [ 1788.169997] ? ___might_sleep+0x1ed/0x300 [ 1788.170016] ? arch_local_save_flags+0x40/0x40 [ 1788.170046] __should_failslab+0x124/0x180 [ 1788.170066] should_failslab+0x9/0x14 [ 1788.170087] __kmalloc_track_caller+0x2d0/0x750 [ 1788.207550] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1788.207583] ? rcu_bh_qs+0xc0/0xc0 [ 1788.207597] ? find_vpid+0xf0/0xf0 [ 1788.207615] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1788.207636] ? proc_pid_attr_write+0x198/0x540 [ 1788.237291] memdup_user+0x2c/0xa0 [ 1788.237309] proc_pid_attr_write+0x198/0x540 [ 1788.237332] __vfs_write+0x119/0x9f0 [ 1788.237351] ? check_preemption_disabled+0x48/0x280 [ 1788.237369] ? proc_loginuid_write+0x4f0/0x4f0 [ 1788.268712] ? kernel_read+0x120/0x120 [ 1788.272630] ? __lock_is_held+0xb5/0x140 [ 1788.276714] ? rcu_read_lock_sched_held+0x108/0x120 [ 1788.281756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1788.287305] ? __sb_start_write+0x1b2/0x370 [ 1788.291652] vfs_write+0x1fc/0x560 [ 1788.295231] ksys_write+0x101/0x260 [ 1788.298872] ? __ia32_sys_read+0xb0/0xb0 [ 1788.302963] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1788.308436] __x64_sys_write+0x73/0xb0 [ 1788.312337] do_syscall_64+0x1b9/0x820 [ 1788.316244] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1788.321632] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1788.326571] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1788.331429] ? trace_hardirqs_on_caller+0x310/0x310 [ 1788.336457] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1788.341482] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1788.346515] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1788.351381] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1788.356580] RIP: 0033:0x457569 [ 1788.359793] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1788.379169] RSP: 002b:00007f4738d5ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1788.386888] RAX: ffffffffffffffda RBX: 00007f4738d5ac90 RCX: 0000000000457569 [ 1788.394160] RDX: 0000000000000008 RSI: 0000000020000040 RDI: 0000000000000005 [ 1788.401443] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1788.408717] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4738d5b6d4 [ 1788.415989] R13: 00000000004c54ee R14: 00000000004d8e08 R15: 0000000000000006 06:04:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:29 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000000)) write$apparmor_exec(r0, &(0x7f0000000180)={"464c7a12a2", "93c483b7d6b13f37769ca1448314dae094c9538ae43991d96cc80bd8cf9d69c9295d79f1a85a822b13578239915ef7c714a74ea8ce0e63864d751666dfd27532fa6a5dd4fe78382bf1aa9206d1addb4160046a074ca4a684020964aeccc84c86a5544b95a0690000a5f80e8575d44364ba64e9b00d2d298c00"}, 0x7e) 06:04:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000400000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:30 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_nanosleep(0x7, 0x1, &(0x7f0000000080)={r1, r2+10000000}, &(0x7f00000000c0)) 06:04:30 executing program 3 (fault-call:3 fault-nth:1): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:30 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000002000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) [ 1788.737431] FAULT_INJECTION: forcing a failure. [ 1788.737431] name failslab, interval 1, probability 0, space 0, times 0 [ 1788.774440] CPU: 0 PID: 12137 Comm: syz-executor3 Not tainted 4.19.0-rc8+ #296 06:04:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:30 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000001100000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) [ 1788.781840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1788.791195] Call Trace: [ 1788.793798] dump_stack+0x1c4/0x2b6 [ 1788.797456] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1788.802678] should_fail.cold.4+0xa/0x17 [ 1788.806756] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1788.811874] ? __lock_acquire+0x7ec/0x4ec0 [ 1788.816128] ? graph_lock+0x170/0x170 [ 1788.819951] ? graph_lock+0x170/0x170 [ 1788.823772] ? proc_pid_attr_write+0x28a/0x540 [ 1788.823839] ? find_held_lock+0x36/0x1c0 [ 1788.832483] ? __lock_is_held+0xb5/0x140 [ 1788.832514] ? ___might_sleep+0x1ed/0x300 [ 1788.832545] ? arch_local_save_flags+0x40/0x40 [ 1788.832565] ? mutex_trylock+0x2b0/0x2b0 [ 1788.832614] __should_failslab+0x124/0x180 [ 1788.832634] should_failslab+0x9/0x14 [ 1788.832651] __kmalloc+0x2d4/0x760 [ 1788.832663] ? graph_lock+0x170/0x170 [ 1788.832679] ? mark_held_locks+0x130/0x130 [ 1788.832700] ? apparmor_setprocattr+0x2ab/0x1150 [ 1788.853825] apparmor_setprocattr+0x2ab/0x1150 [ 1788.853867] ? apparmor_task_kill+0xcb0/0xcb0 [ 1788.853899] ? lock_downgrade+0x900/0x900 [ 1788.853921] ? arch_local_save_flags+0x40/0x40 [ 1788.853964] security_setprocattr+0x66/0xc0 [ 1788.861287] proc_pid_attr_write+0x301/0x540 [ 1788.861310] __vfs_write+0x119/0x9f0 [ 1788.861328] ? check_preemption_disabled+0x48/0x280 [ 1788.861342] ? proc_loginuid_write+0x4f0/0x4f0 [ 1788.861365] ? kernel_read+0x120/0x120 [ 1788.917839] ? __lock_is_held+0xb5/0x140 [ 1788.921931] ? rcu_read_lock_sched_held+0x108/0x120 [ 1788.926960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1788.932506] ? __sb_start_write+0x1b2/0x370 06:04:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) [ 1788.936859] vfs_write+0x1fc/0x560 [ 1788.940426] ksys_write+0x101/0x260 [ 1788.944087] ? __ia32_sys_read+0xb0/0xb0 [ 1788.948168] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1788.948194] __x64_sys_write+0x73/0xb0 [ 1788.948215] do_syscall_64+0x1b9/0x820 [ 1788.948238] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1788.961458] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1788.961475] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1788.961494] ? trace_hardirqs_on_caller+0x310/0x310 [ 1788.961513] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1788.961530] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1788.961566] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1788.961591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1789.001767] RIP: 0033:0x457569 [ 1789.004962] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1789.023881] RSP: 002b:00007f4738d5ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1789.031599] RAX: ffffffffffffffda RBX: 00007f4738d5ac90 RCX: 0000000000457569 06:04:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x9, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) [ 1789.038877] RDX: 0000000000000008 RSI: 0000000020000040 RDI: 0000000000000005 [ 1789.046151] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1789.053423] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4738d5b6d4 [ 1789.060697] R13: 00000000004c54ee R14: 00000000004d8e08 R15: 0000000000000006 06:04:30 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000700626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:30 executing program 3 (fault-call:3 fault-nth:2): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '&:\n'}, 0x8) [ 1789.366595] __bpf_mt_check_bytecode: 16 callbacks suppressed [ 1789.366602] xt_bpf: check failed: parse error 06:04:30 executing program 5: r0 = socket$inet(0x2, 0x3, 0x800000800000001) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4000000006}, 0xc) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000100)=0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000200)=ANY=[@ANYRES16=r0, @ANYRES32=r1, @ANYBLOB="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"], 0x3) 06:04:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:30 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000001100626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) [ 1789.583733] xt_bpf: check failed: parse error 06:04:31 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000011000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:31 executing program 5: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x7, &(0x7f0000ffd000/0x3000)=nil, 0x4) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x101, 0x200) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="65786563203a3a0a36b04c54f9a58b4a41890a12ffff23ceea4cbc27b1240125458779206b9386ff481ae00c5741d1115bef60560ad89422ec195aed21f89c071b7099a86b64e1c33556d0895d1ed678a320a64011fc8c68ad7661d981e8213c328cd95b9573f7e8158574"], 0x8) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000140)="1d49d269ae3b91b4a6869468aee1f49c420a665ccf") 06:04:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', ':&\n'}, 0x8) [ 1789.773121] xt_bpf: check failed: parse error 06:04:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', ':=\n'}, 0x8) 06:04:31 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x101200) setsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000000180)="4b4bb2c2bcb1966a8eb31718ce3b2bc71f8f9eb5002f638c93a3296b5d68ef9c17825b12e7921ebddf4bbd37cbcd8c9d6f7fe0eceaa01d439f1dfa8c57356afc7333db83f300bc44e01be6d06968e866ac152e9fe745cbe6c0b70ed5b0e7b4015ba9", 0x62) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={"65786563208e2b17060000000000000073de30c7172fd95e55f600a23b1211", '::\n'}, 0x22) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040)={0x225}, 0x4) 06:04:31 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000003000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:31 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) read(r0, &(0x7f0000000280)=""/4096, 0x1000) 06:04:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x20000048) [ 1790.050600] kauditd_printk_skb: 2 callbacks suppressed [ 1790.050613] audit: type=1400 audit(1540188271.411:150): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=8E2B1706 pid=12224 comm="syz-executor5" [ 1790.078735] audit: type=1400 audit(1540188271.421:151): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":=" pid=12217 comm="syz-executor3" 06:04:31 executing program 3: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7fffffff, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0x9, 0x1, 0x0, r2}) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="f3d36563203a3afa"], 0x8) 06:04:31 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) [ 1790.153612] xt_bpf: check failed: parse error 06:04:31 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000050000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:31 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) [ 1790.231339] audit: type=1400 audit(1540188271.661:152): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=12242 comm="syz-executor3" 06:04:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x140, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000080)={0x5, 0x8004, 0x3cd, 0x1, 0x0}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000140)={r4, 0x78c, 0x4}, 0x8) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) [ 1790.308828] xt_bpf: check failed: parse error 06:04:31 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r1) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) socket$pppoe(0x18, 0x1, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 06:04:31 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000003000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) [ 1790.442432] xt_bpf: check failed: parse error 06:04:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x294180) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000080)=0xda, &(0x7f0000000100)=0x4) 06:04:31 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '::\n'}, 0x8) 06:04:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:31 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000088000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8000, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:32 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x7fffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0x101, 0x2e0a03) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f00000003c0)=ANY=[@ANYBLOB="020000001d66000003000000000000001f00000000000000ffff0000000000000080000000000000a772e69f5659a3e2ccc7de4f69e6037b8e66adfe226721cef0a402f2244b5cebc0b10102e1340b331d76776477aa8d2b431c7c257eeb8284e2a0f7a29c5c212f935522b22b806b5769669988068902cd379e2c428bc0106ee404b68a0cc869335ea1bafd3f9d10403a43f787c80c0684ad23588204101d8d70304abb9f399d6004acbd417a1f5e29f39d8aac68809e2a777687f94f2836a1b9"]) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x2}) fremovexattr(r1, &(0x7f0000000540)=@random={'security.', '::\n'}) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000200)={0x0, 0x0, @ioapic}) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/48, 0x30) ioctl(r2, 0x8, &(0x7f0000000100)="7238a6c8ce68a1453f13d056d68ff932239ed40c1486b22c42bfcabef23e41381bb84233ecde5cbe29d441050ec6006be5a8cf441f7f3e02494721763d96fc21cdb13ab66a295e9de91af5e17ed219006d4bdaa97e79ccbd03a906303a636b49318e38b7834fd2196578fde9bca055732cddf5f1193ba54ca723ce75495c548dd016e22a9f1762889d09c5284593fa4b5b7a7aa4d1965624827379fd51ac323d47a4874c8c725e8923a4ddb091a53c005d6f41dc58a7624c077a660ff3c080fc07c2897cd2a344edc9d62d74a56d4bd6") write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) [ 1790.718597] xt_bpf: check failed: parse error 06:04:32 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000006000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2280, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 06:04:32 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x800) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000000c0)=r2) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="65a565000000000a"], 0x8) 06:04:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:32 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) [ 1790.939234] xt_bpf: check failed: parse error 06:04:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x0) 06:04:32 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000011000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:32 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2502"], 0x1e0) fcntl$getflags(r0, 0x40b) 06:04:32 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000080)={0x4, 0x1e4, 0xfffffffeffffffff, 0x7}, 0xe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)=ANY=[@ANYBLOB='exec 0.\n'], 0x8) 06:04:32 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = gettid() ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000000)={@my=0x1}) r2 = socket$inet6(0xa, 0x2, 0x1) r3 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x9, 0x200000) symlinkat(&(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000140)='./file0\x00') setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000080)='vegas\x00', 0x6) getpgid(r1) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="65bd5063203a3a0a"], 0x8) 06:04:32 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000004626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) [ 1791.222417] xt_bpf: check failed: parse error [ 1791.241501] audit: type=1400 audit(1540188272.671:153): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="0." pid=12336 comm="syz-executor3" 06:04:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) sched_getattr(r2, &(0x7f0000000080), 0x30, 0x0) write$apparmor_exec(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="650ab94f11ecc2c79d2ca56525fed24c52e9307e2f2ee1c29bad2662000000000000000002057eec3f82eed92b6c46a56e7dc6d7e0bda0d55dabfc00d925ff335069"], 0x8) [ 1791.347461] xt_bpf: check failed: parse error 06:04:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:32 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @loopback}, 0xc) getsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000000100)=0x91) getpeername$inet(r1, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f0000000180)=0xffffffffffffffca) tee(r1, r1, 0x5, 0x2) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) pwrite64(r0, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80000, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000280)=0x4) [ 1791.391377] audit: type=1400 audit(1540188272.821:154): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=12346 comm="syz-executor5" 06:04:32 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000011626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101080, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000070000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:33 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00#\x00\x00\x00\x00\x00\x00'], 0x8) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x100) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x40}, &(0x7f00000000c0)=0x8) signalfd(r0, &(0x7f0000000140), 0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r2, 0x7}, 0x8) 06:04:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400040, 0x0) r3 = semget(0x2, 0x0, 0x8) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000280)=""/246) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000100)={{0x9, 0xb2}, {0x2, 0x400}, 0x6, 0x5, 0x4}) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000200000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:33 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9, 0x408002) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0x21, "934da5969be92eb8f09f8a992187c310c522f4b4b74fe4cef6ebe7d5a840dd1773"}, &(0x7f0000000100)=0x29) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000140)={r1, 0x4e, "af5f22e9e670517eff9591522c76f9c51c3c0e99f16211bac2dbe110bf0011ae466fcb1f54b958aa3414462bd45c418d3623be3cccc93750c6b9b7965522ccf6ee4dd35a56f3a8b803e792a45fc4"}, &(0x7f00000001c0)=0x56) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000040)=ANY=[@ANYBLOB='exec\x00z:\n'], 0x8) 06:04:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000002000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:33 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="6578656a1f3a3a87"], 0xffffffffffffff8d) write$binfmt_elf64(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x70a, 0x8, 0x0, 0x6a, 0xfffffffffffffffa, 0x3, 0x3e, 0x101, 0xd9, 0x40, 0x18a, 0x9, 0x6, 0x38, 0x2, 0x1, 0x81a, 0x4494}, [{0x7474e551, 0x400, 0x4, 0x7, 0x2, 0x7fffffff}, {0x7, 0x847, 0x2, 0x1, 0xfffffffffffffffb, 0x2, 0xec}], "f201eab683204a268b03a580621f1ab63a970bb01ed79c27cf6c6069e24f1b5b6a3560c85d8e517f95e2c37fa4206484c828b516f0e1b9688517d920143acbb1", [[], [], [], [], [], [], []]}, 0x7f0) dup3(r0, r0, 0x80000) 06:04:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000001626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="0c85ef0aa137ac05"], 0x8) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x6000, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000080)={0x7, [0x9, 0x5, 0x3ff, 0x80, 0xfff, 0x6, 0x8]}, 0x12) 06:04:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000003626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:33 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x7ffc, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000007000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open$cgroup(0xfffffffffffffffd, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x9) r0 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x7, 0x101000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xfffffffffffff801) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) r2 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x4, 0x200) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000380)={@nfc_llcp={0x27, 0x0, 0x2, 0x6, 0x401, 0x1375, "e1cb96c3692cd94f7b8a8c498a97ca690fbccaecd037c1c143d9e12b5bbdd9a8ca293e8ab9c49dea464a19d6da9cb94bc1987b655dc2abdc90d93453550727", 0xe}, {&(0x7f0000000280)=""/215, 0xd7}, &(0x7f0000000200), 0x8}, 0xa0) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="030105000000ee0600b2298f8b51ddca5f7bf16636d7f0af0b959cecfb713e19b2437a176b9cf189130f45ef8f3572789fa1e5e8307ff01ef20c7f23b47a92e2b4804753481cf659cd25957da777b0351ef4ffe5c60ab1de04acc597c837b8952833f9ef7e40dc283267cc7a1cb95b98cd03c90d1f4392b410fdbebba362bc0d5f26141bf9acb38ff8d05a2f18a8ec5350174ad408085b03ec7067bc970dd8bacc6f0083c3a8ca4196b38509d1b46ef1225f5efaf3ce12796e3bad37"], 0xbc, 0x2) 06:04:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xb, 0xffffffffffffffff, 0x8) 06:04:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:34 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x0) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000080)) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000088626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:34 executing program 3: socketpair$unix(0x1, 0x10, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x4, 0x2080) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'cpu'}, {0x2d, 'pids'}, {0x2d, 'pids'}, {0x2d, 'cpu'}, {0x0, 'cpu'}]}, 0x1b) rt_sigreturn() r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000000)=ANY=[], 0x0) 06:04:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000060000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 06:04:34 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '::\n'}, 0x8) 06:04:34 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="647865f30d3a3a0a"], 0x8) 06:04:34 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x480000, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000080)=0x4) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000004000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:34 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000140)={r3, 0x6, 0x9}, &(0x7f0000000180)=0x10) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:34 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0xdebb, 0x400) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000100)=""/135) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000080)=0x9) write$apparmor_exec(r0, &(0x7f00000001c0)={'stack ', 'selinuxwlan1cpusetvmnet1\x00'}, 0x1f) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000280)) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)=ANY=[@ANYRES64=r2], 0x1) 06:04:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0xc009}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:04:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000060000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:34 executing program 3: fstat(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) fsetxattr(r1, &(0x7f0000000340)=@known='user.syz\x00', &(0x7f0000000380)='GPL\'+nodev-trusted\x00', 0x13, 0x541ea9b38b2a90fb) ioctl$TIOCSTI(r1, 0x5412, 0x3) getresuid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)=0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r0, r2, r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="6578654b7e729a77"], 0x8) 06:04:34 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x18) socketpair(0x9, 0x0, 0xd7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0xffffffffffffffff, 0x0, 0x2, 0x1, 0xf}}) 06:04:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:34 executing program 3: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000080), &(0x7f0000000100)=0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000140)=[@in={0x2, 0x4e22, @rand_addr=0xffffffff}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1e}}, @in6={0xa, 0x4e23, 0x30000000000000, @ipv4={[], [], @local}, 0x4}, @in6={0xa, 0x4e20, 0x503, @mcast1, 0x1000000}], 0x58) socket$inet6(0xa, 0x80000, 0xc1ed) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000007626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:34 executing program 5: lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x3) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)=0x2) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:34 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) accept4(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000000)=0x80, 0x80000) accept4$alg(r1, 0x0, 0x0, 0x80800) 06:04:35 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000880000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f0000000000)={0x7, 0x1f}) r3 = getpgid(0xffffffffffffffff) r4 = syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x7fffffff, 0x8000) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x1, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r4, 0x6430) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xff9f) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={r3, r6, r7}, 0xc) 06:04:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:35 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000080)={'mangle\x00', 0x3, [{}, {}, {}]}, 0x58) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:35 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000005000000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:35 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000006626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0xc) write$UHID_INPUT(r1, &(0x7f0000000280)={0x8, "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", 0x61c}, 0xfffffe30) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:35 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x840, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', '/\x00'}, 0x8) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x200000, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0xbb) 06:04:35 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x8001) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000080)) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x10000, 0x0) 06:04:35 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000600000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:35 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:35 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000002626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:35 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00 ::\n'], 0x8) r1 = shmget(0x2, 0x3000, 0x54000a13, &(0x7f0000ffc000/0x3000)=nil) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) getresgid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) r6 = getpgrp(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1c, &(0x7f0000000380)='/proc/thread-self/attr/exec\x00'}, 0x30) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000400)={{0x9, r2, r3, r4, r5, 0x20, 0x3}, 0xffffffffffffffff, 0x1, 0x4, 0x9, r6, r7, 0x1}) 06:04:35 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @loopback}, 0xc) getsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000000100)=0x91) getpeername$inet(r1, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f0000000180)=0xffffffffffffffca) tee(r1, r1, 0x5, 0x2) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) pwrite64(r0, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80000, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000280)=0x4) 06:04:35 executing program 4: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7fffffff, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0x9, 0x1, 0x0, r2}) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="f3d36563203a3afa"], 0x8) [ 1794.125204] audit: type=1400 audit(1540188275.551:155): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=12587 comm="syz-executor4" 06:04:35 executing program 4 (fault-call:1 fault-nth:0): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:35 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @loopback}, 0xc) getsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000000100)=0x91) getpeername$inet(r1, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f0000000180)=0xffffffffffffffca) tee(r1, r1, 0x5, 0x2) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) pwrite64(r0, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80000, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000280)=0x4) [ 1794.288192] FAULT_INJECTION: forcing a failure. [ 1794.288192] name failslab, interval 1, probability 0, space 0, times 0 [ 1794.324663] CPU: 1 PID: 12603 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #296 [ 1794.332072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1794.341433] Call Trace: [ 1794.344048] dump_stack+0x1c4/0x2b6 [ 1794.347712] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1794.352927] ? mark_held_locks+0x130/0x130 [ 1794.357196] should_fail.cold.4+0xa/0x17 [ 1794.361298] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1794.366543] ? __lock_acquire+0x7ec/0x4ec0 [ 1794.370789] ? find_held_lock+0x36/0x1c0 [ 1794.370806] ? graph_lock+0x170/0x170 [ 1794.370824] ? graph_lock+0x170/0x170 [ 1794.370844] ? mark_held_locks+0x130/0x130 [ 1794.370870] ? find_held_lock+0x36/0x1c0 [ 1794.378737] ? __lock_is_held+0xb5/0x140 [ 1794.378766] ? ___might_sleep+0x1ed/0x300 [ 1794.378785] ? arch_local_save_flags+0x40/0x40 [ 1794.403653] __should_failslab+0x124/0x180 [ 1794.407907] should_failslab+0x9/0x14 [ 1794.411723] __kmalloc_track_caller+0x2d0/0x750 [ 1794.416398] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1794.421671] ? rcu_bh_qs+0xc0/0xc0 [ 1794.425202] ? find_vpid+0xf0/0xf0 [ 1794.428747] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1794.434290] ? proc_pid_attr_write+0x198/0x540 [ 1794.438867] memdup_user+0x2c/0xa0 [ 1794.442397] proc_pid_attr_write+0x198/0x540 [ 1794.446817] __vfs_write+0x119/0x9f0 [ 1794.450545] ? check_preemption_disabled+0x48/0x280 [ 1794.455562] ? proc_loginuid_write+0x4f0/0x4f0 [ 1794.460149] ? kernel_read+0x120/0x120 [ 1794.464027] ? __lock_is_held+0xb5/0x140 [ 1794.468104] ? rcu_read_lock_sched_held+0x108/0x120 [ 1794.473111] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1794.478644] ? __sb_start_write+0x1b2/0x370 [ 1794.482961] vfs_write+0x1fc/0x560 [ 1794.486494] ksys_write+0x101/0x260 [ 1794.490115] ? __ia32_sys_read+0xb0/0xb0 [ 1794.494185] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1794.499625] __x64_sys_write+0x73/0xb0 [ 1794.503505] do_syscall_64+0x1b9/0x820 [ 1794.507378] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1794.512751] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1794.517676] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1794.522514] ? trace_hardirqs_on_caller+0x310/0x310 [ 1794.527518] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1794.532543] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1794.537550] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1794.542382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1794.547563] RIP: 0033:0x457569 [ 1794.550745] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1794.569638] RSP: 002b:00007f9a713bfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1794.577355] RAX: ffffffffffffffda RBX: 00007f9a713bfc90 RCX: 0000000000457569 06:04:36 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="65786563203a3a0a52db47baf8048729162afde45aecde052b7d1660d11100000000b1d788dac9d7c2740017590807c3f55a4239eb87ef7b4ee5e36eeffcce95751448395f444e1a6393caff3ca9315e380f82e36060932284f9108f7ee10ae5696d77c9f0027ff2da4a2a537e85fd4506f8c71b6642e8fb2c9e819a6db4609bf703f4726fe25d6600fc3f3d5f68d89edcdfe7bb82138b0e0a9dff969040a3d9bdc759d6baf8052b8d197bf5a7e492d8988c7b77f81516892f060ef9378c1f05"], 0x8) 06:04:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000060626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:36 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x400400, 0x0) write$tun(r0, &(0x7f0000000340)={@val={0x0, 0x892f}, @val={0x3, 0x0, 0x3, 0xd2, 0x5, 0xffffffff}, @llc={@snap={0x1, 0xab, "ad73", "1c7e4c", 0xe88f, "bf298f3d16d62803ade892c20c268b8e9f6d6246e092ac8cf82e4db43174777aba0fd48e2b8842db7dbdd5adebb2b8e2fe15d9ce183d341190dc158f195d5b496d511f6fb80b04692b5e8c2d6190a9a6389277b66b66b02eaae791b0100bdf1b77ac0b32a8c7f4f27834a76b4e1be47775fbd771100e7d3aceaed76bd63dfbd86e26e620bf7ece1db32f72aefe593cd9c6b52efdc09eb141afafd16c1eab743a403962bce61c44b4b2121c792ae429cebea90f81213848fb76cdf176ba7a8acdcebfb52cabbcca914aa11104368fd60338d729cb0fba85dcc1d55fb9616fe376882b3f6f041a4215"}}}, 0xff) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000000)={0x3, 0x0, 0x35, 0x7}) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f0000000100)=0x7fffffff) write$apparmor_exec(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="6578c5f346037c820669fc30d13a0ac09489d1f84b06636a345ccfe2283108391da0d61a16f43d5f58209786c0b6b36f2a1a509f8dad1ea87e21a8f4cb5d988fca719e83f7f085c62546fb07e9886e668a3ef338a698c0ef83"], 0x8) 06:04:36 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @loopback}, 0xc) getsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000000100)=0x91) getpeername$inet(r1, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f0000000180)=0xffffffffffffffca) tee(r1, r1, 0x5, 0x2) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) pwrite64(r0, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80000, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000280)=0x4) 06:04:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) [ 1794.584620] RDX: 0000000000000008 RSI: 0000000020000040 RDI: 0000000000000003 [ 1794.591906] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1794.599202] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9a713c06d4 [ 1794.606457] R13: 00000000004c54ee R14: 00000000004d8e08 R15: 0000000000000004 06:04:36 executing program 4 (fault-call:1 fault-nth:1): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:36 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_mr_cache\x00') ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000080)=0x6) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = fcntl$getown(r1, 0x9) sched_getaffinity(r2, 0x8, &(0x7f0000000100)) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x22200, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="65786501000000b9"], 0x8) 06:04:36 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @loopback}, 0xc) getsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000000100)=0x91) getpeername$inet(r1, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f0000000180)=0xffffffffffffffca) tee(r1, r1, 0x5, 0x2) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) pwrite64(r0, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80000, 0x0) [ 1794.783985] __bpf_mt_check_bytecode: 20 callbacks suppressed [ 1794.783991] xt_bpf: check failed: parse error [ 1794.794980] FAULT_INJECTION: forcing a failure. [ 1794.794980] name failslab, interval 1, probability 0, space 0, times 0 [ 1794.861999] CPU: 1 PID: 12624 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #296 [ 1794.869424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1794.878790] Call Trace: [ 1794.881396] dump_stack+0x1c4/0x2b6 [ 1794.885076] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1794.890305] should_fail.cold.4+0xa/0x17 [ 1794.894401] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1794.899519] ? __lock_acquire+0x7ec/0x4ec0 [ 1794.903789] ? graph_lock+0x170/0x170 [ 1794.907613] ? graph_lock+0x170/0x170 [ 1794.907629] ? proc_pid_attr_write+0x28a/0x540 [ 1794.907657] ? find_held_lock+0x36/0x1c0 [ 1794.907677] ? __lock_is_held+0xb5/0x140 [ 1794.907705] ? ___might_sleep+0x1ed/0x300 [ 1794.916100] ? arch_local_save_flags+0x40/0x40 [ 1794.916124] ? mutex_trylock+0x2b0/0x2b0 [ 1794.916149] __should_failslab+0x124/0x180 [ 1794.916169] should_failslab+0x9/0x14 [ 1794.916189] __kmalloc+0x2d4/0x760 [ 1794.948645] ? graph_lock+0x170/0x170 [ 1794.952482] ? mark_held_locks+0x130/0x130 [ 1794.956731] ? apparmor_setprocattr+0x2ab/0x1150 [ 1794.961505] apparmor_setprocattr+0x2ab/0x1150 [ 1794.966133] ? apparmor_task_kill+0xcb0/0xcb0 [ 1794.970671] ? lock_downgrade+0x900/0x900 [ 1794.974840] ? arch_local_save_flags+0x40/0x40 [ 1794.979466] security_setprocattr+0x66/0xc0 [ 1794.983810] proc_pid_attr_write+0x301/0x540 [ 1794.988238] __vfs_write+0x119/0x9f0 [ 1794.991966] ? check_preemption_disabled+0x48/0x280 [ 1794.991983] ? proc_loginuid_write+0x4f0/0x4f0 [ 1794.992002] ? kernel_read+0x120/0x120 [ 1794.992024] ? __lock_is_held+0xb5/0x140 [ 1794.992051] ? rcu_read_lock_sched_held+0x108/0x120 [ 1795.001638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1795.001653] ? __sb_start_write+0x1b2/0x370 [ 1795.001675] vfs_write+0x1fc/0x560 [ 1795.001699] ksys_write+0x101/0x260 [ 1795.031688] ? __ia32_sys_read+0xb0/0xb0 [ 1795.035766] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1795.041247] __x64_sys_write+0x73/0xb0 [ 1795.045161] do_syscall_64+0x1b9/0x820 [ 1795.049069] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1795.054457] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1795.059407] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1795.064274] ? trace_hardirqs_on_caller+0x310/0x310 [ 1795.069319] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1795.074345] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1795.079375] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1795.084235] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1795.089429] RIP: 0033:0x457569 [ 1795.092645] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:04:36 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @loopback}, 0xc) getsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000000100)=0x91) getpeername$inet(r1, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f0000000180)=0xffffffffffffffca) tee(r1, r1, 0x5, 0x2) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) pwrite64(r0, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) 06:04:36 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @loopback}, 0xc) getsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000000100)=0x91) getpeername$inet(r1, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f0000000180)=0xffffffffffffffca) tee(r1, r1, 0x5, 0x2) pwrite64(r0, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) 06:04:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:36 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @loopback}, 0xc) getsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000000100)=0x91) getpeername$inet(r1, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f0000000180)=0xffffffffffffffca) pwrite64(r0, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) 06:04:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e00000000007fffffff626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:36 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x6, 0x0, [{0x8b}]}) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000080)=""/40) write$apparmor_exec(r3, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) [ 1795.111571] RSP: 002b:00007f9a713bfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1795.119297] RAX: ffffffffffffffda RBX: 00007f9a713bfc90 RCX: 0000000000457569 [ 1795.126587] RDX: 0000000000000008 RSI: 0000000020000040 RDI: 0000000000000003 [ 1795.133876] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1795.133887] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9a713c06d4 [ 1795.133897] R13: 00000000004c54ee R14: 00000000004d8e08 R15: 0000000000000004 06:04:36 executing program 4 (fault-call:1 fault-nth:2): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) [ 1795.307401] xt_bpf: check failed: parse error 06:04:36 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @loopback}, 0xc) getsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000000100)=0x91) getpeername$inet(r1, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f0000000180)=0xffffffffffffffca) pwrite64(r0, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) 06:04:36 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x10) sendto$inet(r2, &(0x7f0000000100)="19d99ed2815cb0f98bab7c0e2a2edd48aa5bc1207534154f094473ea06b28daf1196aceb5e0f752a14cdbfcf7fc2f3ff3c697bcf7d9f97d9803c9bd90384ff262c6ab90b06ccee116ec9aa427613ee1a737f155f76f43470e04e742f98517761936b9e87f3218652fdb8b32fed57b3432a5289df960672f4e0ee62d1767b83388012629a634cd65890dbd267fa566db186b7e42493115d5aaafaa68c7d72b087e132e52afce148a01f6164fc1efa6e32d4cd673bcd811faa1ead419df1ab17d8", 0xc0, 0x20000080, &(0x7f00000001c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) [ 1795.340820] FAULT_INJECTION: forcing a failure. [ 1795.340820] name failslab, interval 1, probability 0, space 0, times 0 06:04:36 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0x1ff, 0x1}, {0x1, 0x5}]}, 0x14, 0x3) [ 1795.433333] CPU: 0 PID: 12663 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #296 [ 1795.440741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1795.450120] Call Trace: [ 1795.452726] dump_stack+0x1c4/0x2b6 [ 1795.456372] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1795.461603] should_fail.cold.4+0xa/0x17 [ 1795.465687] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1795.470820] ? graph_lock+0x170/0x170 [ 1795.474782] ? audit_filter+0x67d/0xda0 [ 1795.478784] ? lock_downgrade+0x900/0x900 06:04:36 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x88) write$tun(r1, &(0x7f0000000280)={@val, @void, @ipv6={0x8, 0x6, "ace8b3", 0x1380, 0x87, 0x2, @dev={0xfe, 0x80, [], 0x10}, @dev={0xfe, 0x80, [], 0x1f}, {[@hopopts={0x6c, 0x21, [], [@jumbo={0xc2, 0x4, 0x8000}, @calipso={0x7, 0x48, {0xbe8, 0x10, 0x3, 0xff, [0x9, 0x1, 0xfffffffffffffff7, 0x8, 0x4, 0x8001, 0x8000, 0x1192]}}, @padn={0x1, 0x1, [0x0]}, @hao={0xc9, 0x10, @remote}, @generic={0x952, 0xa2, "309cafda91c20ef7a7afb6b103962754e9bcfe5f2ab56848fefe6cf46c46f7a63d48fb999e1fc38ca43e1e465a41d2dfca2ff8f6455d4d0458cb23141367f4727135a0457cc3e3756ea9a68cb231375ec5d9c7efcad95b9cbea32fb6d9c16bd8877e98515974c7ba4232c14f3135245eab9e470b39dbfae199fb09f08688c6ccacb7b0d0b7cd46c7ddb7543754ec6ce0ba782aa11598f6ef2faea663c69b8bf926b4"}]}, @dstopts={0x0, 0x1e, [], [@generic={0x81, 0x8c, "489ecb4b0d1be4ec8c686abaa64b9a581e23f3b4dbb3d6378d96b7b0e9a3ef973ac14c2729f05d584c47620ee5dda51ac175a46604a02a0bcaa83b0704a9e7a884679234171adb825334cb6c1feef0b426d0119999056d243d346ff80ec942df59081c542e1a7b22f2d6a0a722ce6da7aa386a3e1b6704c1359726c8105a410a018758b08387e23e0b763ca5"}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x50, {0x2, 0x12, 0xffff, 0x3f, [0x9, 0x80, 0x7332855c, 0x3, 0x101, 0x200, 0x3, 0xffffffff, 0x615]}}]}, @hopopts={0x2b, 0x2, [], [@enc_lim={0x4, 0x1, 0x9}, @pad1, @padn={0x1, 0x1, [0x0]}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @pad1, @jumbo={0xc2, 0x4, 0x55f3}]}, @srh={0x73, 0xa, 0x4, 0x5, 0x3ff, 0x10, 0x2, [@mcast2, @local, @remote, @local, @ipv4={[], [], @broadcast}]}, @routing={0x0, 0x8, 0x0, 0xfffffffffffffdbd, 0x0, [@loopback, @dev={0xfe, 0x80, [], 0x14}, @remote, @loopback]}, @fragment={0x33, 0x0, 0x3f, 0x200, 0x0, 0x3, 0x64}, @dstopts, @routing={0x4, 0x10, 0x3, 0xfffffffffffffffb, 0x0, [@remote, @mcast1, @remote, @loopback, @local, @ipv4, @ipv4={[], [], @remote}, @local]}], @udp={0x4e23, 0x4e22, 0x1010, 0x0, [@guehdr={0x2, 0x0, 0x4, 0x200, 0x0, [0x80]}], "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"}}}}, 0x13ac) [ 1795.482949] ? check_preemption_disabled+0x48/0x280 [ 1795.487987] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1795.493803] ? kasan_check_read+0x11/0x20 [ 1795.497972] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1795.503265] ? find_held_lock+0x36/0x1c0 [ 1795.507349] ? auditd_test_task+0x206/0x370 [ 1795.511686] ? lock_downgrade+0x900/0x900 [ 1795.515852] ? check_preemption_disabled+0x48/0x280 [ 1795.520889] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1795.526708] ? kasan_check_read+0x11/0x20 06:04:36 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @loopback}, 0xc) getsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000000100)=0x91) pwrite64(r0, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) 06:04:37 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @loopback}, 0xc) pwrite64(r0, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) [ 1795.530873] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1795.536177] ? rcu_bh_qs+0xc0/0xc0 [ 1795.539738] __should_failslab+0x124/0x180 [ 1795.543993] should_failslab+0x9/0x14 [ 1795.547822] kmem_cache_alloc+0x47/0x730 [ 1795.551930] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1795.557753] ? kasan_check_read+0x11/0x20 [ 1795.561932] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1795.567226] ? audit_file_mask+0x180/0x180 [ 1795.571477] audit_log_start+0x554/0x9d0 [ 1795.575568] ? audit_serial+0x30/0x30 [ 1795.579388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1795.584935] ? refcount_sub_and_test_checked+0x203/0x310 [ 1795.590432] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 1795.595911] ? aa_find_child+0xd0/0xd0 [ 1795.599826] ? print_usage_bug+0xc0/0xc0 [ 1795.603916] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1795.609469] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1795.615088] ? __aafs_ns_mkdir+0xca0/0xca0 [ 1795.619356] ? audit_file_mask+0x180/0x180 [ 1795.623602] common_lsm_audit+0x112/0x2200 [ 1795.627859] ? aa_lookup_profile+0x30/0x30 06:04:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:37 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwrite64(r0, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) [ 1795.632144] ? __lock_acquire+0x7ec/0x4ec0 [ 1795.636395] ? ipv6_skb_to_auditdata+0xee0/0xee0 [ 1795.641184] ? graph_lock+0x170/0x170 [ 1795.644998] ? __lock_acquire+0x7ec/0x4ec0 [ 1795.649248] ? mark_held_locks+0x130/0x130 [ 1795.653557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1795.659130] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1795.664688] ? fqlookupn_profile+0x88/0xc0 [ 1795.668937] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1795.673973] ? aa_label_strn_parse+0x1d6/0x1230 [ 1795.674021] aa_audit+0x21d/0x740 [ 1795.674037] ? audit_file_mask+0x180/0x180 [ 1795.674070] aa_audit_file+0x53d/0xa20 [ 1795.674120] ? update_file_ctx+0x340/0x340 [ 1795.674135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1795.674156] ? refcount_add_not_zero_checked+0x330/0x330 [ 1795.674227] aa_change_profile+0x1736/0x3260 [ 1795.682346] ? save_stack+0x43/0xd0 [ 1795.682358] ? kasan_kmalloc+0xc7/0xe0 [ 1795.682372] ? apparmor_setprocattr+0x2ab/0x1150 [ 1795.682398] ? aa_change_hat+0x1890/0x1890 [ 1795.682414] ? find_held_lock+0x36/0x1c0 [ 1795.682441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1795.682458] ? check_preemption_disabled+0x48/0x280 [ 1795.682473] ? check_preemption_disabled+0x48/0x280 [ 1795.682497] ? __lock_is_held+0xb5/0x140 [ 1795.682523] ? rcu_read_lock_sched_held+0x108/0x120 [ 1795.755398] ? __kmalloc+0x5de/0x760 [ 1795.759116] ? graph_lock+0x170/0x170 [ 1795.762930] ? mark_held_locks+0x130/0x130 [ 1795.767197] apparmor_setprocattr+0xa8b/0x1150 [ 1795.771833] ? apparmor_task_kill+0xcb0/0xcb0 [ 1795.776338] ? lock_downgrade+0x900/0x900 [ 1795.780499] ? arch_local_save_flags+0x40/0x40 [ 1795.785121] security_setprocattr+0x66/0xc0 [ 1795.789459] proc_pid_attr_write+0x301/0x540 [ 1795.793884] __vfs_write+0x119/0x9f0 [ 1795.797605] ? check_preemption_disabled+0x48/0x280 [ 1795.802655] ? proc_loginuid_write+0x4f0/0x4f0 [ 1795.807249] ? kernel_read+0x120/0x120 [ 1795.811152] ? __lock_is_held+0xb5/0x140 [ 1795.815235] ? rcu_read_lock_sched_held+0x108/0x120 [ 1795.820264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1795.825831] ? __sb_start_write+0x1b2/0x370 [ 1795.830186] vfs_write+0x1fc/0x560 [ 1795.833755] ksys_write+0x101/0x260 [ 1795.837436] ? __ia32_sys_read+0xb0/0xb0 [ 1795.841514] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1795.841539] __x64_sys_write+0x73/0xb0 [ 1795.841570] do_syscall_64+0x1b9/0x820 [ 1795.841586] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1795.841605] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1795.841621] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1795.841638] ? trace_hardirqs_on_caller+0x310/0x310 [ 1795.841670] ? prepare_exit_to_usermode+0x3b0/0x3b0 06:04:37 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000005626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:37 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/mcfilter6\x00') ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000080)={0xfe82, 0x6}) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:37 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) pwrite64(r0, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) [ 1795.851025] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1795.851049] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1795.851075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1795.851088] RIP: 0033:0x457569 [ 1795.851105] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1795.851115] RSP: 002b:00007f9a713bfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1795.851132] RAX: ffffffffffffffda RBX: 00007f9a713bfc90 RCX: 0000000000457569 [ 1795.851142] RDX: 0000000000000008 RSI: 0000000020000040 RDI: 0000000000000003 [ 1795.851151] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1795.851161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9a713c06d4 [ 1795.851171] R13: 00000000004c54ee R14: 00000000004d8e08 R15: 0000000000000004 [ 1795.896321] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 1796.013273] xt_bpf: check failed: parse error [ 1796.089086] audit: out of memory in audit_log_start 06:04:37 executing program 4 (fault-call:1 fault-nth:3): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:37 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:netutils_exec_t:s0\x00', 0x25, 0x2) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x400, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400203) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:37 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwrite64(r0, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) 06:04:37 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='exec *:\n'], 0x8) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000000200)=0xe8) r3 = getgid() mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x209080, &(0x7f0000000380)=ANY=[@ANYBLOB="5286cfbd3b618285b194e885d09366443d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',blksize=0x0000000000001c00,allow_other,pcr=00000000000000000035,\x00']) 06:04:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:37 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000030000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) [ 1796.163125] audit: type=1400 audit(1540188277.591:156): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="*:" pid=12706 comm="syz-executor5" [ 1796.180951] xt_bpf: check failed: parse error 06:04:37 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) [ 1796.210138] FAULT_INJECTION: forcing a failure. [ 1796.210138] name failslab, interval 1, probability 0, space 0, times 0 [ 1796.287089] CPU: 1 PID: 12720 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #296 [ 1796.290473] audit: type=1400 audit(1540188277.621:157): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="*:" pid=12706 comm="syz-executor5" [ 1796.294484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1796.294492] Call Trace: [ 1796.294521] dump_stack+0x1c4/0x2b6 [ 1796.294562] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1796.332678] should_fail.cold.4+0xa/0x17 [ 1796.336770] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1796.341889] ? rcu_bh_qs+0xc0/0xc0 [ 1796.345441] ? rcu_bh_qs+0xc0/0xc0 [ 1796.348992] ? unwind_dump+0x190/0x190 [ 1796.352894] ? is_bpf_text_address+0xd3/0x170 [ 1796.357428] ? kernel_text_address+0x79/0xf0 [ 1796.361859] ? __kernel_text_address+0xd/0x40 [ 1796.366550] ? unwind_get_return_address+0x61/0xa0 [ 1796.371497] ? __save_stack_trace+0x8d/0xf0 [ 1796.375868] ? save_stack+0xa9/0xd0 [ 1796.379526] ? save_stack+0x43/0xd0 [ 1796.383184] ? kasan_kmalloc+0xc7/0xe0 [ 1796.383211] ? kasan_slab_alloc+0x12/0x20 [ 1796.383226] ? kmem_cache_alloc+0x12e/0x730 [ 1796.383246] ? audit_log_start+0x554/0x9d0 [ 1796.391274] ? common_lsm_audit+0x112/0x2200 [ 1796.391289] ? aa_audit+0x21d/0x740 [ 1796.391304] ? aa_audit_file+0x53d/0xa20 [ 1796.391323] ? aa_change_profile+0x1736/0x3260 [ 1796.391337] ? apparmor_setprocattr+0xa8b/0x1150 [ 1796.391357] ? security_setprocattr+0x66/0xc0 [ 1796.399910] ? proc_pid_attr_write+0x301/0x540 [ 1796.399927] ? __vfs_write+0x119/0x9f0 [ 1796.399948] __should_failslab+0x124/0x180 [ 1796.399969] should_failslab+0x9/0x14 [ 1796.399989] kmem_cache_alloc_node+0x56/0x730 [ 1796.446879] ? graph_lock+0x170/0x170 [ 1796.450698] __alloc_skb+0x119/0x770 [ 1796.454442] ? skb_scrub_packet+0x490/0x490 [ 1796.458793] ? __lock_is_held+0xb5/0x140 [ 1796.462881] ? rcu_read_lock_sched_held+0x108/0x120 [ 1796.467908] ? kmem_cache_alloc+0x33a/0x730 [ 1796.472243] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1796.478074] ? kasan_check_read+0x11/0x20 [ 1796.482245] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 06:04:37 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000110000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:37 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x40, 0x40) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000200)=@int=0x100000000, 0x4) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x600000) perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x425, 0x6, 0x100, 0x80000000, 0x0, 0x2, 0x8400, 0xf, 0x8, 0x100000000, 0x1000, 0x1, 0x6, 0x10001, 0x7ff, 0x7, 0x84000000000000, 0x9, 0x1, 0x9, 0x8, 0x0, 0x1, 0x0, 0x10001, 0x2da, 0x2, 0x1, 0x3, 0x3, 0xfffffffffffffffe, 0x4, 0x2, 0x80, 0x8001, 0x80000000, 0x0, 0x401, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x2000, 0x4, 0x7, 0x2, 0xfffffffffffffc2b, 0x6, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffff9c, 0x1) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x352713a7, 0x480) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fd) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:37 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200000, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x1, 'gre0\x00'}, 0x18) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) fchdir(r1) 06:04:37 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) [ 1796.487543] ? audit_file_mask+0x180/0x180 [ 1796.491800] audit_log_start+0x57c/0x9d0 [ 1796.495886] ? audit_serial+0x30/0x30 [ 1796.499702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1796.505254] ? refcount_sub_and_test_checked+0x203/0x310 [ 1796.510719] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 1796.516179] ? aa_find_child+0xd0/0xd0 [ 1796.520099] ? print_usage_bug+0xc0/0xc0 [ 1796.524177] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1796.530472] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1796.536030] ? __aafs_ns_mkdir+0xca0/0xca0 [ 1796.540326] ? audit_file_mask+0x180/0x180 [ 1796.540343] common_lsm_audit+0x112/0x2200 [ 1796.540362] ? aa_lookup_profile+0x30/0x30 [ 1796.553066] ? __lock_acquire+0x7ec/0x4ec0 [ 1796.553085] ? ipv6_skb_to_auditdata+0xee0/0xee0 [ 1796.553109] ? graph_lock+0x170/0x170 [ 1796.553129] ? __lock_acquire+0x7ec/0x4ec0 [ 1796.570178] ? mark_held_locks+0x130/0x130 [ 1796.571382] xt_bpf: check failed: parse error [ 1796.574441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1796.574458] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1796.574487] ? fqlookupn_profile+0x88/0xc0 [ 1796.594289] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1796.599331] ? aa_label_strn_parse+0x1d6/0x1230 [ 1796.604046] aa_audit+0x21d/0x740 [ 1796.607510] ? audit_file_mask+0x180/0x180 [ 1796.611768] aa_audit_file+0x53d/0xa20 [ 1796.615668] ? update_file_ctx+0x340/0x340 [ 1796.619909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1796.625460] ? refcount_add_not_zero_checked+0x330/0x330 [ 1796.630959] aa_change_profile+0x1736/0x3260 [ 1796.635377] ? save_stack+0x43/0xd0 [ 1796.639008] ? kasan_kmalloc+0xc7/0xe0 [ 1796.642903] ? apparmor_setprocattr+0x2ab/0x1150 [ 1796.647675] ? aa_change_hat+0x1890/0x1890 [ 1796.651932] ? find_held_lock+0x36/0x1c0 [ 1796.656012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1796.661568] ? check_preemption_disabled+0x48/0x280 [ 1796.666621] ? check_preemption_disabled+0x48/0x280 [ 1796.671655] ? __lock_is_held+0xb5/0x140 [ 1796.675739] ? rcu_read_lock_sched_held+0x108/0x120 [ 1796.680780] ? __kmalloc+0x5de/0x760 [ 1796.684513] ? graph_lock+0x170/0x170 [ 1796.688356] ? mark_held_locks+0x130/0x130 [ 1796.692617] apparmor_setprocattr+0xa8b/0x1150 [ 1796.697233] ? apparmor_task_kill+0xcb0/0xcb0 [ 1796.701744] ? lock_downgrade+0x900/0x900 [ 1796.705917] ? arch_local_save_flags+0x40/0x40 [ 1796.710541] security_setprocattr+0x66/0xc0 [ 1796.714892] proc_pid_attr_write+0x301/0x540 [ 1796.719321] __vfs_write+0x119/0x9f0 [ 1796.723052] ? check_preemption_disabled+0x48/0x280 [ 1796.728108] ? proc_loginuid_write+0x4f0/0x4f0 [ 1796.732705] ? kernel_read+0x120/0x120 [ 1796.736648] ? __lock_is_held+0xb5/0x140 [ 1796.740743] ? rcu_read_lock_sched_held+0x108/0x120 [ 1796.745793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1796.751354] ? __sb_start_write+0x1b2/0x370 [ 1796.755713] vfs_write+0x1fc/0x560 [ 1796.759276] ksys_write+0x101/0x260 [ 1796.762934] ? __ia32_sys_read+0xb0/0xb0 [ 1796.767023] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1796.772492] __x64_sys_write+0x73/0xb0 [ 1796.776392] do_syscall_64+0x1b9/0x820 [ 1796.780292] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1796.785679] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1796.790621] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1796.795484] ? trace_hardirqs_on_caller+0x310/0x310 [ 1796.800521] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1796.805580] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1796.811235] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1796.811260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1796.811272] RIP: 0033:0x457569 [ 1796.811288] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1796.811297] RSP: 002b:00007f9a713bfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1796.811323] RAX: ffffffffffffffda RBX: 00007f9a713bfc90 RCX: 0000000000457569 [ 1796.811332] RDX: 0000000000000008 RSI: 0000000020000040 RDI: 0000000000000003 [ 1796.811341] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1796.811350] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9a713c06d4 06:04:38 executing program 4 (fault-call:1 fault-nth:4): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:38 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000020626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:38 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) 06:04:38 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) socket$bt_bnep(0x1f, 0x3, 0x4) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = accept(r2, &(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast2}}, &(0x7f0000000200)=0x80) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x4e24, @remote}}) accept$packet(0xffffffffffffff9c, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001840)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000001880)={'team0\x00', r4}) 06:04:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000080)=0x4) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="68706763c0653a0a"], 0x8) [ 1796.811360] R13: 00000000004c54ee R14: 00000000004d8e08 R15: 0000000000000004 [ 1796.821328] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 1796.879881] audit: out of memory in audit_log_start 06:04:38 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) [ 1797.044602] FAULT_INJECTION: forcing a failure. [ 1797.044602] name failslab, interval 1, probability 0, space 0, times 0 [ 1797.057007] xt_bpf: check failed: parse error [ 1797.097193] CPU: 0 PID: 12766 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #296 [ 1797.104623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1797.113976] Call Trace: [ 1797.116578] dump_stack+0x1c4/0x2b6 [ 1797.120236] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1797.125453] should_fail.cold.4+0xa/0x17 [ 1797.129527] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1797.134642] ? __save_stack_trace+0x8d/0xf0 [ 1797.139009] ? save_stack+0xa9/0xd0 [ 1797.142660] ? save_stack+0x43/0xd0 06:04:38 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000880000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) [ 1797.142674] ? kasan_kmalloc+0xc7/0xe0 [ 1797.142686] ? kasan_slab_alloc+0x12/0x20 [ 1797.142702] ? kmem_cache_alloc_node+0x144/0x730 [ 1797.142716] ? __alloc_skb+0x119/0x770 [ 1797.142737] ? audit_log_start+0x57c/0x9d0 [ 1797.150240] ? common_lsm_audit+0x112/0x2200 [ 1797.150256] ? aa_audit+0x21d/0x740 [ 1797.150271] ? aa_audit_file+0x53d/0xa20 [ 1797.150284] ? aa_change_profile+0x1736/0x3260 [ 1797.150297] ? apparmor_setprocattr+0xa8b/0x1150 [ 1797.150312] ? security_setprocattr+0x66/0xc0 [ 1797.150326] ? proc_pid_attr_write+0x301/0x540 06:04:38 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) [ 1797.150340] ? __vfs_write+0x119/0x9f0 [ 1797.150354] ? vfs_write+0x1fc/0x560 [ 1797.150371] ? ksys_write+0x101/0x260 [ 1797.209233] ? __x64_sys_write+0x73/0xb0 [ 1797.213323] ? do_syscall_64+0x1b9/0x820 [ 1797.217404] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1797.222792] ? unwind_get_return_address+0x61/0xa0 [ 1797.227756] ? __save_stack_trace+0x8d/0xf0 [ 1797.232093] ? graph_lock+0x170/0x170 [ 1797.235950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1797.241495] ? check_preemption_disabled+0x48/0x280 06:04:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) dup2(r0, r1) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) [ 1797.246521] ? check_preemption_disabled+0x48/0x280 [ 1797.251576] __should_failslab+0x124/0x180 [ 1797.255857] should_failslab+0x9/0x14 [ 1797.255876] kmem_cache_alloc_node_trace+0x5a/0x740 [ 1797.255909] __kmalloc_node_track_caller+0x33/0x70 [ 1797.255930] __kmalloc_reserve.isra.39+0x41/0xe0 [ 1797.255949] __alloc_skb+0x155/0x770 [ 1797.255969] ? skb_scrub_packet+0x490/0x490 [ 1797.269722] ? __lock_is_held+0xb5/0x140 [ 1797.269751] ? rcu_read_lock_sched_held+0x108/0x120 [ 1797.269768] ? kmem_cache_alloc+0x33a/0x730 [ 1797.269787] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1797.269802] ? kasan_check_read+0x11/0x20 [ 1797.269827] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1797.269848] ? audit_file_mask+0x180/0x180 [ 1797.269869] audit_log_start+0x57c/0x9d0 [ 1797.296056] ? audit_serial+0x30/0x30 [ 1797.296074] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1797.296091] ? refcount_sub_and_test_checked+0x203/0x310 [ 1797.296113] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 1797.296128] ? aa_find_child+0xd0/0xd0 [ 1797.296147] ? print_usage_bug+0xc0/0xc0 06:04:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x20000, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) [ 1797.328984] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1797.329009] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1797.329031] ? __aafs_ns_mkdir+0xca0/0xca0 [ 1797.329047] ? audit_file_mask+0x180/0x180 [ 1797.329063] common_lsm_audit+0x112/0x2200 [ 1797.329082] ? aa_lookup_profile+0x30/0x30 [ 1797.329102] ? __lock_acquire+0x7ec/0x4ec0 [ 1797.343649] xt_bpf: check failed: parse error [ 1797.343882] ? ipv6_skb_to_auditdata+0xee0/0xee0 [ 1797.343909] ? graph_lock+0x170/0x170 [ 1797.343932] ? __lock_acquire+0x7ec/0x4ec0 06:04:38 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000006000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) [ 1797.397471] ? mark_held_locks+0x130/0x130 [ 1797.401722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1797.407275] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1797.412837] ? fqlookupn_profile+0x88/0xc0 [ 1797.412857] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1797.412874] ? aa_label_strn_parse+0x1d6/0x1230 [ 1797.412907] aa_audit+0x21d/0x740 [ 1797.422148] ? audit_file_mask+0x180/0x180 [ 1797.422171] aa_audit_file+0x53d/0xa20 [ 1797.422193] ? update_file_ctx+0x340/0x340 [ 1797.422208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1797.422232] ? refcount_add_not_zero_checked+0x330/0x330 [ 1797.422266] aa_change_profile+0x1736/0x3260 [ 1797.422299] ? save_stack+0x43/0xd0 [ 1797.422323] ? kasan_kmalloc+0xc7/0xe0 [ 1797.465632] ? apparmor_setprocattr+0x2ab/0x1150 [ 1797.470413] ? aa_change_hat+0x1890/0x1890 [ 1797.474850] ? find_held_lock+0x36/0x1c0 [ 1797.478946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1797.484505] ? check_preemption_disabled+0x48/0x280 [ 1797.489580] ? check_preemption_disabled+0x48/0x280 [ 1797.494630] ? __lock_is_held+0xb5/0x140 [ 1797.498723] ? rcu_read_lock_sched_held+0x108/0x120 [ 1797.501884] xt_bpf: check failed: parse error [ 1797.503754] ? __kmalloc+0x5de/0x760 [ 1797.503770] ? graph_lock+0x170/0x170 [ 1797.503788] ? mark_held_locks+0x130/0x130 [ 1797.503822] apparmor_setprocattr+0xa8b/0x1150 [ 1797.503848] ? apparmor_task_kill+0xcb0/0xcb0 [ 1797.529196] ? lock_downgrade+0x900/0x900 [ 1797.533361] ? arch_local_save_flags+0x40/0x40 [ 1797.538009] security_setprocattr+0x66/0xc0 [ 1797.542364] proc_pid_attr_write+0x301/0x540 [ 1797.546796] __vfs_write+0x119/0x9f0 [ 1797.550538] ? check_preemption_disabled+0x48/0x280 [ 1797.555567] ? proc_loginuid_write+0x4f0/0x4f0 [ 1797.560168] ? kernel_read+0x120/0x120 [ 1797.564087] ? __lock_is_held+0xb5/0x140 [ 1797.568174] ? rcu_read_lock_sched_held+0x108/0x120 [ 1797.573215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1797.578768] ? __sb_start_write+0x1b2/0x370 [ 1797.583119] vfs_write+0x1fc/0x560 [ 1797.583144] ksys_write+0x101/0x260 [ 1797.590316] ? __ia32_sys_read+0xb0/0xb0 [ 1797.590337] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1797.590360] __x64_sys_write+0x73/0xb0 [ 1797.590379] do_syscall_64+0x1b9/0x820 [ 1797.590395] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1797.590413] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1797.590444] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1797.622843] ? trace_hardirqs_on_caller+0x310/0x310 [ 1797.627874] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1797.632910] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1797.637945] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1797.642783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1797.647962] RIP: 0033:0x457569 [ 1797.651139] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1797.670025] RSP: 002b:00007f9a713bfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1797.677721] RAX: ffffffffffffffda RBX: 00007f9a713bfc90 RCX: 0000000000457569 [ 1797.684977] RDX: 0000000000000008 RSI: 0000000020000040 RDI: 0000000000000003 [ 1797.692239] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 06:04:39 executing program 4 (fault-call:1 fault-nth:5): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$TIOCLINUX3(r2, 0x541c, &(0x7f0000000040)) setsockopt$inet6_dccp_int(r2, 0x21, 0xf, &(0x7f0000000080)=0x9, 0x4) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000100)=""/243, 0xf3}, {&(0x7f0000000280)=""/116, 0x74}, {&(0x7f0000000300)=""/239, 0xef}, {&(0x7f0000000400)=""/171, 0xab}, {&(0x7f00000004c0)=""/202, 0xca}, {&(0x7f0000000200)=""/26, 0x1a}], 0x6, 0x0) 06:04:39 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000008800626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:39 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="468308068894c0f9df4370d5059c161a3fea70cce659232e17ce4e2a130d75", 0x117, 0x4b) 06:04:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:39 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x6, 0x1) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) r2 = fcntl$getown(r1, 0x9) accept$alg(r0, 0x0, 0x0) r3 = getpgid(0x0) sched_getaffinity(r3, 0xfffffd44, &(0x7f0000001e40)) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x8000, 0x100, 0x0, 0x2, 0x1a, 0x9, "f0851f19bad6d30e94bedace800feb4d099255c1e2b2fce375a5ae2de6542f68af464bdaf685a2c125e797c2506f9f3819879f82a38042206a6d17fc24baed99", "07bbbe5c0685e3cac286b6cc9a56c01a5aaf9416b76509d1182460e8a036da229b06d28c3208ecbf91a9c132dbe411face92991c179e4d38962cf6ecaf538ffc", "059d9b361554db21bf47e75c6b3ec917bf89b67993b4dd8f95ba7be7cccfdd7b", [0x0, 0x81]}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x9, 0x0, 0x3, 0x2, 0x0, 0x8001, 0x4021, 0x1, 0x31a, 0x7, 0x0, 0x80000000, 0x2, 0x1f, 0x100000000, 0x7f80, 0x1, 0x80000000, 0x0, 0xe0, 0xffffffffffffff80, 0x6, 0x7, 0x8, 0x1, 0xe180, 0x8001, 0x7ff, 0x81, 0xdef, 0xff, 0x400, 0xef, 0x9, 0x3e00c5ee, 0x8, 0x0, 0x3, 0x0, @perf_config_ext={0x6, 0x40}, 0x10008, 0x0, 0x2, 0x5, 0x9, 0x7ff, 0x9}, r2, 0xf, r0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000001a80)=0xe8) getgroups(0x3, &(0x7f0000001ac0)=[0xee01, 0xffffffffffffffff, 0x0]) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000001e00)={0x0, 0x49c, 0x4, 0x100}, &(0x7f0000001e80)=0x10) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000001ec0)=@sack_info={r6, 0x3, 0xd76}, 0xc) stat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000001bc0)=0x0, &(0x7f0000001c00), &(0x7f0000001c40)) r9 = getuid() stat(&(0x7f0000001c80)='./file0\x00', &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000001dc0)={&(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000018c0)=[{&(0x7f0000000200)="d443969aa998c29af8f186a975c1ed0ca4", 0x11}, {&(0x7f0000000380)="0569f8dfec57d2a2384609e01382db1f97f6919a51adf2afce8f1bc7de61cf2cdfd3fe815c9e169b52450d801fce0d199b4d2b660343f0a602da062a38ef53b2ce48ad000da0474d301c82ff93132f6e12043012735fff4ce2c9ca79460f7b62457ebfb7fdb65a872d4ed8e0431a84fa5575a5d674dbf1759c41", 0x7a}, {&(0x7f0000000400)="0c1a526039c827bf9e621f77e227a2b98614eb12fcca2799d2051ef2d5cb58588fa752c1a0a96efca95033aee9a08e603b0042b7d0815fec", 0x38}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="9a083c768001afa367dae6000840150004db11dcd93109e6da6e394be9bef39a3c8b108214856ae7a95d58554c009adb41f7f7915a7090b7bd7eea61078105661f97d8cbd13833d7d502ef799eb7c5dc4345c28a9cdb8823d8233407e5d63d15d36971dfacf18249e7d0e20b1db0fc9126bb207c2ef05da2ec5805ac374af3bc3971322fd6694b38caea535e798f5abecebcd0360326d2f67cef04d401d439247979fb094a00c5664ed70060158ada74645f3742fa72e3ff952155319c5d12d16dcbdab4e9fbd9ab9f5a3815d47a15", 0xcf}, {&(0x7f0000001540)="d9b2c1d9296bbe98b0ef23af2c9b5ab833da2370bd34f080e4085c2510b1d4b9e60879ac6acf095dbb6a5b59bf2838be4dbd4b2d995a7ea82de66a5b60aea34e6ec29d3d92c4e76274ed5a1efbc637e4308266355d6a66473daca46625f5d9b13a49a35d26ea8e44845ab4a47efe37c7ee14a7367d3d0cff32c6065ea1cf3be6335f8d8a25", 0x85}, {&(0x7f0000001600)="7e5a8a393dcc65d661fd7d53d214acb86f197484aef86e4ef77e7872ed2a992b197cb67e2de66950aa6b958c0e41d4459238a2d1ad905daa749e8a62aa736b5b3c023b46c0090bcca62d1b26c5d43287f60198b006b14b6028f83e73ab77daf732f2b6c32806dfd08678e3b69d98cd3daaa31fc0a911fb46c96e336651ed8b8e425143c5be2d42cabbd10270f47521deec27b1d483e5be87fae58b1576742685f5804136b84df20a72df48153418aa", 0xaf}, {&(0x7f00000016c0)="9057dcabf4f0251679b4ce13b21945146d58b1a2d937c3ea9e23b938f0583a9d4bffc75de220066cb61812cce5f443a57b74f6ae857026732699454b7cc076ad7acad84a6af9edf4cf1da80e0b2dbd8b56b02d3cd8785db4613d2e8d0dbcaf879a9f3a41a876b23a2e8739ac82e50458d7671fea837fd00b03e3599688f281657c50596edd60e204dc2643ccc0bfa699b9a737cc28357545d7be3a80755ad5dbb90023044fcd574309a44a9df8668fdbd8d5c6da1bbc3fd4eac1bc9347bd024fa2b3554fc2004cb56841588af1d3eae2ee127de3822d76a0d77f9e1bd7deecbbe19e848dea1201bff7d467706426b2eefcebf9fd5eb99044", 0xf8}, {&(0x7f00000017c0)="c54c27e50b0a1bab1dad2a4d6d522c14ca3aff961b55a3284977cfa50e11535f6e6eeb2e1a8f839fe328b3ea84c4c88f78d1a1475e4d779b221615fb29dd734d034dc9fc9fcb8c26ca686c78a02091684ea8382bd20739f31109b8b73921697726b6381328e7b75ed18a463bfbf2f40115f082aa0aa696657125d8", 0x7b}, {&(0x7f0000001840)="8cf29ff3c091a8bffc5df89bbec9736929cde8db0c4d3509fa4e9136cb758a3b596450ccf386adf85b7773b35c9503d0fdf11030f4b45f14f6cd88dab0cbd596dbb9f656687f035f86cd3529133ab846d7ec56bf6139b9cdd09abe9f6d6be24177832dcf830b8cb49ba3da8df6cc0003", 0x70}], 0xa, &(0x7f0000001d40)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r2, r7, r8}, @cred={0x20, 0x1, 0x2, r3, r9, r10}], 0x60}, 0x8000) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000000)={r0, r0, 0x41}) [ 1797.699495] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9a713c06d4 [ 1797.706750] R13: 00000000004c54ee R14: 00000000004d8e08 R15: 0000000000000004 [ 1797.718668] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 1797.726244] audit: out of memory in audit_log_start [ 1797.808854] audit: type=1400 audit(1540188279.231:158): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=12799 comm="syz-executor4" 06:04:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) fcntl$setflags(r1, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) get_robust_list(r2, &(0x7f0000000200)=&(0x7f00000001c0)={&(0x7f0000000100)={&(0x7f0000000080)}, 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, &(0x7f0000000280)=0x18) 06:04:39 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={'veth0_to_bridge\x00', {0x2, 0x4e23, @multicast2}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f0000000100)={{0x7ff, 0x3d}, 0x1, 0x3ff, 0x1000, {0x6, 0x7fffffff}, 0x8, 0x7ff}) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000000c0)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000080)=0xf, 0x4) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:39 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwrite64(r0, &(0x7f00000001c0), 0x0, 0x4b) 06:04:39 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) [ 1797.952861] xt_bpf: check failed: parse error 06:04:39 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000070000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000100)) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xffffffffffffff55, 0x10800) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) 06:04:39 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwrite64(r0, &(0x7f00000001c0), 0x0, 0x0) [ 1798.020212] audit: type=1400 audit(1540188279.451:159): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=12821 comm="syz-executor4" 06:04:39 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'"xec ', '=:\n'}, 0x8) [ 1798.118949] xt_bpf: check failed: parse error 06:04:39 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='exe::\n'], 0x8) 06:04:39 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwrite64(r0, &(0x7f00000001c0), 0x0, 0x0) 06:04:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:39 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000040000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:39 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'%xec ', '=:\n'}, 0x8) 06:04:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r1, 0x40049409, r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4800, 0x0) write$apparmor_exec(r2, &(0x7f0000000100)={'exec ', "5b200a0be7af4281eee0e3e74895719ef08e1fedfe24ef98be9c395d57d038962b971e9212ffc1cbb2bf0da296a01a6606d1f794c3aebfbc9f435de87a6488d19083f5168efbd49f6316a3582cd20874e0760e452cedf74682295b28c32b844d9106ff"}, 0x68) 06:04:39 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwrite64(r0, &(0x7f00000001c0), 0x0, 0x0) 06:04:39 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x7}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000001c0)={r2, 0x49, "819576d0af58b87444950cada26dd5103773241520ab5f1b27a5060da0af4e335c18ac0491f5ad80a728876b267a27b1097f8a9588ed9a07cb3b54a2737dcae4714c799a8ceae32251"}, &(0x7f0000000280)=0x51) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000500)=0xe8) r5 = getgid() r6 = getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000540)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000640)=0xe8) getgroups(0x4, &(0x7f0000000680)=[0xee01, 0x0, 0xee01, 0xffffffffffffffff]) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000006c0)=0x0) r10 = geteuid() r11 = getegid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000002b00)=0x0) r13 = geteuid() r14 = getegid() r15 = fcntl$getown(r1, 0x9) fstat(r1, &(0x7f0000002b40)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000002c40)={0x0, 0x0}) r19 = geteuid() r20 = getgid() fcntl$getownex(r0, 0x10, &(0x7f0000003080)={0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000030c0)={0x0, 0x0}, &(0x7f0000003100)=0xc) r23 = getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000003140)={0x0}, &(0x7f0000003180)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000031c0)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f00000032c0)=0xe8) fstat(r0, &(0x7f0000003300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r27 = getpid() getresuid(&(0x7f00000055c0)=0x0, &(0x7f00000033c0), &(0x7f0000005600)) r29 = getgid() r30 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000003440)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003540)=0xe8) stat(&(0x7f0000003580)='./file0\x00', &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003680)={0xffffffffffffffff, r1, 0x0, 0x37, &(0x7f0000003640)='securitytrusted}%&cpusetposix_acl_accessmd5sum.keyring\x00'}, 0x30) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000036c0)={0x0, 0x0}, &(0x7f0000003700)=0xc) r35 = getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003c40)={0x0, r1, 0x0, 0x5, &(0x7f0000003c00)='exec ', 0xffffffffffffffff}, 0x30) r37 = geteuid() lstat(&(0x7f0000003c80)='./file0\x00', &(0x7f0000003cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000005480)=[{&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000000)="6dc1b7f3352c35cc89396bf622fd0053", 0x10}, {&(0x7f00000002c0)="702b43c50a0c739f0fd6b2b50a1d867b0e8ebae5526b8db3ac27c8b5fe1e861476bb9ef67fb342c5395b9b53e1f629b6012a6670e0c8aedf5f7bbc5caebb3ecaff391a591493760cf20ee8ebcdadb4725c55ee9aa218a82a88af45b28f4ea4e6dcf57d40734bd22c49491bf41232feeef50070c8012bb0183582a5a06cf490daac53", 0x82}], 0x2, &(0x7f0000000700)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @rights={0x30, 0x1, 0x1, [r1, r0, r0, r1, r0, r0, r1, r1]}, @cred={0x20, 0x1, 0x2, r9, r10, r11}], 0x90, 0x40}, {&(0x7f00000007c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000002a80)=[{&(0x7f0000000840)="72f1590551f5d9", 0x7}, {&(0x7f0000000880)="25d8813684692193e70c8713746f3beb4d90408e7c363e263055f99e77353891e3c70e9bf88838efa0d143949cbb20f799311760b832d017517a70e1f443bea3d9d416c8372d0dd99b20e40ae1dfb5cc536585c9938a931464b713f8c13294edef33fb3305bffe5e6aa7448485f6e689d39a2a85e34c1ce43e33da9373383c878a20a52e91fefb4d101426b9a4b1eeaa34ab2bb2710f4b2bbc8b064ecb6d72e157cc", 0xa2}, {&(0x7f0000000940)="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", 0x1000}, {&(0x7f0000001940)="f14ffe7dc9eaa782fc16bc0d293759f26a42fdcc808b60c34c522211e3e6380b4d2eaba107c147f33a471f950b9059ca7f1839a807da60132a339072b4ace85952ed9c2a7c1c2c178ca6d9f2718e15833b814671262383f6be059e1911af5dea7eb68e7043242ef57d416b8c2a9c6bf016566feb4a3c1e64ee61582e0588600dda0aafbfce", 0x85}, {&(0x7f0000001a00)="f8023d6c35e78cf3957c17654acaf2a11b2fd5a7ac1526dde1e1968aae198d52d5a29b036ca187b300b0f5958d642577d155a82339a4829644e6ce1319b1db68a4be062d92cb8fba4cbbf355a3016c7210988b59f673e6b42417", 0x5a}, {&(0x7f0000001a80)="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", 0x1000}], 0x6, &(0x7f0000002c80)=[@rights={0x18, 0x1, 0x1, [r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r1, r0]}, @rights={0x28, 0x1, 0x1, [r0, r1, r1, r1, r1]}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @rights={0x30, 0x1, 0x1, [r1, r0, r1, r0, r0, r0, r0, r1]}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x20, 0x1, 0x1, [r1, r0, r1, r1]}], 0x140, 0x4}, {&(0x7f0000002dc0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002e40)="dd28ed8747caa51f34c36807c47b09a53c46279a168fa4140e115363792b306e0a582666a7b676c63f26fb953a7b424aac923b60dfc5a3734bdca96776408175dd2da9d952ac841e2ec27683e5f61b2267f5cce0580a68e09fc01ace3503a7a9a3db8c1d1d38ca0f0d64d920e44223a76229930b8bd80c7298d2ddfb2e019898c17ed79228f0", 0x86}, {&(0x7f0000002f00)="146ee1e082601d86183c74c10e01714db36e4828c48cf5e1b1948aa00ca3eb0d836d7153e02051089873e6f401037792ef9966578859b90541487538cee0f5b83340", 0x42}, {&(0x7f0000002f80)="5fa603c6a254a467f853b7f0b7c9c3858d869ef4822bcf23008fa23fc6c3db80c6da474772c3705194da412bd5bb55dc2d5943c017f015d431ac7d523a7beb27d132ceb384831b771db19cdf86bec5e73108cba50d5947ff0e2492061ffeadb0c5a6e0fd4737590e463f635db0bbadfe48ee5092bc3d1a4ef6c15f9fe45fa7d351a8ca07f0badd3cb3bb7594b09ac0df7aced96b53c109e4f6775591", 0x9c}], 0x3, &(0x7f0000003740)=[@cred={0x20, 0x1, 0x2, r21, r22, r23}, @rights={0x38, 0x1, 0x1, [r0, r1, r1, r1, r0, r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r1, r1, r1]}, @cred={0x20, 0x1, 0x2, r24, r25, r26}, @cred={0x20, 0x1, 0x2, r27, r28, r29}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r1, r1, r0]}, @cred={0x20, 0x1, 0x2, r30, r31, r32}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r1, r0, r1, r1]}, @rights={0x18, 0x1, 0x1, [r0, r1]}, @cred={0x20, 0x1, 0x2, r33, r34, r35}], 0x168, 0x801}, {&(0x7f00000038c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000003bc0)=[{&(0x7f0000003940)="a0b66b4cbd9d2bde01a3892f63f7ef842248c851fb8312fa4a294f641f4df6e1351080c3533b99c4e9852b57122330361825f2f35d51f3a7f250933e4e5aea82b624751047b32a7012526c22dcc17b794f0a56337f46a1618f6027d222d3221fc15625d1f16d33", 0x67}, {&(0x7f00000039c0)="3219093d67c86bf463f55d99c626fc6e0b2e2bac13ea7752b5a102a4d2a173bf567b98a5fe2f1fd9ae7f254021a4b13fc6d04902c6d2a42260321f712f28e2553caaafa234f8c6069c615b47d2505c225a4d695fd18b0ca8a7a2a6cb9fd78aa335cefe237acd37f8a8", 0x69}, {&(0x7f0000003a40)="6615587b3254bb19edcb87ca441ffef361bc5760d92b464087cc640142a2711211a84650f3344177cd32ba24fc086b32f49f2144e2fc705bb2b2b986e0a0c7d6c9e5b790001128ff002a94d6a901ce6dc7876e0209969dc0db273fe1b2a76fc642ff0feffb19549b0b38a7c5d23b10cd7123c1a1d95aefa997c6cd1e9fef94c38b39eeb5dd579fc811e646720541adb812f31ecb9049abc1f3c3bfa426004d2f3d7c21ed6e54d8f2a21f73358d28f422da832f9ab0c22ca0dfcaee33b9487a6b1eb127a19a147f7e056f20fbd19c68818f3a564a93b9fdb190dc355e776dbf8601f60557f782bfc11d7192f8dea7", 0xee}, {&(0x7f0000003b40)="be2fbb2a06d1b1975c7cd12a859a00f7ec6b95ea46f2ed177ec16140bb5d80df8eec13f0036e0f6bd4afcec2e41c58223275e6995eaea22806aa0075576cf5c926a94cba45e13a7c56dbaf1b010262", 0x4f}], 0x4, &(0x7f0000003d40)=[@rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r1, r0, r1]}, @cred={0x20, 0x1, 0x2, r36, r37, r38}, @rights={0x18, 0x1, 0x1, [r0, r1]}, @rights={0x28, 0x1, 0x1, [r1, r0, r0, r0, r0]}], 0x90, 0x44000}, {&(0x7f0000003e00)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000005400)=[{&(0x7f0000003e80)="446628eb79e7caccd4c2d8fe1d172396ef644301fba4dc300494c477d5faf75479762f50e209e31f9b7e1db58c20d051325b2f68daf2f05860377101c0278a8965f5ee3b41680b4c2c3ae955b3e49c0eae32722d296ca26babc21082ecf11d375870e166fb7f2490cdb2e43a0634e110f70f01e1554c810488b1914801e29aee0c4662d19f3e462548049924a4b3c588fe8251c1cca23a48f4d46533e3b2a86cf14736c5757fa2f4040c47b83d2a5f6fb1542a003e1c7c159880e7", 0xbb}, {&(0x7f0000003f40)="c1f32d11c2e45dfbe7e88f256f8ef33d637ed657ef13b5207702b1c2f6def69e62cabe5dda323255a55a1ddd8a0d404fb9e00bd810926e8c48215f2604cd6f72c9e20a86e7d7417fe50416fd67981c8342cf8017a239b9ea0b8b6eae1dc8a7b4def0b48e53d8c487ddcae6e1eb6440e7e13ec77eb8dc09f5fd01ea2bc8c97680e490f6595c7c97186f1245ce8c4af46246febef31ee25e1bec3ae7dcfd16f692af8a42687aec99481dc90d46d69000f1613d33290c49e78ab97bdb606ce2eb9610176f6e7dc0685742875c8033510a1f542de7eaee04b5eefd75e0720a6ad53b0f425a2907ebc2c3", 0xe8}, {&(0x7f0000004040)="de1a5820fb3169ce32029445540d8e07f510b5c8a9ff0f3e73394659604ff2fb32de95f5ffef6cf3a2692eda26219134496a51c970933f2df259f17673711699e5822eb82b98016c64e4f2becede7f4c1b01c8a22836caec0c23cb522cc4efde6bbd65c2ff9e98037dd0d116e3be173f637ad7cae0359db6289ace119a57eb84dc480978b9ec5a2a1feadf996614ba43cb223bf38d1b104d8b7f7d9cbc521a6f1ada5f6b1aa9b8d05dd398638c40715f8a4f04531c1e8b64e7df97ca28e8c0fdbfdb1a2d19289eee856975907579215dd1beac8bf845dab4627aef53ca", 0xdd}, {&(0x7f0000004140)="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", 0xfa}, {&(0x7f0000004240)="4060034936fe936c360c596c3f83e550cc9480c3c28c78e64cdd9ccf1b6e71226bf5714b197656bf9266ad41b8844b5afb2207aee1bf50fefc8c26efb9f07a752e3c813f7e61f8aa7b66b4e7fa8089cde6c13badce1bacfac229659c00bde6d562c257d7de85fecdbdd5e6a25b29", 0x6e}, {&(0x7f00000042c0)="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", 0x1000}, {&(0x7f00000052c0)="791131a9cbc2d9", 0x7}, {&(0x7f0000005300)="0a7a0486919a8f7cd995930d1d84acb607fb9cb8afc2bb2d910f4315c4720b3db0d94750ec79d4acfc772b56ebbae36892d8c67e33b226cadd538701d34db6c307c4b59d58873dff894c355fdfd9120a2e2f070e86b215ca813e35d6cb23f1e0e32cf6be143154f1f134fb58f95dda9dbb21234f0d920da556e82d737dac1482f5faead532ebaebd5d3d8ef228fb82188ba2d0031c5c11a53b2d424431351e74f07ed116f01c2a369c19e7a799082bb496f1f00a43cf240f51ee1fe58a8b8a6562537d9aba568e3a3e25c20c9913b58a11f1b16a69d091af6b94cf486847d516471c9abdf1bb22223e", 0xe9}], 0x8, 0x0, 0x0, 0x20000080}], 0x5, 0x800) 06:04:39 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'e"ec ', '=:\n'}, 0x8) 06:04:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="e57ae563a03a7e4d"], 0x8) 06:04:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10000, 0x0) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000280)=""/149) 06:04:39 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000050000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:39 executing program 0: 06:04:40 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'ex"c ', '=:\n'}, 0x8) 06:04:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:40 executing program 0: 06:04:40 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000440)}}, 0x20) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) write$P9_RMKNOD(r2, &(0x7f0000000300)={0x14, 0x13, 0x2, {0x28, 0x4, 0x5}}, 0x14) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e21, 0x0, @mcast1, 0x2}}, 0xffffffff, 0xf79}, &(0x7f00000004c0)=0x90) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0xc0200, 0x0) sched_setscheduler(0x0, 0x6, &(0x7f0000000100)=0x8b89d10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000180)=0x8001, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r6 = socket(0x1e, 0x805, 0x0) r7 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r7, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) r8 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r8, 0x10f, 0x87, &(0x7f0000000280)=@req3={0x80000000, 0x1}, 0x1c) setsockopt$inet6_tcp_buf(r5, 0x6, 0x1e, &(0x7f0000000500)="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", 0x1000) sendmsg(r6, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900090000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000480), 0x0, &(0x7f00006e9c68)}, 0x0) fcntl$getflags(r3, 0x403) shmget(0xffffffffffffffff, 0x3000, 0x8, &(0x7f0000c73000/0x3000)=nil) r9 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r9, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:40 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000500626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:40 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'ex%c ', '=:\n'}, 0x8) 06:04:40 executing program 3: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) get_robust_list(r0, &(0x7f0000000180)=&(0x7f0000000140)={&(0x7f0000000100)={&(0x7f0000000080)}}, &(0x7f00000001c0)=0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x1830, 0x2) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0xc0000, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0xf722, 0x103000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)=ANY=[@ANYBLOB='exek ::\n'], 0x8) 06:04:40 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000256f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:40 executing program 0: 06:04:40 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exe" ', '=:\n'}, 0x8) 06:04:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000180)="80a646146f5cf60c2d1b7a01db978ef8", 0x10) write$apparmor_exec(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="657865a218c574981dcf63a056c42363203a3a0a"], 0x8) 06:04:40 executing program 0: 06:04:40 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000600000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:40 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exe% ', '=:\n'}, 0x8) 06:04:41 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000040)=0x4a, 0x4) readv(r0, &(0x7f0000001440)=[{&(0x7f0000000080)=""/138, 0x8a}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000200)=""/146, 0x92}, {&(0x7f0000000180)=""/49, 0x31}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/164, 0xa4}, {&(0x7f0000001380)=""/171, 0xab}], 0x7) close(r0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x103001) 06:04:41 executing program 0: 06:04:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:41 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec%', '=:\n'}, 0x8) 06:04:41 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000110000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:41 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec/', '=:\n'}, 0x8) [ 1799.927155] __bpf_mt_check_bytecode: 4 callbacks suppressed [ 1799.927163] xt_bpf: check failed: parse error 06:04:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x616, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x4000100000000018, 0x0, 0x100000000, &(0x7f0000000080)) 06:04:41 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000060000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3f, 0x48080) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:41 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="43786585203a3a8a324eee16fe4b107d6930b54cec6d0e5407f375b0f1f36b7b9f2123963a15dab5932d68810dd9ab"], 0x8) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)) 06:04:41 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '":\n'}, 0x8) 06:04:41 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000440)}}, 0x20) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) write$P9_RMKNOD(r2, &(0x7f0000000300)={0x14, 0x13, 0x2, {0x28, 0x4, 0x5}}, 0x14) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e21, 0x0, @mcast1, 0x2}}, 0xffffffff, 0xf79}, &(0x7f00000004c0)=0x90) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0xc0200, 0x0) sched_setscheduler(0x0, 0x6, &(0x7f0000000100)=0x8b89d10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000180)=0x8001, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r6 = socket(0x1e, 0x805, 0x0) r7 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r7, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) r8 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r8, 0x10f, 0x87, &(0x7f0000000280)=@req3={0x80000000, 0x1}, 0x1c) setsockopt$inet6_tcp_buf(r5, 0x6, 0x1e, &(0x7f0000000500)="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", 0x1000) sendmsg(r6, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900090000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000480), 0x0, &(0x7f00006e9c68)}, 0x0) fcntl$getflags(r3, 0x403) shmget(0xffffffffffffffff, 0x3000, 0x8, &(0x7f0000c73000/0x3000)=nil) r9 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r9, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) [ 1800.173321] xt_bpf: check failed: parse error 06:04:41 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000600626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:41 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '%:\n'}, 0x8) 06:04:41 executing program 5: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) setpgid(r1, r2) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="a3a023a0dc79b7ac"], 0x8) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', '}vmnet1\x00'}, 0xe) 06:04:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000000)={0x8001, 0x4, 0x7f, 0x2, 0xab3}) [ 1800.336403] xt_bpf: check failed: parse error 06:04:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:41 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000020000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:41 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)={"a15fc76320eefd010b377a19fd90dcd7543d43ddd3f16400b96c2e26941136cd2e6f8958fc9af9f0fbc67eb286a01fc9a2f27fb5b86dfa1f19b6140e59f2c85b5b78d4452decf54611a0423d26bcd29a5321b2bc893e4737", '&md5sum\x00'}, 0xfffffffffffffe5f) 06:04:41 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '&:\n'}, 0x8) 06:04:41 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x6, 0x40000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000440)=""/52, &(0x7f0000000480)=0x34) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="4187a12f6cff7d02fcc30b95b0a799619eb7925269928a75a0c712f9a07bf1712233a2ebdd47d35008c855622df72bd2d73b015a63bbd8f7e41b42f6457d480e01769f1a1e2765bc76b5", 0x4a}, {&(0x7f0000000280)="bb2ec42a73d2872945828a3f6b39267bf25da249713f4c02ee16f2dcbb7330c375a8ab156906d10f9f53f4a78003d26b1a840f5e20e61867411efa45977c0dfe4671e682b21a679a69472fe0f90d23a342c84e31053fc72352443483c46d8423754b1cdda2c489aaf99711c160f85968ee0e450790d42ce5403d8ed25197a9125ae245437529008caadf151c93c1208d3495e3f7f4b1f4c82d4fb24b425613c3dbe8ef45f81bf372f8172e07ee0dc96fcca11a333a92602cfbba1a885017d19db97ad9a061508d", 0xc7}, {&(0x7f0000000180)="084b96ca9bd624aac4611e172b80cfe79b890e757395d82236aabdf3df2e94cc99287632a5c5c50e4d7ce92af9fe228a93bd37aab44ec7a645fc85fa988517f1b76e60e7b606a1fba7923cc26528a389cf5a6bb5244b840f87e29e246e82eb6e85a78d87359ae9d15e9062d4d95cb003d45021", 0x73}, {&(0x7f0000000380)="7c1013fe36bd1f9d40d08ccb8bc046aca284e6941a43a14df34b5b97ceded4e926f9268ebd3b7a1d088d69079921db5ad7f6f163f211207fb726b38cc23c8fe861be33577f9400a7875902026a6e670db2b1a768658d68ec93c7ad9ef3a5fde9cdf98947fbd0dd880c02c1afbc15b7af17fab4d17fbee9a38ea040b18bf61b09b9a099d36de3ac8672a90673bf3efb9b8c7ea22dc8014ade31ff63656369a7d711e75f07158b0240393ee65e04142888", 0xb0}], 0x4, 0x0, 0x0, 0x800}, 0x4000) setxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000580)=[0x1, 0x8]) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) [ 1800.598337] xt_bpf: check failed: parse error 06:04:42 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000030000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:42 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000080)={0x4, 0x3, 0x5, 0x0, 0x3, [{0x0, 0x9f, 0x0, 0x0, 0x0, 0x200}, {0xffc00, 0x200, 0xdb8b, 0x0, 0x0, 0x404}, {0xc20, 0x1ff, 0x1, 0x0, 0x0, 0x2}]}) [ 1800.913878] xt_bpf: check failed: parse error 06:04:43 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '&:\n'}, 0x8) 06:04:43 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) 06:04:43 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000300626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:43 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x440000, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) openat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) 06:04:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:43 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '="\n'}, 0x8) 06:04:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) [ 1801.676483] xt_bpf: check failed: parse error [ 1801.689496] kauditd_printk_skb: 15 callbacks suppressed [ 1801.689508] audit: type=1400 audit(1540188283.111:175): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=3D22 pid=13051 comm="syz-executor4" 06:04:43 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fadvise64(r0, 0x0, 0x7, 0x5) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:43 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=%\n'}, 0x8) 06:04:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:43 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000002000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) memfd_create(&(0x7f0000000040)='exec ', 0x5) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x280001) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x8) [ 1801.841451] audit: type=1400 audit(1540188283.271:176): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="=%" pid=13064 comm="syz-executor4" 06:04:43 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000080)='}/ppp0\x00', 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f00000001c0)={0x3, 0x3}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000002c0)=0x0) r3 = fcntl$dupfd(r0, 0x406, r0) ioctl$TIOCGSOFTCAR(r3, 0x5419, &(0x7f0000000040)) sched_setscheduler(r2, 0x7, &(0x7f0000000300)=0x1) memfd_create(&(0x7f0000000000)=')lo/[proc+/vmnet1:,\x00', 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)=""/85, 0x55, 0xffffffffffffffff}}, 0x10) write$apparmor_exec(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="65780180000000000000"], 0x8) memfd_create(&(0x7f0000000380)="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", 0x9) 06:04:43 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', "3d3a02"}, 0x8) 06:04:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) [ 1801.954274] xt_bpf: check failed: parse error 06:04:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) execveat(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000180)='::\n', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='exec '], &(0x7f0000000380)=[&(0x7f0000000280)='/proc/thread-self/attr/exec\x00', &(0x7f00000002c0)='::\n', &(0x7f0000000300)='::\n', &(0x7f0000000340)='::\n'], 0x400) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x2e, 0x4, 0x0, {0x1, 0x4, 0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2e) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000640)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000600), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000480)={0x16, 0x98, 0xfa00, {&(0x7f00000003c0), 0x4, r3, 0x1c, 0x1, @ib={0x1b, 0x8, 0xfbc, {"29d7b9a2f7acb164cf2261136e2f431f"}, 0x0, 0x6}}}, 0xa0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='e\tec ::\n'], 0x8) openat$vhci(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhci\x00', 0x0, 0x0) 06:04:43 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x7c539358b2a02a4c) ioctl$sock_bt(r0, 0x8906, &(0x7f0000000140)="fd46c410a36ed806b947628540e352ddaa7b06045aa46eac7c2754afd5a40c411bac0a4c55f8844532e019705f7a14ba01f4e64c1d0159a660a071bc6aaf917f1ce9203e3fb0742735b56c3c42ea587bd2e46ed47924da1894a4159fde674ba5a84f41d1553559c76e2434d7545837cc5de790923f8e724ea469d3049064bd55b757ee68640fdb45a80e5d2dcb45d9330b1eb975ac9c2f063f6a177e48284ac29ed9762a680ece077805ee1233f47de8b623fc66c29b549066f0b559681df524d272240504cff21ab827fdfc") r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="203a1f318f65d7a9b023457501312a6102212110861ff8985a96a6354527f527"], 0x8) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) 06:04:43 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e0000000000000000000a6f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) [ 1802.025053] audit: type=1400 audit(1540188283.451:177): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=3D3A02 pid=13082 comm="syz-executor4" [ 1802.142282] audit: type=1400 audit(1540188283.561:178): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=13093 comm="syz-executor3" 06:04:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:43 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', "3d3a9f"}, 0x8) 06:04:43 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='exUc ::\n'], 0x8) writev(r0, &(0x7f0000002480)=[{&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000000080)="93455bb2a9a65033934970828513a26eef6d3485cf2bf4c636ea40a8ffa8bd156936211fc66fa460581fe070450032dfb2e968b131659d66aa809e647df34a07f5ebbc28812c3fa3d0cef006de62ee26db7613d75ee67cba763415d221a621e843d15fdda4aede7cce54737cadb4246076ecbabf7e3c6f64f649980ecf1cfccf899dbb5baef029690e2c20c824eaae358544bd7bb68a7787921843da6e0cdb6c4914e385f12adb5df800bda892e1c15d665ab86d2db66b8faebedfa58ba882dd3018775eff1c18addb77b689838f1e72f94ee70f499451c14ee4a3", 0xdb}, {&(0x7f0000001280)="c26ce3dcc2508555a23b4caba2adb1acdb9e5f627a2ecb1a7ef71b0a0ac7db0c26481367e55bde183a1130efbcecf77c10f78b30c2ca1dc529a72be815046394f49ecdd940d91c9300c35e2c3910baa2cbe66a3f3d9fc8baed84ef20f14647da9999d8066c696df8e2d1aa7baefdfd23d410e86b25222b145fd944605e4017426bd1ca6d48f2321478ee38d49b6494065888c5c038409656c3b8210b35ec9cab04544a37fcf4938bfe0005972e7e867cca5876a73096feff0e966985ef17faf7f5373248738e236ca4363ccfac5e86b9", 0xd0}, {&(0x7f0000000000)="529646abf5f550223319721a26", 0xd}, {&(0x7f0000000180)="107a6fd197c42a0f3ee6d28f4f0c8465ddb99b35b779eead1e8b011877f16c3fd16a78560f3475bfec0f10b0e88a4a2f2a6608e248e2191474955b33262d863489ea9034bdc793fa3275c8465e2b6acfab319729ee5ea4c862aa9a8ad0cb28593d8a6b12bde8c6e5e57bea9806a3a6663b0291169e89c043adfada91c35fd2f812501ba94c56ea85000f4f9dd62decdc23da422135c4965b3429f49fadff6755441dcfc87b47f323b4", 0xa9}, {&(0x7f0000001380)="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", 0x1000}, {&(0x7f0000002380)="ccfbba42648343fee319e4ac3760cd9551be21512fff704b46fb4d6c9a4a771ff63e961d3ba9dfceee7b6997411261ad5c94137f4517ea3ca8144bdb76262a0c96ecbfff20184cc2043c1e17914cbf3c7832f07aa2826a8f23595e5206ee7850efcff578dce3c1db6802ba01b44af0faf9caac9096debb6ec7049feea5f92fc7714781b0b1c01a4485a8887fd01c938646ffc7445c061ea82ebe8a45ef19c4ccaba05eebc4a4df96aff6de9a865208259b43b853a791ee553bf30319190c90b6ddead80ca31e07bc6cdf5d494fd6386dfb6c874065fb2cc13f62fad6ea7b3c79a2482a57e48017d323bb2a2107bf0ae5", 0xf0}], 0x218) 06:04:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="6578656346a3f8b4"], 0x8) [ 1802.196743] audit: type=1400 audit(1540188283.591:179): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=13093 comm="syz-executor3" 06:04:43 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', "3d3ac3"}, 0x8) [ 1802.282760] xt_bpf: check failed: parse error [ 1802.290788] audit: type=1400 audit(1540188283.691:180): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=3D3A9F pid=13103 comm="syz-executor4" 06:04:43 executing program 5: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140)={r0, 0x59}, &(0x7f0000000180)=0x8) 06:04:43 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000700626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) [ 1802.366371] audit: type=1400 audit(1540188283.741:181): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=13108 comm="syz-executor5" 06:04:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) [ 1802.480919] audit: type=1400 audit(1540188283.741:182): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=13108 comm="syz-executor5" 06:04:43 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="6578658843eba3b5a93c130b6e63203a3a0a"], 0x8) [ 1802.530741] xt_bpf: check failed: parse error 06:04:44 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', "3d3a15"}, 0x8) 06:04:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) [ 1802.591048] audit: type=1400 audit(1540188283.741:183): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=13108 comm="syz-executor5" 06:04:44 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000001100626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) [ 1802.675456] audit: type=1400 audit(1540188283.881:184): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=3D3AC3 pid=13118 comm="syz-executor4" 06:04:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) splice(r1, &(0x7f0000000000), r0, &(0x7f0000000080), 0xffffffff, 0x4) 06:04:44 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x412081, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stack\x00') ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 06:04:44 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:w'}, 0x8) 06:04:44 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) [ 1802.795343] xt_bpf: check failed: parse error 06:04:44 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\t'}, 0x8) 06:04:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:44 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000088626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:44 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x12) 06:04:44 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2000, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x8800, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r1, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x10000}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r2}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4000004) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="65786563203a1078e2be3a0a"], 0x8) 06:04:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x4400) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r2, 0xd23, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5310}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x2400c810}, 0x4008000) iopl(0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000200)=0x4) write$apparmor_exec(r3, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:44 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:44 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000c80000000000"], 0x8) r1 = msgget$private(0x0, 0x300) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000040)=""/31) 06:04:44 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000006626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:44 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x2) 06:04:44 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x104c0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x5c}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e23, 0x81, @dev={0xfe, 0x80, [], 0x1d}, 0x1}}, 0xfffffffffffffffc, 0x8}, 0x90) mlockall(0x2) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:44 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="afc99eeb7a764f74"], 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000240)={0x0, 0x7}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000002c0)={0x0, 0x3f, 0x66, 0xffffffffffff0001}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000080)={0x4, 0x2, 0x1, 0x3, r3}, &(0x7f0000000340)=0x10) r5 = getgid() setfsgid(r5) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r4, @in={{0x2, 0x4e22, @local}}, 0x1, 0x1ff}, &(0x7f0000000200)=0x90) 06:04:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:44 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:44 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000007626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = dup(r1) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) write$P9_RGETLOCK(r2, &(0x7f0000000080)={0x23, 0x37, 0x1, {0x1, 0x1f, 0x10000, r3, 0x5, 'proc/'}}, 0x23) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r4, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:44 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0xa) 06:04:44 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000009a80)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000009b80)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000009bc0)={'bpq0\x00', r2}) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:44 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x6) 06:04:45 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80800, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x3, 0x1, 0x5}, 0x10) 06:04:45 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000200626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:45 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="65786563203a060a"], 0x8) 06:04:45 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:45 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x7) 06:04:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10001, 0x30100) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="12ee6563003a3a0a"], 0x8) 06:04:45 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000400626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:45 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x3, r1, 0x1c, 0x0, @in6={0xa, 0x4e24, 0x7ff, @local, 0x2}}}, 0xa0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:45 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x20000048) 06:04:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="65786563203a3a0a2cb27e3141cc9a2006754fba435c0300a69e7645015a3a03c9c61fbeffa99fbaa23ab2f3f5f5fc591f0cbc478143535aca881be210"], 0x8) 06:04:45 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000500626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:45 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="af06b4d2803a1281"], 0x8) 06:04:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400080, 0x0) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000080)=0x48df) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:45 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0xd) 06:04:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:45 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x4e21, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0xfc0004) r2 = accept4(r1, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xb) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080), 0x4) recvmmsg(r2, &(0x7f0000000280)=[{{&(0x7f00000002c0)=@in, 0x80, &(0x7f0000003600), 0x0, &(0x7f0000003680)=""/210, 0xd2}}], 0x1, 0x0, &(0x7f0000004480)) write$apparmor_exec(r0, &(0x7f0000000100)={"6578d95163205d978839c1681a5d586156cf8df7ffae96b9406e433a89d5aa4b0e170ba0cefb68c32ae2f04f518d0f0cc16665ef090000000700000060", "59e0b9266524b041c293b7"}, 0xfffffffffffffece) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0xa22df2320895bb3e, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0385720, &(0x7f0000000180)={0x0, {0x0, 0x989680}, 0x5}) 06:04:45 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000003626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:45 executing program 3: r0 = signalfd4(0xffffffffffffff9c, &(0x7f0000000000)={0x6f7fb04d}, 0x8, 0x800) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x0, r1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = dup3(r3, r0, 0x80000) ioctl$KDGKBLED(r4, 0x4b64, &(0x7f0000000180)) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000140)) r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r5, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:45 executing program 5: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000140)={{&(0x7f0000000080)=""/179, 0xb3}, &(0x7f0000000000), 0x4}, 0x20) 06:04:45 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000005626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:45 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0xe) 06:04:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='(8r'], 0x8) 06:04:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:45 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x11) 06:04:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:46 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000600626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a06ae5a22ea6392d50b8d59b37b1456f03a0a"], 0x8) 06:04:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:46 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', '::\n'}, 0x9) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:46 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x5) 06:04:46 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x9) 06:04:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:46 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000300626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:46 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x10) 06:04:46 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x20, 0x80) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000080)={0xffffffff80000001, 0x7f, 0x4, 0x476, 0x10001, 0x4}) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [{0x20, '/dev/input/mouse#\x00'}, {0x20, 'trusted'}, {0x20, '/proc/thread-self/attr/exec\x00'}], 0xa, "9c56ca594cabc6abd23500fb5bc8202a80930f099bde457fc3dd"}, 0x5d) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) [ 1804.945070] __bpf_mt_check_bytecode: 10 callbacks suppressed [ 1804.945077] xt_bpf: check failed: parse error 06:04:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fstat(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000000)='./file0\x00', r3, r4) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:46 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000020626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:46 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0xb) 06:04:46 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x104c0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x5c}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e23, 0x81, @dev={0xfe, 0x80, [], 0x1d}, 0x1}}, 0xfffffffffffffffc, 0x8}, 0x90) mlockall(0x2) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:46 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', 'em1vboxnet0keyringlowlan1%\'\x00'}, 0x22) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="667865ef13a1fb8fddacec20462263bf3c"], 0x8) [ 1805.200770] xt_bpf: check failed: parse error 06:04:46 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0xc) 06:04:46 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000060626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:46 executing program 3: socketpair$unix(0x1, 0x8000000000000005, 0x0, &(0x7f00000000c0)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="65786563023a880a"], 0x8) 06:04:46 executing program 0 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:46 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x4) [ 1805.414058] FAULT_INJECTION: forcing a failure. [ 1805.414058] name failslab, interval 1, probability 0, space 0, times 0 [ 1805.442421] xt_bpf: check failed: parse error [ 1805.461676] CPU: 1 PID: 13419 Comm: syz-executor0 Not tainted 4.19.0-rc8+ #296 [ 1805.469066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1805.478936] Call Trace: [ 1805.481568] dump_stack+0x1c4/0x2b6 [ 1805.485228] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1805.490437] ? mark_held_locks+0x130/0x130 [ 1805.494708] should_fail.cold.4+0xa/0x17 [ 1805.498802] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1805.503942] ? __lock_acquire+0x7ec/0x4ec0 [ 1805.508195] ? find_held_lock+0x36/0x1c0 [ 1805.512277] ? graph_lock+0x170/0x170 [ 1805.516106] ? graph_lock+0x170/0x170 [ 1805.519927] ? mark_held_locks+0x130/0x130 [ 1805.519950] ? find_held_lock+0x36/0x1c0 [ 1805.519972] ? __lock_is_held+0xb5/0x140 [ 1805.520004] ? ___might_sleep+0x1ed/0x300 [ 1805.528295] ? arch_local_save_flags+0x40/0x40 [ 1805.541085] __should_failslab+0x124/0x180 [ 1805.545348] should_failslab+0x9/0x14 [ 1805.549167] __kmalloc_track_caller+0x2d0/0x750 [ 1805.553857] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1805.559155] ? rcu_bh_qs+0xc0/0xc0 06:04:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x3) 06:04:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$getreaper(0x9, &(0x7f0000000000)) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) [ 1805.562804] ? find_vpid+0xf0/0xf0 [ 1805.566360] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1805.571915] ? proc_pid_attr_write+0x198/0x540 [ 1805.576519] memdup_user+0x2c/0xa0 [ 1805.580086] proc_pid_attr_write+0x198/0x540 [ 1805.580109] __vfs_write+0x119/0x9f0 [ 1805.580132] ? check_preemption_disabled+0x48/0x280 [ 1805.588260] ? proc_loginuid_write+0x4f0/0x4f0 [ 1805.597852] ? kernel_read+0x120/0x120 [ 1805.601758] ? __lock_is_held+0xb5/0x140 [ 1805.605850] ? rcu_read_lock_sched_held+0x108/0x120 [ 1805.610890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1805.616442] ? __sb_start_write+0x1b2/0x370 [ 1805.620792] vfs_write+0x1fc/0x560 [ 1805.624360] ksys_write+0x101/0x260 [ 1805.628115] ? __ia32_sys_read+0xb0/0xb0 [ 1805.632200] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1805.632226] __x64_sys_write+0x73/0xb0 [ 1805.632249] do_syscall_64+0x1b9/0x820 [ 1805.645469] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1805.645489] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1805.645510] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1805.661426] ? trace_hardirqs_on_caller+0x310/0x310 [ 1805.666480] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1805.671557] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1805.676628] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1805.681516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1805.686727] RIP: 0033:0x457569 [ 1805.689948] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:04:47 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000008800626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:47 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x141200, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="65786563203a3a0ac8bc107b7bf6e79610463825933ed2056be7d9b06c12af9bf35e70c9150a22ab6aa4a4b7dd2b874732d6777c3bcba88bc09494a68d5335e536a1de165b1c087531992fba79d89bc7"], 0x8) [ 1805.708867] RSP: 002b:00007f59ded12c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1805.716596] RAX: ffffffffffffffda RBX: 00007f59ded12c90 RCX: 0000000000457569 [ 1805.723880] RDX: 000000000000003c RSI: 0000000020000000 RDI: 0000000000000005 [ 1805.731161] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1805.738452] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f59ded136d4 [ 1805.745733] R13: 00000000004c54ee R14: 00000000004d8e08 R15: 0000000000000006 06:04:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x200000000400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="65786563208aa0d7d0fcf9a0739c984b2a15a4714b380f7ab8baf0fdf69cb1da443e215cffbb1b701b481daf50f6b1c14d796e6d9c7d78b14f732c9d5ceaf320063900000000000000"], 0xffffffffffffffb0) [ 1805.820031] xt_bpf: check failed: parse error 06:04:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r2, 0xe}}, 0x10) 06:04:47 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000006000626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:47 executing program 0 (fault-call:3 fault-nth:1): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="65788163123a3a0a"], 0x8) 06:04:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="65786563203d3a0a6e770d602c5e717817b38972a849d8ffff0a8101c7d0233a2e370900000000000000000000002d67d18ca6dbb63eb2ad8ff2dc30b512fd99933702eac8ed89ea6bde6096afd8cff3"], 0x8) fstat(r0, &(0x7f0000000000)) epoll_create(0x6) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000180)=0x1c) accept(r1, &(0x7f00000001c0)=@ipx, &(0x7f0000000240)=0x80) 06:04:47 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '/proc/thread-self/adtr/exec\x00'}, 0x22) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0x4f5d, 0x401, 0x20, 0x1, 0x7f, 0x7cd8, 0x1, 0x6e35c5d6, 0x5, 0x9}) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x8) [ 1806.011191] xt_bpf: check failed: parse error 06:04:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:47 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000001100626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0xfffffffffff7ff00, 0x81, 0x7ff, 0x80, 0x0, 0x1, 0x0, 0xa, 0x2, 0x800, 0x8, 0xbdf, 0x7defd368, 0x20, 0x3, 0xfff, 0x3, 0x8, 0x8, 0x44be, 0x8001, 0x1, 0x10000, 0x9, 0x3f, 0x0, 0x6, 0x100000000, 0xe5, 0x400, 0x81, 0x6, 0xfffffffffffffffe, 0x1ff, 0xffffffffffff3e76, 0x1ff, 0x0, 0x7, 0x3, @perf_config_ext={0x4}, 0x118, 0x9, 0xfff, 0x0, 0xb9, 0x80000000, 0x6}, 0x0, 0xd, 0xffffffffffffff9c, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="6e046498e9fe3f4f2f703a784713f2b43c03"], 0xfffffffffffffc92) 06:04:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000300)='=:\n', 0x4000005) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4802000}, 0xffffffffffffff2a, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r2, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1000}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x122e}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3ff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x5c}}, 0x8800) pipe2$9p(&(0x7f0000000000), 0x4000) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000280)=0x1000) 06:04:47 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', 'exec '}, 0xfffffffffffffdf4) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x1) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040)=0x5, 0x4) 06:04:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '&:\n'}, 0x3c) 06:04:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x202) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001840)={0x0, @empty, @local}, &(0x7f0000001880)=0xc) sendto$packet(r2, &(0x7f0000000280)="bef07f31ce3cb664c52d7c697004229f2b9057b94b33db8d225df70649a777a10ab8489a7fc5e800376af1c6fa4e9a3e477204000000451e631f05913549faefd92ee9e4da26b7b2b3e019b31684b66d946a508544e74f3bc0b7f83621be6deb80cb8e5d7b9fe545f92f7c8d09ea3afb4e070bb9371c7a2e424fa911429a5883a98c1cc980c480984f152e5ba62664c7456cd0", 0x93, 0x200480c0, &(0x7f00000018c0)={0x11, 0x17, r3, 0x1, 0x8b0, 0x6, @broadcast}, 0x14) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) [ 1806.343407] xt_bpf: check failed: parse error 06:04:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '=:\n'}, 0x3c) 06:04:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000180)) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="657865da48eb937378e8ffe4b1007e94c748239f77edc20f99e009afa4c9ed0000003d3a0a47df616e3c5e3c7cb1cf56b4c5f3717ab2c14576e96ac680ce5b7170f2836fb3d76a926a4eb77d49dee89bbb68da26fe94fc809a8163d0b14e113ea7bb7d1ed853f29b6b73b355128653522b88b134b007326fbae5d5b3958f5b6cd81e6b6d240f9eef8a63d2dd3e62352f4a8aa79b61933cfdc53d1ab6ee790151"], 0x25) 06:04:47 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="65786563203a3a0a69086a94aa766bdfefbba1d8a3cbf5ca1a234958a08d6315ea7956a3c05a3016c0bd861f990eb83c94e1ff33412fa09df3c00cc52dc24ca43e0a0ef0f090538f19342becdfbe16c510bdca3af35cd3ab8474"], 0x8) 06:04:47 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000011626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:47 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='exec\x00::\n'], 0x8) 06:04:48 executing program 3: socketpair$unix(0x1, 0x8, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x480000, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80081, 0x0) accept4$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:48 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000240)=ANY=[@ANYPTR], 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000140)=0xb) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r3 = inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000000) inotify_rm_watch(r2, r3) 06:04:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:48 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fe) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="060000200000"], 0x1) 06:04:48 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000700626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:48 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x200000) recvfrom$inet6(r1, &(0x7f0000000080)=""/205, 0xcd, 0x3, &(0x7f0000000180)={0xa, 0x4e20, 0x8000, @mcast1, 0x1000}, 0x1c) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000001c0)) [ 1806.735471] xt_bpf: check failed: parse error [ 1806.740917] kauditd_printk_skb: 29 callbacks suppressed [ 1806.740929] audit: type=1400 audit(1540188288.171:214): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":&" pid=13532 comm="syz-executor0" 06:04:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', ':=\n'}, 0x3c) 06:04:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) close(r1) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:48 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='|\b\x00\x00\x00\x00\x00\x00'], 0x8) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x10001, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000140)={r2, 0x2}) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x6, 0xf60}) [ 1806.896894] audit: type=1400 audit(1540188288.321:215): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=13548 comm="syz-executor4" [ 1806.928731] xt_bpf: check failed: parse error [ 1806.967981] audit: type=1400 audit(1540188288.321:216): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=13548 comm="syz-executor4" [ 1807.055181] audit: type=1400 audit(1540188288.351:217): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":=" pid=13551 comm="syz-executor0" 06:04:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:48 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwrite64(r0, &(0x7f0000000040)="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", 0xff, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="65786563203aa961cff2feebaf3f8431ab1a586182886acf708c6113c07e92b5bc7f610d810a6951d35d148e95d0eb33713204fb418a9f807041629fa54ecdf7"], 0x8) 06:04:48 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000004626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x2000003c) 06:04:48 executing program 3: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:48 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000014009fc546d1"], 0x8) 06:04:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000080)=0x3, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={0x0, 0xfffffffffffffd1a, 0x1, 0x4f}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={r3, 0x3, 0x2, [0x8, 0x40]}, 0xc) write$apparmor_exec(r2, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) [ 1807.181526] audit: type=1400 audit(1540188288.611:218): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=3AA961 pid=13577 comm="syz-executor5" [ 1807.189625] xt_bpf: check failed: parse error 06:04:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:48 executing program 5: r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x80000) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @loopback}}, [0x5, 0x4, 0x0, 0xe21a, 0x3, 0x2, 0x3da6, 0x7fffffff, 0x6d, 0x7ff, 0x5, 0x1, 0x2, 0x2]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000200)={r1, 0x3, 0x0, 0x7, 0x9}, &(0x7f0000000240)=0x18) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:48 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000005626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:48 executing program 4: getpeername(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000000)=0x80) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0xd3, "619d46b2d0998643a11b620c523da86fc93044b9b1175f82aa1f21da1678779e56ce508158584d3d584e97920790c94af6ea8d5631db20a490fead1a8b86d980eacff57ec61dc5a0bb37ef1043ee91010cbc6554781809c5e7cf5a2ec42819e5b9d7a23ff625845f2dc9d8b73cc0c5968e7bd18e301ab8e7a0843e3a10dd629b1e5c01be8eff6dd97348300564a532df362ca51bc8442d2985b9e79887bb235bac5029ceb33c7569ac7334d870108515ce30209cadbd0d0cdf176aa39dcf8d8bf3039be7ffdb428f843cd74a28f0974e25b08d"}, &(0x7f0000000200)=0xdb) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000280)={r1}, 0x8) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x8) 06:04:48 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) [ 1807.438371] xt_bpf: check failed: parse error 06:04:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:48 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000540)='/dev/admmidi#\x00', 0x5, 0x20400) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x310}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xf4, r1, 0x300, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @remote}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @loopback}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffff}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x24000000}, 0x800) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) io_setup(0xff, &(0x7f0000000100)=0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x2000, 0x0) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x80001, 0x100) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x200000, 0x0) r8 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000740)='/dev/qat_adf_ctl\x00', 0x400, 0x0) io_submit(r4, 0x7, &(0x7f00000007c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x225d, r3, &(0x7f0000000140)="5d509ac75b40107d331b2b30a9f98ccf93ec397e75e8d5ff53de99bbc6227b55244735b8b75143f26ee2", 0x2a, 0x0, 0x0, 0x0, r1}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x1, r3, &(0x7f00000001c0)="d1bd04d01ec42e54af45b4ab4b49c40c9482fa7e2b1807bc48e03e7af88fcab725fef3922470e481bc0ac415e5e802b3ea7c6c38fb5f9312b974cefc7e3d506172a5", 0x42, 0xe92, 0x0, 0x3, r5}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x7, 0xfff, r3, &(0x7f00000002c0)="396a1fb1637f687f0c417eafbfaae094672e3aedc6e49bfcaa181d7bea385afedce9c4514aa6ea55f5469fd7fedef2c25f23288ea5766cbb893ececff8520349f9f71ceebe23f0b53ab927cc0c4bcc7bc168206e947a7a4e0c46314d4ba8b64756f3964781bac86f52c9c964aec367fe22bc6af13f07b2d47162382d8d", 0x7d, 0x1, 0x0, 0x0, 0xffffffffffffff9c}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0xf8b3ec8ef6c16e2e, 0x9, r2, &(0x7f0000000380)="35d422e3042e058ec312944247602316a14ce19777b43371220ba3a013925f1d69869f73780f62a53dd75d1191ea7f3a145febd550cd934d66667ea640c3b1a84eebb7b46c283bea6956c23168369f6c55a4cc9c314c49", 0x57, 0x1, 0x0, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x7, 0x625, r2, &(0x7f0000000440)="1f6ff8c8b91e812741c3bab4cb645d85c6c852512895d09741aab4ea76055dab1c48cb8e46ab83d9b542b0c4538044bee001d3decb3b7d87121ff5ff3c89f043fccc7a7245025ac2eea42ac34c410fd48a0e85b18c3fd0a55e3930b9c6c2c35ad76358caa923612a53cb1302339177f5547e1887883316c71fc6336b31b30281", 0x80, 0xffffffff, 0x0, 0x2, r6}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x2, 0x4, r2, &(0x7f0000000540)="c5943f42d2f6da2447471faaa1808b7613e63eb7254dc2efcd34aadaf58fae55835861717537c46b092320776716c7d64b6ebb461ee14c5c417bd469ab2880353855639aa9541150dd97935e31398057152cdc", 0x53, 0xffffffffffffffac, 0x0, 0x1, r7}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x7, 0xffffffffffff6d65, r0, &(0x7f0000000640)="320ae7a851e272d6eca8be515aeff0a7a9d98c2669e4dcdeba62e098ec7145a707e86a99050a93d4e420cf77c42966c1d7fb59c3dc27cbaa8ee1cc8d35703620650c8c731e80aa5ec005f080d4b5e17e60063d8f654cda7bcdeb9a1df0866626d82643efc210a81fbe0b5fd313632e9ddc1cacdfa0c4ab9e7d323252e2974e91b71c3434835c6c3960c4e7285c7b340d70e1616b9a464f07b124c0a489f50b87a9c33df66853edf18c96affb1c5be39a89f9ef2c390768d685be4c53513821e1468e400a14a3a4906801e67b62d03fe7fded6fe1594ff6b07c41cbc6834fb99e01d24d13b733", 0xe6, 0xbe8, 0x0, 0x3, r8}]) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f0000000000)={0x0, {0x0, 0x0, 0x0, 0x0, 0x6}}) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:48 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x42, 0x0) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000080)) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:48 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000256f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="65786567203a3adbe72ee3dafd9f2fe8802ebbd5d33a800a"], 0x3c) [ 1807.631178] audit: type=1400 audit(1540188289.061:219): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=13622 comm="syz-executor4" [ 1807.673076] audit: type=1400 audit(1540188289.081:220): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=13625 comm="syz-executor0" 06:04:49 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x18) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000080)=""/2) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="657865632095b8aa931b8c4414a0463b3a3a0a3b4d30c852b3a1"], 0x8) 06:04:49 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="b8161a8a0de58465786563203d3a0a"], 0x8) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x6, 0x480000) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) [ 1807.725969] audit: type=1400 audit(1540188289.151:221): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=95B8AA pid=13633 comm="syz-executor5" 06:04:49 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x6) 06:04:49 executing program 0: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="65786563203a3a0a76602b13119682d15a6de17146442ac00184428610f217437895234d45531b1dc3c0239e3c58ef3ffa74be65a5522b6203520dfed732a6a7acf33e928fef72706db36fad712cc28eac528b8938196de098cd8308c61d8387a0a93acc652659b42ed6661d81d66e14e499b0674de8a962623838343ed2d3f92fda23063de28c2f62934640ba4c2844f35055bd1bbe01d296fc4c2d193b10098ebc09444315e937a241008701fbc8f14c80285fa87ab945c172ea1eef5ec9e473b52d075d7f63794f5b04a9c2e8c705add59c2789cc381f13f9940c6f135b56e5b41754e23aa8"], 0x3c) 06:04:49 executing program 3: socketpair$unix(0x1, 0x2000000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:49 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000006626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:49 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="000000a9c6a13a00000000"], 0xfffffd1a) 06:04:49 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x202, 0x0) ioctl$UI_DEV_CREATE(r1, 0x5501) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) [ 1807.967644] audit: type=1400 audit(1540188289.391:222): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A76602B13119682D15A6DE17146442AC00184428610F217437895234D45531B1DC3C0239E3C58EF3FFA74BE65A5522B6203520DFE pid=13647 comm="syz-executor0" [ 1808.025922] QAT: Invalid ioctl [ 1808.054223] QAT: Invalid ioctl 06:04:49 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000007626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) [ 1808.080439] audit: type=1400 audit(1540188289.491:223): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=13655 comm="syz-executor4" 06:04:49 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xffffffffffffffff, 0x1) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) setsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000080)="9228761b2d5ac25898a6b244cf44c6f8ade4134aa0274d2428cdd064", 0x1c) getuid() ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x0, 0x2, 0x0, [], [{0x7fffffff, 0xa56f, 0x8, 0x110b9114, 0x9, 0x1}, {0x0, 0x7, 0x6, 0x5, 0x6, 0x8}], [[], []]}) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000008cda27bf0d909e7fec00a5bbb115db0c38641a02be2ef4d04b809d131c2379c0c8ecb355ebaec4669be33df1e2bb263bb1156f25a94"], 0x8) 06:04:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='e8ec ::\n'], 0x3c) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e24, @remote}}) 06:04:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000012c0)=0x2, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/connector\x00') setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000180)={0x705f2f55ab525653, @dev={0xac, 0x14, 0x14, 0x10}, 0x4e24, 0x2, 'lblc\x00', 0x1, 0x81, 0x62}, 0x2c) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x9}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000280)=ANY=[@ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000140)=0x1008) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001300)={r2, 0x200, 0x9, [0x7de9, 0x100000000, 0x3, 0x1, 0x1f, 0x1, 0x3675, 0x6, 0x8]}, 0x1a) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={r2}, &(0x7f0000000200)=0x8) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="9ba3c43fb74000c9ffff0000000000000100"], 0x8) 06:04:49 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '=:\n'}, 0x8) 06:04:49 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000060626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000001580)=ANY=[@ANYBLOB="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", @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES32=r2, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB="d8d95fe63ab0f07bef99d8fffb0b3bbe2bffba10448151bbe9a6a52e0c13cbf4840f49f4f18111ad5c7eae247310a487b32e4b3cbcd0b4bb8b4bf1024c9b196254261f41d8ca3747adc641f669ee78cfca5d21e954482c8d035a90f61ba05350af653da579af942b07c9d40309c3d7c468137f45bed2062f39f0f754e02c16a074f7"]], @ANYRESDEC=r1, @ANYPTR=&(0x7f0000001500)=ANY=[@ANYRESHEX=r0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRESOCT=0x0], @ANYPTR64, @ANYRES16=0x0, @ANYPTR=&(0x7f0000001480)=ANY=[@ANYPTR=&(0x7f00000013c0)=ANY=[@ANYRES32=r0, @ANYRESOCT=r1, @ANYRES64=r0, @ANYRES64=r0], @ANYRES64, @ANYPTR64=&(0x7f0000001400)=ANY=[@ANYRES64=0x0, @ANYRES16=r1, @ANYPTR64, @ANYRES32=r0, @ANYRES64=0x0, @ANYRES16=r1, @ANYPTR, @ANYRES16, @ANYRES16=r0, @ANYRES64=r1], @ANYRES16=r0, @ANYRES32=r1, @ANYRES64=r1, @ANYRES32=r1, @ANYRESHEX=r1, @ANYRES16, @ANYPTR=&(0x7f0000001440)=ANY=[@ANYRESDEC=r1, @ANYRES64=r1, @ANYPTR64, @ANYRESDEC=r1]], @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRESOCT=r2, @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRESDEC=r1, @ANYRES64, @ANYRESHEX=r1, @ANYRESDEC=r0], @ANYPTR=&(0x7f0000000200)=ANY=[@ANYRESDEC=r2, @ANYRESDEC=r0, @ANYRESOCT=r2]]], 0x8) 06:04:49 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '=:\n'}, 0x8) 06:04:49 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x42, 0x0) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000080)) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40002, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0', [{0x20, '/proc/thread-self/attr/exec\x00'}], 0xa, "5995a7421f8c5a9d8077714ec53ad4d80e40fda9"}, 0x3c) 06:04:49 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000003626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:49 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x2140, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1d, r1}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)=@canfd={{0x4, 0xc62a, 0x3, 0x8001}, 0x3b, 0x2, 0x0, 0x0, "e839297afc1fc7724b8d21e7378ae24d0f16b9a03a841ddd9dbabf62680e9e3da37f131d8ccd1dc29973a8b42b8076b909e32682688a1879fea6b249968f8d73"}, 0x48}, 0x1, 0x0, 0x0, 0x40080}, 0x1) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:49 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x4000) r2 = eventfd(0x7) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000080)=r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="657851e9c5563a0a"], 0x8) socket$key(0xf, 0x3, 0x2) eventfd2(0x3f, 0x800) 06:04:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203e3a0a8fa81cf0ea4f0c16878f6f9d23dd4faf7ca6601c372017f7489ed79b6ed6c1d9b4968f24b13e27cc27879505e1df32b2758646b239dc4afe"], 0x3c) 06:04:50 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x430) 06:04:50 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:50 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="651172aa0cb8f561ff7865632000"], 0x6) 06:04:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000040)={0x0, @aes128, 0x1, "d8120a1f6bd8dc4d"}) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) r1 = syz_open_dev$adsp(&(0x7f0000001340)='/dev/adsp#\x00', 0x5, 0x101402) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000001380), &(0x7f00000013c0)=0x4) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=[&(0x7f0000000040)='mime_type!\x00'], &(0x7f0000000280)=[&(0x7f0000000100)='/proc/thread-self/attr/exec\x00', &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', &(0x7f0000000200)='\x00']) sendto$unix(r0, &(0x7f00000002c0)="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", 0x1000, 0x20000000, &(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x8) 06:04:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:50 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000011626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:50 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfd24) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2500, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000100)) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000080)) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) write$apparmor_current(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="737461506ba00082dbd4cdf81de6fcc1058f75f43483f1161f6782c4ef85e98ffc04f0f6a86bf0d54555da389b66088d8c44bdbf05ee60a47a700704ec2ffd402d18702308dfa8afcbbbd61a2a344632aae5b3a64dd7ff030000000000001e906e24a871bbd233d9bbed6eafd1aa646b1cad736b6b040627"], 0x7) 06:04:50 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000040)=0x400) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x8) 06:04:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x480100, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x8001, 0x24200) fanotify_mark(r2, 0x4, 0x0, r3, &(0x7f0000000100)='./file0\x00') 06:04:50 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000088626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="4fdfceb02156a712aed2c7bdf9150d7f11862f3ac5136d0ad206f7676e99a09b2d835e84a2000000000000000000000000"], 0x3c) 06:04:50 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:50 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '=:\n'}, 0x8) 06:04:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x10000, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000340)={0x0, 0x7ff}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000003c0)={r2, 0x6}, 0x8) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="9fcff2261c3229e4e7a0b702c92339b76e69d77148f3"], 0x8) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f00000002c0)={0xb39, 0x7, 0x0, 0xfffffffffffffffb, 0x4, 0xffff}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000200)={0x100000001, 0x8000, 0x0, 0x8, r5}, &(0x7f0000000280)=0x10) 06:04:50 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:50 executing program 4: socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x10000, 0x80000000, 0x0, 0xbb6a, 0x3, 0x7, 0x3, 0x2, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0xe92, 0xa3dd, 0x2, 0x3, 0x14, 0x8001, 0x9, {0x0, @in6={{0xa, 0x4e23, 0x53, @loopback, 0x9}}, 0x7, 0x7, 0x6, 0x7, 0x1}}, &(0x7f00000001c0)=0xb0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000280)={r1, 0x3, 0x401, 0x8, 0x7, 0x3, 0x1, 0x5, {r2, @in={{0x2, 0x4e23}}, 0x100000001, 0x80, 0x3f, 0x4, 0xe5}}, &(0x7f0000000200)=0xb0) socketpair(0x0, 0x1, 0x7, &(0x7f0000000400)={0xffffffffffffffff}) write$9p(r3, &(0x7f0000000480)="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", 0x1000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000340)=[@in6={0xa, 0x4e22, 0x80000001, @dev={0xfe, 0x80, [], 0x20}, 0x8}, @in6={0xa, 0x4e20, 0xff, @dev={0xfe, 0x80, [], 0x12}}, @in={0x2, 0x4e21}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}, 0xb55a}, @in={0x2, 0x4e21, @rand_addr=0x8000}], 0x94) fcntl$getownex(r0, 0x10, &(0x7f0000000440)) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r4, &(0x7f0000001480)=ANY=[@ANYBLOB="6578656320000000bd239c3ba07b2b9f0723a71999d4e84e5bdeb7cd51b203541980c2b905fe6ab9e62d587ca5b5af3bb36a00000000000000000000000000"], 0x36) 06:04:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="657865630800000012b40540848d68b5ecd274c96638ae802e99dec8f3d7c4d35467403f55b99c92981c7eb4dccc3cce990227"], 0x3c) open_by_handle_at(r1, &(0x7f0000000100)={0xd7, 0x5, "163c361fbf0fe0435fc0f17296760e0ed402d3880aed9e5fb04b1429fcba9d3ae4947d0669ec890dcc036129ee588d254ab860713b09f6bc2dbe7cb0eed2d3bfc69a529d48ce7375f6c34aab125e750800d34cf566fab317188ae2a0fa4187d995c71e7c7023f7c5db9dc91773712115ef58f4595e32fab5b10df180dc1da8c55da74e3db880d1c8ae0343a625d8bb125bafe2aa1939595bcf302d555a847ea466e36702af37b1617545cba4fe452453e8df42eb3debf79b51aca9a682a965102141ccb1e6b5f02779a10e309a446a"}, 0x0) 06:04:50 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000002626f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101180, 0x0) write$P9_RXATTRCREATE(r2, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:50 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x88003, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:51 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e0000000000000000000a6f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:51 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', "e95247e7ca1c624c0000"}, 0xfffffffffffffd01) 06:04:51 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f0000000100)=""/142, 0x8e, 0xffffffffffffffff}}, 0x10) r2 = getuid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = dup3(r0, r0, 0x80000) setsockopt$netlink_NETLINK_RX_RING(r4, 0x10e, 0x6, &(0x7f0000000400)={0x6, 0x10001, 0x1, 0x9}, 0x10) fchown(r0, r2, r3) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r1, 0x4) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r5, 0xc0a85322, &(0x7f0000000340)) syz_open_dev$rtc(&(0x7f0000000440)='/dev/rtc#\x00', 0x4, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="f530000000000000"], 0x3c) 06:04:51 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000080)={0x5, 0xffffffffffff0000, 0x8, 'queue0\x00', 0x2}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:51 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000000)='::\n', 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:51 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000256f6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:51 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:51 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x80800) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0xb6b}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r2, 0xc2c4, 0x4, [0x10001, 0xe6, 0x0, 0x56]}, 0x10) tee(r0, r0, 0x4, 0x6) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x40000, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000340)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000480)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) r7 = gettid() fstat(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getpgrp(0x0) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() r13 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000800)=0xe8) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r3, &(0x7f00000009c0)={&(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000280)="772044ed8e1b7dcac95cfc3c9c3fbc823a9660f0c3e156dc72a1b936320cbd258a507e7abd306f316e1ef4ce112652e498f81a741fd8ce64cbbf6710ad373766f85b1eeb96934fa421c7fc7d681b45874a27edde9310a2a727290ee8d8dec52b41c2a011cafe753cbcc00bc98961be3dc42e0982a96bf2b6539bd7b01c1e3d304a9c80640c0790fe83080bbf84d58f037f6891f3bebde07492d3c44a5cf6b618a422cb99e9fee8a1b2afa18314b1187f56c15dfa2d056b", 0xb7}], 0x1, &(0x7f0000000900)=[@rights={0x28, 0x1, 0x1, [r1, r0, r0, r1, r1, r0]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}], 0xa8, 0xc091}, 0x4000004) 06:04:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipx\x00') setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000040), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000100)=ANY=[@ANYRESHEX=r1], 0x1) 06:04:51 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:51 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x80000) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)={0x0}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000440)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x4e21, 0x43, @dev={0xfe, 0x80, [], 0x20}, 0xffffffffffffffc1}]}, &(0x7f0000000480)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000500)={r4, 0x10, &(0x7f00000004c0)=[@in={0x2, 0x4e24}]}, &(0x7f0000000540)=0x10) r5 = mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x12, 0xffffffffffffff9c, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000400)={0xd8, 0x0, &(0x7f0000000280)=[@enter_looper, @release={0x40046306, 0x1}, @increfs_done={0x40106308, r3, 0x1}, @transaction_sg={0x40486311, {{0x4, 0x0, 0x2, 0x0, 0x10, 0x0, 0x0, 0x38, 0x20, &(0x7f0000000140)=[@fda={0x66646185, 0x1, 0x2, 0x40}, @fd={0x66642a85, 0x0, r0}], &(0x7f0000000180)=[0x78, 0x68, 0x38, 0x78]}, 0x5}}, @exit_looper, @free_buffer={0x40086303, r5}, @reply_sg={0x40486312, {{0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=[0x20]}, 0x81}}, @release={0x40046306, 0x3}, @acquire={0x40046305, 0x1}], 0x48, 0x0, &(0x7f0000000380)="ecaa9ec1dd00bf0e9b6db4174d6262402ac683a8330a2d698f36af731715bcb0120e6cd323ec8e8045b616e20bf22bf0367fe936481b14b53b74aea9f6cd1213a3faafee8c710780"}) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000005c0)={'gretap0\x00', {0x2, 0x4e23}}) socketpair$inet(0x2, 0xa, 0x100, &(0x7f0000000040)) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000600)={r3}) write$apparmor_exec(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="ffbeac0000000000"], 0x3c) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') 06:04:51 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000620a6e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:51 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) [ 1810.117997] __bpf_mt_check_bytecode: 11 callbacks suppressed [ 1810.118003] xt_bpf: check failed: parse error 06:04:51 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', "3d55021c008d8c840a"}, 0xfffffffffffffe1a) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000080)={0x2, 0x5, 0x4f0000000000000, 0x0, 0xd}) 06:04:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="0500000000000000"], 0x8) 06:04:51 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e00000000000000000062256e645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="65c59967be50b84afa7b1f98e9ef40ec7f503c76f08fd377535b9a98b415b24e19c0f3f3ea544088b06dfccbf50966d5954bfef9"], 0x3c) 06:04:51 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="b69f258f1f02657865631f1283d30e4039b05950105a003a0a"], 0x8) 06:04:51 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:51 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f00000001c0)={"7374e3f12205d261636b20", 'selflo\x00'}, 0x12) [ 1810.403250] xt_bpf: check failed: parse error 06:04:51 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f25645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:51 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) [ 1810.510589] xt_bpf: check failed: parse error 06:04:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x4000, 0x0) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000080)=0x78) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001880)='net/snmp\x00') getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f00000018c0)=@assoc_value={0x0, 0x5}, &(0x7f0000001900)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000001940)={r4, 0x8}, &(0x7f0000001980)=0x8) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:51 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="658f6563203d3a0a"], 0x8) 06:04:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:52 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f0a645f736c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:52 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mounts\x00') recvmsg(r0, &(0x7f00000015c0)={&(0x7f00000002c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000340)=""/8, 0x8}, {&(0x7f0000000380)=""/24, 0x18}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/186, 0xba}], 0x4, &(0x7f00000014c0)=""/255, 0xff, 0x500000000000}, 0x100) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000001600)={r2, 0x1, 0x6, @dev={[], 0x19}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000000)={'exec ', '::\n'}, 0x8) 06:04:52 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:52 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exeg ', '=:\n'}, 0x8) [ 1810.703870] xt_bpf: check failed: parse error 06:04:52 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f256c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20000, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000040)={0x19, 0x7, 0x1, {{0xc, 'ppp0vboxnet0'}, 0x3af}}, 0x19) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="65786563203a3a0a8e736df9be5c7537fc11d91579900ba685477d4c582483e3b76416ccf168e45e4e29b168ed0fc751cddb9f57d1b4359f836aba2a9eee9cc10d7a6267d0bf73d7959c1004dc3ba59c77d79bc86a67f34f64f12a4fe5908fb7f4436b0b4b"], 0x3c) 06:04:52 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x20000, 0x0) r2 = accept4(r1, &(0x7f0000000280)=@in={0x2, 0x0, @multicast2}, &(0x7f0000000200)=0x80, 0x800) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000100)={0x1, {{0xa, 0x4e21, 0x8, @mcast2, 0xcc5}}}, 0x88) 06:04:52 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) [ 1810.838161] xt_bpf: check failed: parse error 06:04:52 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x430) 06:04:52 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x80, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000300)={0x80000001, 0x1ff, 0x1ff}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x400c00, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f00000003c0)=0xf4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000400)={r3, @in={{0x2, 0x4e20, @loopback}}, 0x4, 0x8, 0x8, 0x4, 0x6a}, 0x98) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0x9c, "2c5f29594ee921f11110e19f608a626a470834c2ded3b549bba1010526e98787031d4bc3c96c529e8b6ab220ddb7746f62c01586efac2c008933c16e8a99f2cd375f31cf0dd3e436330924cf884f9f559c081ebb7006a64315ceda40de635d38277564b0ffa57bc88b8c656c162acbaaa337c20dae621b99166b34f3bffcd5a60c4dd6ad8d22a630a26e8a281a6b33b443b228ee88313e5c7de77e79"}, &(0x7f0000000200)=0xa4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000280)={r4, 0x9f, 0x6, 0x3, 0x7fff, 0x1}, 0x14) r5 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x2) setsockopt$inet_dccp_buf(r5, 0x21, 0xc, &(0x7f0000000080)="e3e16b47d7df3f036c083cdde4e17b524501c3751994d09ef0b0d32748c483d71279bc810c64d696de1e928085f70f8050015e6cd2f00b22b5ef47a587ad75a0f69f6d82d0996e275e4b7524fb1f238110a35d786a645a7f5d274b0bcefae3a1354f6df73e21510c00b2de9f39c4ca3348f92d2af6c6a364da41abe2e4", 0x7d) 06:04:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={&(0x7f0000000080), 0xc, &(0x7f0000000900)={&(0x7f0000000940)={0x14, 0x16, 0x201, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000001dc0)=[{{&(0x7f0000000140)=@hci, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/152, 0x98}}], 0x1, 0x0, &(0x7f0000001f00)={0x0, 0x1c9c380}) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8, 0x200) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f00000001c0)={{0x31, 0x101}, {0x0, 0xf34}, 0x4613, 0x5, 0x400}) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) [ 1811.007991] xt_bpf: check failed: parse error 06:04:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0xa8000, 0x0) write$apparmor_exec(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x8) alarm(0x3) 06:04:52 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f730a6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:52 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:52 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1, 0x80) recvfrom$unix(r0, &(0x7f0000000100)=""/168, 0xa8, 0x10100, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) [ 1811.569515] xt_bpf: check failed: parse error 06:04:53 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f73256176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:53 executing program 4: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="65786563203d3a0aec8addc8e0806079c1d14cdc624e0d671812af660abfba5eb3b2da482e44e597c23bf3a4331420bec87ae9c6059b8cce421bc193771e7cdaffe32693fd770405b776b3bb3c096a5ae03fe6b2d4923959f285bf63862561d2b9d0636daba7c0da87b5fa82e480103704d905b274e06810702f42b6267b052f4596dd"], 0x8) 06:04:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x10000, 0x0) write$cgroup_subtree(r2, &(0x7f00000001c0)={[{0x2f, 'pids'}, {0x2f, 'io'}]}, 0xa) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x9, {0x2, 0x4e22, @local}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @multicast2}, 0x100, 0x3ff, 0x4, 0x100000001, 0x3f, &(0x7f0000000080)='gre0\x00', 0x5, 0x8, 0x100}) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r1, r1, &(0x7f0000000040), 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) [ 1811.761639] kauditd_printk_skb: 34 callbacks suppressed [ 1811.761651] audit: type=1400 audit(1540188293.191:258): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":&" pid=14018 comm="syz-executor5" [ 1811.761683] xt_bpf: check failed: parse error 06:04:53 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1000, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000003c0)={0x0, 0x8}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000440)={r2, @in={{0x2, 0x4e24, @local}}}, 0x84) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) recvmsg$kcm(r1, &(0x7f0000000380)={&(0x7f00000000c0)=@ax25, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/244, 0xf4}], 0x1, &(0x7f00000002c0)=""/136, 0x88, 0x800}, 0x2001) 06:04:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x101000) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000100)={0x2, &(0x7f0000000080)=[{}, {}]}) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:53 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f732e6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) [ 1811.889038] audit: type=1400 audit(1540188293.311:259): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":&" pid=14027 comm="syz-executor5" 06:04:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0xbe}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000140)={r3, 0x3}, 0x8) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) [ 1811.962637] audit: type=1400 audit(1540188293.341:260): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=14030 comm="syz-executor4" 06:04:53 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x1, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) [ 1812.026120] xt_bpf: check failed: parse error [ 1812.037445] audit: type=1400 audit(1540188293.391:261): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=14030 comm="syz-executor4" 06:04:53 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f734c6176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x9, 0x10000) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:53 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x303, 0x40000) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x6) ioctl$KDSETLED(r1, 0x4b32, 0x10000) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) r2 = socket$can_bcm(0x1d, 0x2, 0x2) getsockname(r2, &(0x7f0000000080)=@pppol2tpv3in6, &(0x7f0000000000)=0x80) 06:04:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x3ff, 0x6, 0x8, 0x100, 0xd43}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000140)={r3, 0x1, 0x4, "12fa57c7"}, 0xc) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) [ 1812.217106] xt_bpf: check failed: parse error [ 1812.249501] audit: type=1400 audit(1540188293.511:262): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":&" pid=14046 comm="syz-executor5" 06:04:53 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f73756176655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:53 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x294040, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f00000002c0)=0x6) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x84000800}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x84, r1, 0x201, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1b, 0x4}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @local}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1e}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x80}, 0x48804) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) [ 1812.296109] audit: type=1400 audit(1540188293.541:263): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=14049 comm="syz-executor4" [ 1812.327957] audit: type=1400 audit(1540188293.551:264): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=14049 comm="syz-executor4" [ 1812.448850] audit: type=1400 audit(1540188293.671:265): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":&" pid=14060 comm="syz-executor5" [ 1812.470258] audit: type=1400 audit(1540188293.701:266): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=14065 comm="syz-executor4" 06:04:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:53 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x40380, 0x0) setsockopt$inet_int(r1, 0x0, 0x0, &(0x7f0000000080)=0x6, 0x4) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xfffffffffffffffb) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x4) write$P9_RSYMLINK(r2, &(0x7f0000000080)={0x14, 0x11, 0x2, {0x80}}, 0x14) 06:04:53 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c2576655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="868f192018dc230bc1d3ecc28786a4db4025bdf3bed237857a1432052a641800af3b789f62572a87ea61629e775c960100b7083e32826014f147e073ac228635945f1454153993243f9757c2f44b6b4caf10675a551f0d21fd520c55a03dd4afe13dbd77a7ce843f47db2edd44ebe003fbde3ce7ed37909a22cd43fe122cb894c2942ae1e1c8995da56b402782108b4ec3d61555b8"], 0x8) [ 1812.581145] audit: type=1400 audit(1540188294.011:267): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=14088 comm="syz-executor4" 06:04:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:54 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0f00000000000000"], 0x8) 06:04:54 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c0a76655f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:54 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 06:04:54 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000140)=0x244, 0x4) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000040)={{0x1d, @local, 0x4e20, 0x1, 'wrr\x00', 0x1, 0x3, 0x69}, {@loopback, 0x4e21, 0x2000, 0x6, 0x40, 0x1}}, 0x44) write$apparmor_exec(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="70c27679f74985dfe959a0e5688565471244fc7acfa9ae0a"], 0x3c) 06:04:54 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = getpid() waitid(0x2, r2, &(0x7f0000000080), 0x80000000, &(0x7f0000000100)) write$apparmor_exec(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="657863203a3a2be1ee934666af7ea23fd3714a62fc5c9d"], 0x8) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 06:04:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:54 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="657809000008e631"], 0x8) 06:04:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40002, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0', [{0x20, '/proc/thread-self/attr/exec\x00'}], 0xa, "5995a7421f8c5a9d8077714ec53ad4d80e40fda9"}, 0x3c) 06:04:54 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c61760a5f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:54 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x9}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="430000004dd3c4db32049caf9b8d4a9ae1320c3231d4b6de65c70b7d154523b916cc2ad21e43722c70b3a0137e355690fe9a8427827cef3a0db899dd9298fdc778b390768e0097c5aa1721b2c4fcce870f8b9c0e0ed4cdf6ac062971ecacef8805542b4f008d0ca67d4f4d9dd6c74b928bedc504150f64fd4f6d84f7db284dfd72e2ae1ce79e6cae60025841681c711e9c3f103fe86c3347b5c648673bdd991f0ca71596f71c4923744845cd1b47d447f1670459628855dad38b51c49885e99c34ad6fa95512fb0dd170810f40ceaa5a2cf34f27d5fccfc1df7a1fd2766926f44f4f0ea6b09dba8a418adbb2"], &(0x7f00000001c0)=0x4b) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000280)={r1, 0x3848000, 0x2, 0x3, 0x9, 0xfffffffffffff0fb, 0x1, 0xab05, {r2, @in6={{0xa, 0x4e20, 0x9, @empty, 0x4}}, 0x4, 0x3, 0x2, 0x3, 0x3f}}, &(0x7f0000000200)=0xb0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r4, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:54 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x40, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f00000002c0)={0x5, 0x7, [{0x1, 0x0, 0x20}, {0x2, 0x0, 0xa5d}, {0x3ff, 0x0, 0x2}, {0xfffffffffffff4f5, 0x0, 0x5}, {0x20, 0x0, 0xffffffff}]}) r2 = dup(r0) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000200)={0xe, 0x4, 0x6, 0x9, 0x56, "e1478937bb2ba075994ba01b8bca8cc6babd38735ebe3baca3eed7af114b65802e4f6f1b2f732a894527cff3538e2af0de88a2bd506177f58ec08de4728c9990e28181fff4aeef0792f9f21af0b5059fe73683f6d387"}, 0x62) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0xffffffff}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000140)={r3, @in={{0x2, 0x4e24}}}, 0x84) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r4, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 06:04:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40002, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0', [{0x20, '/proc/thread-self/attr/exec\x00'}], 0xa, "5995a7421f8c5a9d8077714ec53ad4d80e40fda9"}, 0x3c) 06:04:54 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', '=:\n'}, 0xfe12) 06:04:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = semget$private(0x0, 0x0, 0x201) semctl$GETVAL(r2, 0x1, 0xc, &(0x7f0000000040)=""/79) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:54 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1104) pkey_alloc(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="65786563888bc8934496dee8db5012a475f6aed0ce992e34cd630e46919e8cdd4b5b30be45e2aba3866a79276f1f314fbb1f1f992390cdc15ce2c5b27ef7c5b2a87f426f18fb4e1b625b53327f83222510923e491e31cda3275a2b45673c94be8d121d7c018332c13186a8b6ce2641963960be047ab6bca124fcb158631448888e60663a362e7748afbd410f572dae72b635571682fba25cc7253588ad62f7a645233cee326a07a08f5487f96a3ed90eab22cb7bb5cabd9c625f87f2a2b16a00d31c5451b52691c251360fac36892a3c"], 0x8) 06:04:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40002, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0', [{0x20, '/proc/thread-self/attr/exec\x00'}], 0xa, "5995a7421f8c5a9d8077714ec53ad4d80e40fda9"}, 0x3c) 06:04:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:54 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176255f300000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="000010deb7653cf9"], 0x3c) 06:04:54 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="a869dfbd0ea8fdb9479fe5826578515865bd3ae8"], 0x8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x200000, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000040), &(0x7f00000000c0)=0xc) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000180)=0x1, 0x4) 06:04:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40002, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) 06:04:54 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x20880) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:54 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:54 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001580)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="152fa3622e6c350c5f4774bae720df95bde7c1387dc0cb8d976b1fa194de086bd72f221c961d", 0x26, 0xfffffffffffffffc) r2 = request_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='=:\n', 0xfffffffffffffffe) r3 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000280)='em1em0mime_type\x00', 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f00000002c0)={r1, r2, r3}, &(0x7f0000000300)=""/125, 0x7d, &(0x7f00000013c0)={&(0x7f0000000380)={'sha256_mb\x00'}, &(0x7f00000003c0)="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", 0x1000}) write$apparmor_exec(r0, &(0x7f0000001400)=ANY=[@ANYBLOB="6578655e203d3a0a6c3f16cd309b3e9e17276fb0c0d72d1f16e2640d37a6cad33b5ddd7cd90c179a1475f614e26c09d7ec7c09c6f837256972f92cc11e674485e3746b9a512bce45bae12427cc26b2e18ffcd3e70ae0a26173ced1cda421c340d47899110840e73225b117b566e829cfa140ef727193099f4a38e831e1ec584e7f3e8269cc283d6c52b13b8e69491e902ecc36802dfda2969e26c99bb5e12fe6728ebb0c3588e1ef57f1cf48b8e66a6ecb68a234005b67253af8f86a01321ffa6f7368ac4ccc632100000000"], 0x8) 06:04:55 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176655f230000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40002, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) 06:04:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:55 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="65786563203d3a0ad40fb2dee0b7d39411f961ef6e8e146c6b863948fc6c7109d701247316f6ab93cfc6c9d35b046dffc82efbb65d5eda48074e38f3b2f4e4d161b026fb5ba9b3b81ee9e30a5f575673d71d4a945ecf030633d91aa2e7e9f5e61df1ac7cbc3bd873191e47b13f0e00ec0bcf6178da0024f996cae3d657f157050c115ca733afb3efd0260b2657"], 0x8) 06:04:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:55 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e23, 0x7fed, @mcast1, 0x3}}, 0x3, 0x68}, &(0x7f0000000080)=0x90) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)={r2, 0xfb6f, 0x1, [0x3]}, 0xa) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="65786563203a3a0ac4e6bc9dc948beb4d81da5d4f110e09adc4c9e769d00000000000000c14f705bc542ab9b53"], 0x8) 06:04:55 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176655f250000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:55 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x420000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x117, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r1, 0x4, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x6, @mcast1, 0x7}, @in={0x2, 0x4e22, @multicast1}}}, 0x118) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="65784563203d3a0a888f629153f3246defb97e187eff587a02adcee50f6570d5def624aadc373d74009734ae"], 0x8) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000300)={{0x2, 0x7, 0x4, 0x4f, 'syz0\x00', 0x9}, 0x6, 0x43, 0xdcad, r3, 0x1, 0x2, 'syz0\x00', &(0x7f00000002c0)=['/proc/thread-self/attr/exec\x00'], 0x1c, [], [0x0, 0x1, 0x3b3, 0x6]}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'bpq0\x00', 0x0}) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000480)={r4, @local}, 0xc) 06:04:55 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x430) 06:04:55 executing program 3: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) chdir(&(0x7f0000000000)='./file0\x00') write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a3a0ae1b37dc5e576888dcf85848da1e21b736d11415c2b92609fab35aa2d63d6b0f51828d159d6d0d7b601923e8d79adacc86187"], 0x8) 06:04:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r2, 0x107, 0x1, &(0x7f0000000100)=""/163, &(0x7f0000000040)=0xa3) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:55 executing program 4: r0 = syz_open_dev$vcsa(0x0, 0x7fff, 0x10000) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000080)="57eaad61374b20b4ac2baddf54cc96766cc9cbdcf6c08a92b9c72c5de3fe0313b54ca2d025b2e079b1b36b524e9d0fe248daadea8c542170c51c86795592b617ad6afc6c693f7050bd318ccd69aa15a95b0cc49ef53e4d37cd151c8e1cd563fe9268dbb9aace6107c494438b7e4f61f7ea3da057c49713f93fa63aaa7d9ace10c86a") r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40002, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) 06:04:55 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x430) 06:04:55 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0x4c49, 0x18}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40002, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) 06:04:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:55 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176655f550000000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:55 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = gettid() syz_open_procfs(r2, &(0x7f0000000000)='loginuid\x00') write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)={0xffffffffffffffff}) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @remote}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) 06:04:55 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '::\n'}, 0x8) 06:04:55 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101400, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="65596563203d6855df6c567f663a0a88a335f0d41f1afe84c508e95aeede9416f80325b5c9dd554c1375852b5e395579dac0597bf71ba9d15651519093a2e41e0a9b75315fa1450000000000000400f18f0d37"], 0x8) 06:04:55 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="65786563203d3a0ad40fb2dee0b7d39411f961ef6e8e146c6b863948fc6c7109d701247316f6ab93cfc6c9d35b046dffc82efbb65d5eda48074e38f3b2f4e4d161b026fb5ba9b3b81ee9e30a5f575673d71d4a945ecf030633d91aa2e7e9f5e61df1ac7cbc3bd873191e47b13f0e00ec0bcf6178da0024f996cae3d657f157050c115ca733afb3efd0260b2657"], 0x8) 06:04:55 executing program 0: socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000080)={'vcan0\x00', {0x2, 0x4e24, @rand_addr=0x8}}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:55 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x430) 06:04:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) 06:04:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x692102, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='pids.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400202) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x81, 0x0, 0x7fff, 0x7f}) write$apparmor_exec(r2, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000040)=0x7) 06:04:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:56 executing program 3 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:56 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176655f300000000376657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:56 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) recvmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/100, 0x64}], 0x1, &(0x7f0000000280)=""/234, 0xea, 0x6f9}, 0x2000) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f00000001c0)={'ifb0\x00', 0x3}) 06:04:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) [ 1814.771421] FAULT_INJECTION: forcing a failure. [ 1814.771421] name failslab, interval 1, probability 0, space 0, times 0 06:04:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) pipe(&(0x7f0000000340)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7f) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) r2 = semget$private(0x0, 0x2, 0x0) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000080)=[0x7, 0xbfe, 0x1, 0x8, 0x53]) 06:04:56 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176655f300000002076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) [ 1814.926377] CPU: 0 PID: 14309 Comm: syz-executor3 Not tainted 4.19.0-rc8+ #296 [ 1814.933783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1814.943156] Call Trace: [ 1814.945767] dump_stack+0x1c4/0x2b6 [ 1814.949443] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1814.954664] ? mark_held_locks+0x130/0x130 [ 1814.958998] should_fail.cold.4+0xa/0x17 [ 1814.963090] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1814.968210] ? __lock_acquire+0x7ec/0x4ec0 [ 1814.972455] ? find_held_lock+0x36/0x1c0 [ 1814.976538] ? graph_lock+0x170/0x170 [ 1814.980369] ? graph_lock+0x170/0x170 [ 1814.984213] ? mark_held_locks+0x130/0x130 [ 1814.988479] ? find_held_lock+0x36/0x1c0 [ 1814.992580] ? __lock_is_held+0xb5/0x140 [ 1814.992611] ? ___might_sleep+0x1ed/0x300 [ 1814.992630] ? arch_local_save_flags+0x40/0x40 [ 1814.992658] __should_failslab+0x124/0x180 [ 1815.000891] should_failslab+0x9/0x14 [ 1815.000908] __kmalloc_track_caller+0x2d0/0x750 [ 1815.000925] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1815.000941] ? rcu_bh_qs+0xc0/0xc0 [ 1815.000954] ? find_vpid+0xf0/0xf0 [ 1815.000983] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1815.001002] ? proc_pid_attr_write+0x198/0x540 [ 1815.036182] memdup_user+0x2c/0xa0 [ 1815.036201] proc_pid_attr_write+0x198/0x540 [ 1815.036224] __vfs_write+0x119/0x9f0 [ 1815.036244] ? check_preemption_disabled+0x48/0x280 [ 1815.036259] ? proc_loginuid_write+0x4f0/0x4f0 [ 1815.036277] ? kernel_read+0x120/0x120 [ 1815.036299] ? __lock_is_held+0xb5/0x140 [ 1815.066013] ? rcu_read_lock_sched_held+0x108/0x120 [ 1815.066034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1815.066067] ? __sb_start_write+0x1b2/0x370 [ 1815.066098] vfs_write+0x1fc/0x560 [ 1815.088574] ksys_write+0x101/0x260 [ 1815.092225] ? __ia32_sys_read+0xb0/0xb0 [ 1815.096305] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1815.101831] __x64_sys_write+0x73/0xb0 [ 1815.105738] do_syscall_64+0x1b9/0x820 [ 1815.109645] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1815.115026] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1815.119972] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1815.124863] ? trace_hardirqs_on_caller+0x310/0x310 [ 1815.129897] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1815.134934] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1815.139970] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1815.144851] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1815.150060] RIP: 0033:0x457569 [ 1815.153284] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:04:56 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10042, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000003300)={@remote, @dev, 0x0}, &(0x7f0000003340)=0xc) pwrite64(r0, &(0x7f0000000300)="0f8ead3b3ab69cfc15de785e32343d37de6bbf9c3888bfb8f16aa023476aa9053e7d1170b9201ae295826b8669bc32ea32529e36e06be9d7708c605aee215920a1c5532203449d877659d55febd9eb80adb01e2568d0230ffbda6514619acf9b70afdef1e6078c07ef498ba70505cf58743ab527d712a1f477f1d3ccf85e92523b4cd4e32fb388cdc40e99c4ebcb4e7becc4e7f6455cb7b883ff58bab6c8ec963a1f802da44bc87a14796d37aa0adc1f224e9ad5fa2eae05bdaa096d6e5b3989e87e10d7352c4788eb5430dc1d84546cda5aadf5e296f37fa513eb5177a269aa166cdce7", 0xe4, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f00000000c0)={0x7f, 0x2, 0xfffffffffffffffa, 0x0, 0x8001, 0x40}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000003380)={'vcan0\x00', r2}) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) signalfd(r3, &(0x7f0000000080)={0x1f}, 0x8) write$apparmor_exec(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="08001700ba6289a25ec2d297a2440a2262199e14de5f6e1ab11c344249677a373c53183bae01c700c4b41a31808d3ab22c1343bd2bfd18b18b8a2604deb6464604c3291113aaa6fd208d6488565ea378ab8d7a2e21a38e74c3e72d2fc87daa1c12dde1519a07c690538bfa6b43f8ed533dc208c80c69e3782bd22e"], 0x8) 06:04:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$setlease(r1, 0x400, 0x3) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:56 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bcsf0\x00', 0x10) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0], 0x3) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x2, 0x480000) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) 06:04:56 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x202, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0x0, 0xf, 0x1000, &(0x7f0000000180)="2d2725105c602c032a00e6d3be525c", &(0x7f00000004c0)=""/4096, 0x7}, 0x28) creat(&(0x7f0000000200)='./file0\x00', 0x10c) [ 1815.172212] RSP: 002b:00007f4738d5ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1815.172228] RAX: ffffffffffffffda RBX: 00007f4738d5ac90 RCX: 0000000000457569 [ 1815.172237] RDX: 000000000000003c RSI: 0000000020000000 RDI: 0000000000000005 [ 1815.172246] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1815.172255] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4738d5b6d4 [ 1815.172265] R13: 00000000004c54ee R14: 00000000004d8e08 R15: 0000000000000006 06:04:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) [ 1815.252951] __bpf_mt_check_bytecode: 13 callbacks suppressed [ 1815.252959] xt_bpf: check failed: parse error 06:04:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:56 executing program 3 (fault-call:3 fault-nth:1): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="6578659bd45fd16a"], 0x3c) 06:04:56 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') 06:04:56 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176655f300006000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) [ 1815.492148] FAULT_INJECTION: forcing a failure. [ 1815.492148] name failslab, interval 1, probability 0, space 0, times 0 06:04:56 executing program 0: socketpair$unix(0x1, 0x4002, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xffffffffffffffff) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x509200, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000100)={'HL\x00'}, &(0x7f0000000140)=0x1e) write$apparmor_exec(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='exe\\ :$\n'], 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f00000001c0)) [ 1815.553749] CPU: 0 PID: 14371 Comm: syz-executor3 Not tainted 4.19.0-rc8+ #296 [ 1815.555888] xt_bpf: check failed: parse error [ 1815.561162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1815.561169] Call Trace: [ 1815.561195] dump_stack+0x1c4/0x2b6 [ 1815.561221] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1815.561252] should_fail.cold.4+0xa/0x17 [ 1815.561276] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1815.561303] ? graph_lock+0x170/0x170 [ 1815.561321] ? audit_filter+0x67d/0xda0 06:04:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) [ 1815.561340] ? lock_downgrade+0x900/0x900 [ 1815.561359] ? check_preemption_disabled+0x48/0x280 [ 1815.561381] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1815.561410] ? kasan_check_read+0x11/0x20 [ 1815.561430] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1815.561465] ? find_held_lock+0x36/0x1c0 [ 1815.561492] ? auditd_test_task+0x206/0x370 [ 1815.636496] ? lock_downgrade+0x900/0x900 [ 1815.640669] ? check_preemption_disabled+0x48/0x280 [ 1815.645718] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 06:04:57 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='exec =\t\x00'], 0x8) [ 1815.645749] ? kasan_check_read+0x11/0x20 [ 1815.645779] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1815.645795] ? rcu_bh_qs+0xc0/0xc0 [ 1815.645840] __should_failslab+0x124/0x180 [ 1815.655795] should_failslab+0x9/0x14 [ 1815.655821] kmem_cache_alloc+0x47/0x730 [ 1815.655848] ? find_held_lock+0x36/0x1c0 [ 1815.680898] ? audit_file_mask+0x180/0x180 [ 1815.685150] audit_log_start+0x554/0x9d0 [ 1815.689236] ? aa_lookupn_ns+0x10c/0x1e0 [ 1815.689255] ? audit_serial+0x30/0x30 [ 1815.689273] ? check_preemption_disabled+0x48/0x280 [ 1815.689294] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1815.689315] ? kasan_check_read+0x11/0x20 [ 1815.697172] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1815.697191] ? rcu_bh_qs+0xc0/0xc0 [ 1815.697210] ? print_usage_bug+0xc0/0xc0 [ 1815.697223] ? graph_lock+0x170/0x170 [ 1815.697247] ? aa_lookupn_ns+0x133/0x1e0 [ 1815.697270] ? __aafs_ns_mkdir+0xca0/0xca0 [ 1815.737161] ? audit_file_mask+0x180/0x180 [ 1815.741408] common_lsm_audit+0x112/0x2200 [ 1815.745659] ? aa_lookup_profile+0x30/0x30 [ 1815.749902] ? __lock_acquire+0x7ec/0x4ec0 [ 1815.754150] ? ipv6_skb_to_auditdata+0xee0/0xee0 [ 1815.758952] ? __lock_acquire+0x7ec/0x4ec0 [ 1815.763220] ? mark_held_locks+0x130/0x130 [ 1815.767471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1815.773022] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1815.778576] ? fqlookupn_profile+0x88/0xc0 [ 1815.782835] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1815.787867] ? aa_label_strn_parse+0x1d6/0x1230 [ 1815.792546] ? ima_get_action+0x7e/0xa0 [ 1815.796546] aa_audit+0x21d/0x740 [ 1815.800035] ? audit_file_mask+0x180/0x180 [ 1815.804297] aa_audit_file+0x53d/0xa20 [ 1815.808197] ? update_file_ctx+0x340/0x340 [ 1815.812437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1815.817996] ? refcount_add_not_zero_checked+0x330/0x330 [ 1815.823473] aa_change_profile+0x1736/0x3260 [ 1815.827910] ? aa_change_hat+0x1890/0x1890 [ 1815.832156] ? is_bpf_text_address+0xd3/0x170 [ 1815.836673] ? __mutex_lock+0x85e/0x1700 [ 1815.840740] ? proc_pid_attr_write+0x28a/0x540 [ 1815.845354] ? mutex_trylock+0x2b0/0x2b0 [ 1815.849423] ? save_stack+0xa9/0xd0 06:04:57 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$RTC_UIE_OFF(r1, 0x7004) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) [ 1815.853057] ? save_stack+0x43/0xd0 [ 1815.856691] ? kasan_kmalloc+0xc7/0xe0 [ 1815.860584] ? __kmalloc_track_caller+0x14a/0x750 [ 1815.865451] ? proc_pid_attr_write+0x198/0x540 [ 1815.870048] ? graph_lock+0x170/0x170 [ 1815.873856] ? __x64_sys_write+0x73/0xb0 [ 1815.877923] ? graph_lock+0x170/0x170 [ 1815.881741] ? mark_held_locks+0x130/0x130 [ 1815.886000] apparmor_setprocattr+0xa8b/0x1150 [ 1815.890601] ? apparmor_task_kill+0xcb0/0xcb0 [ 1815.895115] ? lock_downgrade+0x900/0x900 [ 1815.895139] ? arch_local_save_flags+0x40/0x40 06:04:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8, 0x840) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x54ed, 0x4) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) [ 1815.895182] security_setprocattr+0x66/0xc0 [ 1815.903897] proc_pid_attr_write+0x301/0x540 [ 1815.903919] __vfs_write+0x119/0x9f0 [ 1815.903943] ? check_preemption_disabled+0x48/0x280 [ 1815.921395] ? proc_loginuid_write+0x4f0/0x4f0 [ 1815.926019] ? kernel_read+0x120/0x120 [ 1815.929942] ? __lock_is_held+0xb5/0x140 [ 1815.934029] ? rcu_read_lock_sched_held+0x108/0x120 [ 1815.934049] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1815.934065] ? __sb_start_write+0x1b2/0x370 [ 1815.934087] vfs_write+0x1fc/0x560 [ 1815.934109] ksys_write+0x101/0x260 [ 1815.956171] ? __ia32_sys_read+0xb0/0xb0 [ 1815.960249] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1815.960275] __x64_sys_write+0x73/0xb0 [ 1815.960296] do_syscall_64+0x1b9/0x820 [ 1815.960313] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1815.960331] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1815.960347] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1815.960366] ? trace_hardirqs_on_caller+0x310/0x310 [ 1815.993747] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1815.998777] ? prepare_exit_to_usermode+0x291/0x3b0 06:04:57 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x7f, 0x3) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0xf3, "6d05d5857d9dd7c9a72ab5b589a42f479d9ea0f0d5818cf9b23bb7894ec409346279c1b2f784090fdb0a5f17bc4e9fd9f6685535dbea3b932d743e514960b23c3bc7211c1dd4ef803dc683d58269b2bb1ad6cebe3930a043fec4c908439c28ba6b2e3f3d790df29617718857f483871f0471a9b3199e18640c0749bcc13f57e14546357145baecbdba965fb3da1d9a0cb035a30f6555e9747bb8b2b64bbb0731eb00d9b8c68479df06424a847b0de2b92164a31990fd3a52c027de2646a4cc5c954b92cbb84dc3cf09d176a1a62ebe2e1054a82915ec4fb2fe387747648fd0b2f2baf77b4e1b3b10506b4cb2f08657333ad391"}, &(0x7f0000000180)=0xfb) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={r2, @in6={{0xa, 0x4e22, 0x1, @ipv4={[], [], @local}, 0x5}}, 0x7a, 0x0, 0xc8c, 0x100000000, 0x1}, &(0x7f00000001c0)=0x98) 06:04:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100)) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) [ 1816.003835] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1816.008698] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1816.013902] RIP: 0033:0x457569 [ 1816.017113] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1816.036022] RSP: 002b:00007f4738d5ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1816.036040] RAX: ffffffffffffffda RBX: 00007f4738d5ac90 RCX: 0000000000457569 [ 1816.036049] RDX: 000000000000003c RSI: 0000000020000000 RDI: 0000000000000005 [ 1816.036059] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1816.036069] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4738d5b6d4 [ 1816.036077] R13: 00000000004c54ee R14: 00000000004d8e08 R15: 0000000000000006 06:04:57 executing program 3 (fault-call:3 fault-nth:2): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:57 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176655f300007000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:57 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) 06:04:57 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x48040, 0x0) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f0000000080)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x2100, 0x0) fcntl$setflags(r1, 0x2, 0x1) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) finit_module(r0, &(0x7f0000000100)='=:\n', 0x3) 06:04:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='exek ::\n'], 0x1) [ 1816.188708] FAULT_INJECTION: forcing a failure. [ 1816.188708] name failslab, interval 1, probability 0, space 0, times 0 [ 1816.224858] xt_bpf: check failed: parse error [ 1816.293321] CPU: 0 PID: 14402 Comm: syz-executor3 Not tainted 4.19.0-rc8+ #296 [ 1816.300747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1816.310112] Call Trace: [ 1816.312724] dump_stack+0x1c4/0x2b6 [ 1816.316378] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1816.321635] should_fail.cold.4+0xa/0x17 [ 1816.325727] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1816.330854] ? rcu_bh_qs+0xc0/0xc0 [ 1816.334444] ? rcu_bh_qs+0xc0/0xc0 [ 1816.337989] ? unwind_dump+0x190/0x190 [ 1816.341897] ? is_bpf_text_address+0xd3/0x170 [ 1816.346404] ? kernel_text_address+0x79/0xf0 [ 1816.350826] ? __kernel_text_address+0xd/0x40 [ 1816.355333] ? unwind_get_return_address+0x61/0xa0 [ 1816.360283] ? __save_stack_trace+0x8d/0xf0 [ 1816.364649] ? save_stack+0xa9/0xd0 [ 1816.368595] ? save_stack+0x43/0xd0 [ 1816.372236] ? kasan_kmalloc+0xc7/0xe0 [ 1816.376122] ? kasan_slab_alloc+0x12/0x20 [ 1816.380278] ? kmem_cache_alloc+0x12e/0x730 [ 1816.384612] ? audit_log_start+0x554/0x9d0 [ 1816.388852] ? common_lsm_audit+0x112/0x2200 06:04:57 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) [ 1816.393269] ? aa_audit+0x21d/0x740 [ 1816.396900] ? aa_audit_file+0x53d/0xa20 [ 1816.400968] ? aa_change_profile+0x1736/0x3260 [ 1816.405563] ? apparmor_setprocattr+0xa8b/0x1150 [ 1816.410329] ? security_setprocattr+0x66/0xc0 [ 1816.414855] ? proc_pid_attr_write+0x301/0x540 [ 1816.419453] ? __vfs_write+0x119/0x9f0 [ 1816.419476] __should_failslab+0x124/0x180 [ 1816.419498] should_failslab+0x9/0x14 [ 1816.419515] kmem_cache_alloc_node+0x56/0x730 [ 1816.419535] ? graph_lock+0x170/0x170 [ 1816.419568] __alloc_skb+0x119/0x770 [ 1816.419589] ? skb_scrub_packet+0x490/0x490 [ 1816.427722] ? __lock_is_held+0xb5/0x140 [ 1816.427752] ? rcu_read_lock_sched_held+0x108/0x120 [ 1816.456961] ? kmem_cache_alloc+0x33a/0x730 [ 1816.461304] ? find_held_lock+0x36/0x1c0 [ 1816.465418] ? audit_file_mask+0x180/0x180 [ 1816.469669] audit_log_start+0x57c/0x9d0 [ 1816.473751] ? aa_lookupn_ns+0x10c/0x1e0 [ 1816.477838] ? audit_serial+0x30/0x30 [ 1816.481660] ? check_preemption_disabled+0x48/0x280 [ 1816.486697] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 06:04:57 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) [ 1816.492509] ? kasan_check_read+0x11/0x20 [ 1816.496720] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1816.502011] ? rcu_bh_qs+0xc0/0xc0 [ 1816.505632] ? print_usage_bug+0xc0/0xc0 [ 1816.509724] ? graph_lock+0x170/0x170 [ 1816.513557] ? aa_lookupn_ns+0x133/0x1e0 [ 1816.517641] ? __aafs_ns_mkdir+0xca0/0xca0 [ 1816.517656] ? audit_file_mask+0x180/0x180 [ 1816.517678] common_lsm_audit+0x112/0x2200 [ 1816.526150] ? aa_lookup_profile+0x30/0x30 [ 1816.526166] ? __lock_acquire+0x7ec/0x4ec0 [ 1816.526184] ? ipv6_skb_to_auditdata+0xee0/0xee0 06:04:58 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176655f308800000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) [ 1816.526211] ? __lock_acquire+0x7ec/0x4ec0 [ 1816.526232] ? mark_held_locks+0x130/0x130 [ 1816.552166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1816.557723] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1816.563278] ? fqlookupn_profile+0x88/0xc0 [ 1816.567561] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1816.572611] ? aa_label_strn_parse+0x1d6/0x1230 [ 1816.577295] ? ima_get_action+0x7e/0xa0 [ 1816.581312] aa_audit+0x21d/0x740 [ 1816.584796] ? audit_file_mask+0x180/0x180 [ 1816.589055] aa_audit_file+0x53d/0xa20 06:04:58 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) [ 1816.589079] ? update_file_ctx+0x340/0x340 [ 1816.589099] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1816.602757] ? refcount_add_not_zero_checked+0x330/0x330 [ 1816.602792] aa_change_profile+0x1736/0x3260 [ 1816.602844] ? aa_change_hat+0x1890/0x1890 [ 1816.616950] ? is_bpf_text_address+0xd3/0x170 [ 1816.621478] ? __mutex_lock+0x85e/0x1700 [ 1816.625563] ? proc_pid_attr_write+0x28a/0x540 [ 1816.625589] ? mutex_trylock+0x2b0/0x2b0 [ 1816.625618] ? save_stack+0xa9/0xd0 [ 1816.625632] ? save_stack+0x43/0xd0 [ 1816.625661] ? kasan_kmalloc+0xc7/0xe0 [ 1816.645466] ? __kmalloc_track_caller+0x14a/0x750 [ 1816.650321] ? proc_pid_attr_write+0x198/0x540 [ 1816.650339] ? graph_lock+0x170/0x170 [ 1816.650355] ? __x64_sys_write+0x73/0xb0 [ 1816.650371] ? graph_lock+0x170/0x170 [ 1816.650389] ? mark_held_locks+0x130/0x130 [ 1816.650415] apparmor_setprocattr+0xa8b/0x1150 [ 1816.650441] ? apparmor_task_kill+0xcb0/0xcb0 [ 1816.650460] ? lock_downgrade+0x900/0x900 [ 1816.684162] ? arch_local_save_flags+0x40/0x40 [ 1816.688822] security_setprocattr+0x66/0xc0 06:04:58 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) [ 1816.693172] proc_pid_attr_write+0x301/0x540 [ 1816.697617] __vfs_write+0x119/0x9f0 [ 1816.701354] ? check_preemption_disabled+0x48/0x280 [ 1816.706387] ? proc_loginuid_write+0x4f0/0x4f0 [ 1816.710987] ? kernel_read+0x120/0x120 [ 1816.714917] ? __lock_is_held+0xb5/0x140 [ 1816.719025] ? rcu_read_lock_sched_held+0x108/0x120 [ 1816.719046] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1816.719062] ? __sb_start_write+0x1b2/0x370 [ 1816.719084] vfs_write+0x1fc/0x560 [ 1816.719108] ksys_write+0x101/0x260 [ 1816.729667] ? __ia32_sys_read+0xb0/0xb0 06:04:58 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) [ 1816.729688] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1816.729714] __x64_sys_write+0x73/0xb0 [ 1816.754587] do_syscall_64+0x1b9/0x820 [ 1816.758506] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1816.763888] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1816.768835] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1816.773713] ? trace_hardirqs_on_caller+0x310/0x310 [ 1816.778741] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1816.783786] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1816.788829] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1816.793691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1816.793705] RIP: 0033:0x457569 [ 1816.793722] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1816.793730] RSP: 002b:00007f4738d5ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1816.802118] RAX: ffffffffffffffda RBX: 00007f4738d5ac90 RCX: 0000000000457569 [ 1816.802128] RDX: 000000000000003c RSI: 0000000020000000 RDI: 0000000000000005 [ 1816.802138] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1816.802147] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4738d5b6d4 [ 1816.802157] R13: 00000000004c54ee R14: 00000000004d8e08 R15: 0000000000000006 [ 1816.806332] kauditd_printk_skb: 36 callbacks suppressed [ 1816.806357] audit: type=1400 audit(1540188297.721:302): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=3A0C5D pid=14420 comm="syz-executor5" [ 1816.933615] audit: audit_lost=5 audit_rate_limit=0 audit_backlog_limit=64 [ 1816.940983] xt_bpf: check failed: parse error [ 1816.941952] audit: type=1400 audit(1540188297.721:303): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=3A0C5D pid=14422 comm="syz-executor5" [ 1816.964160] audit: type=1400 audit(1540188297.721:304): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=3A0C5D pid=14428 comm="syz-executor5" 06:04:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', ':&\n'}, 0x3c) 06:04:58 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000100)={'bridge_slave_1\x00', 0x80000000}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:58 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176655f300200000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:58 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='=:\n'], 0x8) 06:04:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) [ 1816.982228] audit: type=1400 audit(1540188297.721:305): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=3A0C5D pid=14431 comm="syz-executor5" [ 1816.995489] audit: out of memory in audit_log_start [ 1817.000194] audit: type=1400 audit(1540188298.281:306): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=3A0C5D pid=14435 comm="syz-executor5" [ 1817.079908] audit: type=1400 audit(1540188298.511:307): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=3A0C5D pid=14448 comm="syz-executor5" [ 1817.126201] xt_bpf: check failed: parse error 06:04:58 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xa100, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:58 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176655f300000000476657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) 06:04:58 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'%xec ', ':&\n'}, 0x3c) [ 1817.238755] audit: type=1400 audit(1540188298.661:308): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name=":&" pid=14457 comm="syz-executor3" [ 1817.287114] audit: type=1400 audit(1540188298.691:309): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="=:" pid=14460 comm="syz-executor4" 06:04:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:58 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x4000, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) [ 1817.410099] xt_bpf: check failed: parse error 06:04:58 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000080)={0x1d, 0x5, 0x0, [{0x3, 0x1ff, 0x0, 0x388, 0x4, 0x1000}, {0x1000, 0xa0f0, 0x7ff, 0x3, 0x5, 0x4, 0x5}, {0x1, 0x2, 0x0, 0x100000000, 0x9, 0x4, 0x7}, {0xb7c, 0x4090, 0x3, 0x3, 0x800, 0x20, 0x10000}, {0x9, 0x9, 0x2, 0x2, 0x273, 0x9, 0x8000000}]}) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:58 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176655f300000000276657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'"xec ', ':&\n'}, 0x3c) 06:04:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) 06:04:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) [ 1817.621753] xt_bpf: check failed: parse error 06:04:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3, 0x10040) write$FUSE_POLL(r2, &(0x7f0000000080)={0x1, 0x0, 0x8, {0xffffffffffffffc0}}, 0x18) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="6178e963203a3a0a"], 0x3c) 06:04:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) 06:04:59 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:04:59 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176655f300011000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'e"ec ', ':&\n'}, 0x3c) [ 1817.809040] xt_bpf: check failed: parse error 06:04:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'ex%c ', ':&\n'}, 0x3c) 06:04:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ptrace$poke(0x5, r1, &(0x7f0000000100), 0x7fff) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000180)={0x20, 0xfffffffffffffff5, 0x4, {0x0, 0x4}}, 0x20) socket$netlink(0x10, 0x3, 0x1f) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x3c) 06:04:59 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203d3a85"], 0x2d4) 06:04:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) 06:04:59 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176655f300600000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:59 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="6563d4c3b4110000"], 0x8) [ 1818.077457] xt_bpf: check failed: parse error 06:04:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:04:59 executing program 0: socketpair$unix(0x1, 0x4002, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'ex"c ', ':&\n'}, 0x3c) 06:04:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) 06:04:59 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176655f300300000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:59 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socketpair(0xa, 0x806, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', "59fb784f1b0e3b776ae029eeee"}, 0x4) 06:04:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) 06:04:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exe% ', ':&\n'}, 0x3c) 06:04:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:04:59 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="6578656305003a8ab57b78fd627f7a006efe9cde66756017768ee7d469cdf203ed9e420ff4ae118d2c6fcdf141e5f764f15033e95444655af14cf222f26be6d160fa088363a6f61752424148a3f6d736821ee7597d7f7b1fe3a801d6fa99f94781d57c8403e7aedef4a081998556c40e29ee132ef8abf7730400000000000000d183f517a2d34d391744d8f271bc1efea185470ce18b4925a4a75e43d583a9ba30ad6ec337c6d2555a4f14727d2053bf2d608d0e3a78239c30c99ef9d2d26a47373c7c5451a856cdf5517c966aa28ca4"], 0x8) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x402, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) vmsplice(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="82589c9886490f87e8d433d1646b8a4078dc99d52d37ef8b02e88c8bf72cf4559dd2d33a727378269c4f7d78cd118df90e697500d011134d36c13738bee679306ca6df2aede1baf67d2c4f86c77ee0d7b9bd4959b45b537a135e29a5159635b7e122c315464feaaa628a99471e58474bdd953488044040ee6612eaca72c8473b537b7b45753fb2258c429455433c0484cb5860be89bbe9a29a07be19a0c719d119ce3ee0e67c1a6ea47a14079cde989db95250a4afcf", 0xb6}, {&(0x7f0000000100)="fc2c86d258b637e7f6e5ceed7ba317ba5064794ab0499366adad6bb5c67c29ceab109622ac03e8d8d6be57e9f250996086992ca453ea40e9751c175739b3f387c920a33f3a782ec435cbf78f3a91688c6b92748d", 0x54}, {&(0x7f0000000180)="36fd580a973334751ee68058604c40f40d6adf86746f47e3391376b8fbc51d363a9437c53ab5a7da6a1ec96fc5bf337f65f53bd6fad99476f32c1bcff945c5ddd324a8b22486db017753a8d38aaf43ef00a8d177516053", 0x57}, {&(0x7f0000000200)="d34b13eb7428896418dab81a9d24c2a7638cb9d47746ed631e70ea1d8ff8f29864fa93a35867", 0x26}], 0x4, 0x8) [ 1818.403432] xt_bpf: check failed: parse error 06:04:59 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176655f300000000176657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:04:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exe" ', ':&\n'}, 0x3c) 06:05:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:05:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) 06:05:00 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000140)) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x480200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:05:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec/', ':&\n'}, 0x3c) 06:05:00 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '=:\n'}, 0x8) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f00000000c0)) 06:05:00 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176655f300060000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:05:00 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='Mzec =z\n'], 0x8) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40, 0x0) 06:05:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="65786563203a0c5d615bd5a27478e11033193a0a"], 0x8) 06:05:00 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176655f300005000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:05:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000100)=""/203) clone(0x2000, &(0x7f0000000280)="585417804dffb72ff0806e0414dded3cc2e516f96a57466359eab4a9dcf8897af88a7d3d7dfd6bb7d8b12784dbfb9eaa1ac563afbdb17613ef57b5735196371601133fea798e3e5f472a9e34faebe653daa4d660bfb1aa1c741c9a19e23ec26c61423ec6891cce33a7420c442ce047cd56af222d07", &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000300)="8152246ce988b3a7b7078f0653a000670b48cee85387fbcae2bf776c1bd5a994135df30899f213f052560f6a4c052b861a57810b31fd23b60ba5a7dbc8003ad0d5b487f63d12dd568bdd93152a5ac06650b395f91bc63fc2fc83b65443ae6c31b0efbcf15c0a5861c2f49922ba03d82999e86e225d9f813cd91100a710eb75639a701ca052bc9639f216a1432d7510ef2cff906873c0ce069b3fd702fb5084ba53896ecc80a8649b37db99325e75c4f72e85fcb2f83ee29a24dd86ad") ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) socket$inet6_sctp(0xa, 0x5, 0x84) 06:05:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec%', ':&\n'}, 0x3c) 06:05:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x208002, 0x2) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000100)={0x4, 0x5, 0x20}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40) openat$cgroup(r2, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) socket$nl_route(0x10, 0x3, 0x0) 06:05:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:05:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[], 0x0) 06:05:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '%&\n'}, 0x3c) 06:05:00 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176655f300700000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) 06:05:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '::\n'}, 0x3c) 06:05:00 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x2) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:05:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[], 0x0) 06:05:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', '&&\n'}, 0x3c) 06:05:00 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x430) 06:05:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[], 0x0) 06:05:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x4, 0x109600) ioctl$TIOCNOTTY(r2, 0x5422) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x40) ioctl$VT_DISALLOCATE(r3, 0x5608) write$apparmor_exec(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7880e3bdbe1659fe15dc3a3a0a00"], 0x3c) 06:05:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000023c0)=""/4096, 0x10b0}], 0x1, &(0x7f00000007c0)=""/16, 0xc009, 0x0}, 0x0) 06:05:00 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0xc) 06:05:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x1) 06:05:00 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'bro\nte\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000900000000000000000073797a5f74756e000000000000000000626f6e645f736c6176655f300003000076657468305f746f5f7465616d000000766574683000000000000000000000000180c20000000000000000000000000000000000000000000000f8020000f802000028030000627066000000000000000000000000000000000000000000000000000000000110020000000075000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006970767300000000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x430) [ 1819.468388] ================================================================== [ 1819.476239] BUG: KASAN: global-out-of-bounds in memcmp+0xe3/0x160 [ 1819.482482] Read of size 1 at addr ffffffff88000008 by task syz-executor3/14673 [ 1819.489927] [ 1819.491571] CPU: 0 PID: 14673 Comm: syz-executor3 Not tainted 4.19.0-rc8+ #296 [ 1819.498935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1819.508373] Call Trace: [ 1819.510966] dump_stack+0x1c4/0x2b6 [ 1819.514623] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1819.519880] ? printk+0xa7/0xcf [ 1819.523189] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1819.528039] print_address_description.cold.8+0x58/0x1ff [ 1819.533500] kasan_report.cold.9+0x242/0x309 [ 1819.537917] ? memcmp+0xe3/0x160 [ 1819.541295] __asan_report_load1_noabort+0x14/0x20 [ 1819.546265] memcmp+0xe3/0x160 [ 1819.549502] strnstr+0x4b/0x70 [ 1819.552739] ? __switch_to_asm+0x34/0x70 [ 1819.556809] ? __switch_to_asm+0x34/0x70 [ 1819.560891] __aa_lookupn_ns+0xc1/0x570 [ 1819.564897] ? aa_find_ns+0x30/0x30 [ 1819.568537] ? lock_acquire+0x1ed/0x520 [ 1819.572539] ? __aa_lookupn_ns+0x570/0x570 [ 1819.576788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.582358] ? check_preemption_disabled+0x48/0x280 [ 1819.587410] ? kasan_check_read+0x11/0x20 [ 1819.591578] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1819.596880] ? rcu_bh_qs+0xc0/0xc0 [ 1819.600452] ? print_usage_bug+0xc0/0xc0 [ 1819.604518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.610068] ? __switch_to_asm+0x34/0x70 [ 1819.614147] aa_lookupn_ns+0x88/0x1e0 [ 1819.617981] aa_fqlookupn_profile+0x1b9/0x1010 [ 1819.622603] ? preempt_notifier_register+0x200/0x200 [ 1819.627746] ? __switch_to_asm+0x34/0x70 [ 1819.631824] ? __switch_to_asm+0x34/0x70 [ 1819.635905] ? aa_lookup_profile+0x30/0x30 [ 1819.640150] ? __lock_acquire+0x7ec/0x4ec0 [ 1819.644390] ? __switch_to_asm+0x34/0x70 [ 1819.648464] ? __switch_to_asm+0x40/0x70 [ 1819.652534] ? __switch_to_asm+0x34/0x70 [ 1819.656617] ? __switch_to_asm+0x40/0x70 [ 1819.660695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.660723] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 1819.660743] ? refcount_add_not_zero_checked+0x330/0x330 [ 1819.660761] ? mark_held_locks+0x130/0x130 [ 1819.660778] ? __sched_text_start+0x8/0x8 [ 1819.660798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.671789] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1819.671819] fqlookupn_profile+0x80/0xc0 [ 1819.671841] aa_label_strn_parse+0xa3a/0x1230 [ 1819.671868] ? aa_label_printk+0x850/0x850 [ 1819.671885] ? __lock_acquire+0x7ec/0x4ec0 [ 1819.671901] ? preempt_schedule+0x4d/0x60 [ 1819.671920] ? preempt_schedule_common+0x1f/0xe0 [ 1819.722755] ? graph_lock+0x170/0x170 [ 1819.726590] ? __lock_acquire+0x7ec/0x4ec0 [ 1819.730853] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.736415] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 1819.741910] ? refcount_add_not_zero_checked+0x330/0x330 [ 1819.747402] ? graph_lock+0x170/0x170 [ 1819.751221] ? find_held_lock+0x36/0x1c0 [ 1819.755328] aa_label_parse+0x42/0x50 [ 1819.759150] aa_change_profile+0x513/0x3260 [ 1819.763533] ? lock_acquire+0x1ed/0x520 [ 1819.767546] ? aa_change_hat+0x1890/0x1890 [ 1819.771823] ? is_bpf_text_address+0xd3/0x170 [ 1819.776350] ? __mutex_lock+0x85e/0x1700 [ 1819.780439] ? proc_pid_attr_write+0x28a/0x540 [ 1819.785044] ? mutex_trylock+0x2b0/0x2b0 [ 1819.789148] ? save_stack+0xa9/0xd0 [ 1819.792790] ? save_stack+0x43/0xd0 [ 1819.796435] ? kasan_kmalloc+0xc7/0xe0 [ 1819.800340] ? __kmalloc_track_caller+0x14a/0x750 [ 1819.805192] ? proc_pid_attr_write+0x198/0x540 [ 1819.809786] ? graph_lock+0x170/0x170 [ 1819.813604] ? __x64_sys_write+0x73/0xb0 [ 1819.817677] ? graph_lock+0x170/0x170 [ 1819.821496] ? mark_held_locks+0x130/0x130 [ 1819.825756] apparmor_setprocattr+0xa8b/0x1150 [ 1819.830361] ? apparmor_task_kill+0xcb0/0xcb0 [ 1819.834873] ? lock_downgrade+0x900/0x900 [ 1819.839047] ? arch_local_save_flags+0x40/0x40 [ 1819.843694] security_setprocattr+0x66/0xc0 [ 1819.848035] proc_pid_attr_write+0x301/0x540 [ 1819.852466] __vfs_write+0x119/0x9f0 [ 1819.856195] ? check_preemption_disabled+0x48/0x280 [ 1819.861224] ? proc_loginuid_write+0x4f0/0x4f0 [ 1819.865823] ? kernel_read+0x120/0x120 [ 1819.869736] ? __lock_is_held+0xb5/0x140 [ 1819.873832] ? rcu_read_lock_sched_held+0x108/0x120 [ 1819.878867] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.878883] ? __sb_start_write+0x1b2/0x370 [ 1819.878905] vfs_write+0x1fc/0x560 [ 1819.878928] ksys_write+0x101/0x260 [ 1819.878949] ? __ia32_sys_read+0xb0/0xb0 [ 1819.892404] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1819.892429] __x64_sys_write+0x73/0xb0 [ 1819.892464] do_syscall_64+0x1b9/0x820 [ 1819.892496] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1819.892516] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1819.923692] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1819.928551] ? trace_hardirqs_on_caller+0x310/0x310 [ 1819.933592] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1819.938635] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1819.943689] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1819.948549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1819.953746] RIP: 0033:0x457569 06:05:01 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x80001, 0x100) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x2) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:05:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x1) 06:05:01 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_POLL(r2, &(0x7f0000000180)={0x18, 0xfffffffffffffff5, 0x7, {0x4}}, 0x18) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') r5 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xe2, 0x42) kcmp$KCMP_EPOLL_TFD(r1, r3, 0x7, r0, &(0x7f0000000100)={r4, r5, 0x5}) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '=:\n'}, 0x8) 06:05:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x1) [ 1819.956945] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1819.975852] RSP: 002b:00007f4738d5ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1819.975869] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1819.975878] RDX: 000000000000003c RSI: 0000000020000000 RDI: 0000000000000005 [ 1819.975887] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1819.975896] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4738d5b6d4 [ 1819.975906] R13: 00000000004c54ee R14: 00000000004d8e08 R15: 00000000ffffffff [ 1819.975954] [ 1819.975960] The buggy address belongs to the variable: [ 1819.975991] __start_rodata+0x8/0x1000 [ 1819.975996] [ 1819.976000] Memory state around the buggy address: [ 1819.976019] ffffffff87ffff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1819.986301] kobject: 'loop2' (00000000019046a4): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1819.991008] ffffffff87ffff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1819.991021] >ffffffff88000000: 00 fa fa fa fa fa fa fa 00 01 fa fa fa fa fa fa [ 1819.991027] ^ [ 1819.991052] ffffffff88000080: 00 00 00 07 fa fa fa fa 00 04 fa fa fa fa fa fa [ 1819.991064] ffffffff88000100: 05 fa fa fa fa fa fa fa 00 00 00 00 05 fa fa fa [ 1819.991070] ================================================================== [ 1819.991074] Disabling lock debugging due to kernel taint [ 1820.002326] Kernel panic - not syncing: panic_on_warn set ... [ 1820.002326] [ 1820.013201] kobject: 'loop0' (0000000055f34236): kobject_uevent_env [ 1820.020443] CPU: 0 PID: 14673 Comm: syz-executor3 Tainted: G B 4.19.0-rc8+ #296 [ 1820.020452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1820.020457] Call Trace: [ 1820.020477] dump_stack+0x1c4/0x2b6 [ 1820.020495] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1820.020512] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1820.020548] panic+0x238/0x4e7 [ 1820.022898] kobject: 'loop0' (0000000055f34236): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1820.027435] ? add_taint.cold.5+0x16/0x16 [ 1820.027453] ? preempt_schedule+0x4d/0x60 [ 1820.027467] ? ___preempt_schedule+0x16/0x18 [ 1820.027487] ? trace_hardirqs_on+0xb4/0x310 [ 1820.031787] kobject: 'loop1' (0000000053489aee): kobject_uevent_env [ 1820.033018] kasan_end_report+0x47/0x4f [ 1820.033048] kasan_report.cold.9+0x76/0x309 [ 1820.038030] kobject: 'loop1' (0000000053489aee): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1820.045312] ? memcmp+0xe3/0x160 [ 1820.045329] __asan_report_load1_noabort+0x14/0x20 [ 1820.045344] memcmp+0xe3/0x160 [ 1820.045361] strnstr+0x4b/0x70 [ 1820.045375] ? __switch_to_asm+0x34/0x70 [ 1820.045394] ? __switch_to_asm+0x34/0x70 [ 1820.224838] __aa_lookupn_ns+0xc1/0x570 [ 1820.228801] ? aa_find_ns+0x30/0x30 [ 1820.232418] ? lock_acquire+0x1ed/0x520 [ 1820.236383] ? __aa_lookupn_ns+0x570/0x570 [ 1820.240617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.246142] ? check_preemption_disabled+0x48/0x280 [ 1820.251179] ? kasan_check_read+0x11/0x20 [ 1820.255325] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1820.260590] ? rcu_bh_qs+0xc0/0xc0 [ 1820.264117] ? print_usage_bug+0xc0/0xc0 [ 1820.268161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.273686] ? __switch_to_asm+0x34/0x70 [ 1820.277734] aa_lookupn_ns+0x88/0x1e0 [ 1820.281524] aa_fqlookupn_profile+0x1b9/0x1010 [ 1820.286108] ? preempt_notifier_register+0x200/0x200 [ 1820.291196] ? __switch_to_asm+0x34/0x70 [ 1820.295239] ? __switch_to_asm+0x34/0x70 [ 1820.299293] ? aa_lookup_profile+0x30/0x30 [ 1820.303521] ? __lock_acquire+0x7ec/0x4ec0 [ 1820.307755] ? __switch_to_asm+0x34/0x70 [ 1820.311811] ? __switch_to_asm+0x40/0x70 [ 1820.315866] ? __switch_to_asm+0x34/0x70 [ 1820.319912] ? __switch_to_asm+0x40/0x70 [ 1820.323977] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.329500] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 1820.334940] ? refcount_add_not_zero_checked+0x330/0x330 [ 1820.340376] ? mark_held_locks+0x130/0x130 [ 1820.344598] ? __sched_text_start+0x8/0x8 [ 1820.348746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.354269] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1820.359792] fqlookupn_profile+0x80/0xc0 [ 1820.363843] aa_label_strn_parse+0xa3a/0x1230 [ 1820.368409] ? aa_label_printk+0x850/0x850 [ 1820.372818] ? __lock_acquire+0x7ec/0x4ec0 [ 1820.377039] ? preempt_schedule+0x4d/0x60 [ 1820.381175] ? preempt_schedule_common+0x1f/0xe0 [ 1820.385915] ? graph_lock+0x170/0x170 [ 1820.389703] ? __lock_acquire+0x7ec/0x4ec0 [ 1820.393957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.399479] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 1820.404913] ? refcount_add_not_zero_checked+0x330/0x330 [ 1820.410353] ? graph_lock+0x170/0x170 [ 1820.414138] ? find_held_lock+0x36/0x1c0 [ 1820.418186] aa_label_parse+0x42/0x50 [ 1820.421969] aa_change_profile+0x513/0x3260 [ 1820.426278] ? lock_acquire+0x1ed/0x520 [ 1820.430237] ? aa_change_hat+0x1890/0x1890 [ 1820.434489] ? is_bpf_text_address+0xd3/0x170 [ 1820.438971] ? __mutex_lock+0x85e/0x1700 [ 1820.443020] ? proc_pid_attr_write+0x28a/0x540 [ 1820.447615] ? mutex_trylock+0x2b0/0x2b0 [ 1820.451662] ? save_stack+0xa9/0xd0 [ 1820.455291] ? save_stack+0x43/0xd0 [ 1820.458904] ? kasan_kmalloc+0xc7/0xe0 [ 1820.462802] ? __kmalloc_track_caller+0x14a/0x750 [ 1820.467633] ? proc_pid_attr_write+0x198/0x540 [ 1820.472199] ? graph_lock+0x170/0x170 [ 1820.475998] ? __x64_sys_write+0x73/0xb0 [ 1820.480048] ? graph_lock+0x170/0x170 [ 1820.483837] ? mark_held_locks+0x130/0x130 [ 1820.488059] apparmor_setprocattr+0xa8b/0x1150 [ 1820.492647] ? apparmor_task_kill+0xcb0/0xcb0 [ 1820.497126] ? lock_downgrade+0x900/0x900 [ 1820.501262] ? arch_local_save_flags+0x40/0x40 [ 1820.505843] security_setprocattr+0x66/0xc0 [ 1820.510148] proc_pid_attr_write+0x301/0x540 [ 1820.514553] __vfs_write+0x119/0x9f0 [ 1820.518263] ? check_preemption_disabled+0x48/0x280 [ 1820.523268] ? proc_loginuid_write+0x4f0/0x4f0 [ 1820.527855] ? kernel_read+0x120/0x120 [ 1820.531729] ? __lock_is_held+0xb5/0x140 [ 1820.535777] ? rcu_read_lock_sched_held+0x108/0x120 [ 1820.540783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.546306] ? __sb_start_write+0x1b2/0x370 [ 1820.550617] vfs_write+0x1fc/0x560 [ 1820.554144] ksys_write+0x101/0x260 [ 1820.557758] ? __ia32_sys_read+0xb0/0xb0 [ 1820.561828] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1820.567281] __x64_sys_write+0x73/0xb0 [ 1820.571156] do_syscall_64+0x1b9/0x820 [ 1820.575045] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1820.580411] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1820.585327] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1820.590155] ? trace_hardirqs_on_caller+0x310/0x310 [ 1820.595159] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1820.600194] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1820.605199] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1820.610047] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1820.615220] RIP: 0033:0x457569 [ 1820.618398] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1820.637280] RSP: 002b:00007f4738d5ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1820.644970] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1820.652239] RDX: 000000000000003c RSI: 0000000020000000 RDI: 0000000000000005 [ 1820.659490] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1820.666740] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4738d5b6d4 [ 1820.673991] R13: 00000000004c54ee R14: 00000000004d8e08 R15: 00000000ffffffff [ 1820.682144] Kernel Offset: disabled [ 1820.685765] Rebooting in 86400 seconds..