last executing test programs:

1m32.046815692s ago: executing program 3 (id=652):
bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='\n\x00\x00'], 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r0 = syz_io_uring_setup(0xa42, &(0x7f0000000140)={0x0, 0x1003, 0x80, 0x1, 0x802}, &(0x7f0000000240)=<r1=>0x0, &(0x7f00000001c0)=<r2=>0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_SYMLINKAT={0x26, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0, 0x1})
bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x18)
syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4)
io_uring_enter(r0, 0x47f8, 0x0, 0x0, 0x0, 0x0)
r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r3}, 0x18)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0)
perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00', r5}, 0x10)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="d800000018008103e00312ba0d8105040a600300ff0f040b067c55a1bc000900b80006990700000015000500fef32702d3001500030001400200000901ac040098007f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b66bce0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f00000e970300"/216, 0xd8}], 0x1}, 0x0)

1m31.891323672s ago: executing program 3 (id=657):
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44000000, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff)
sendmsg$NL80211_CMD_SET_TID_CONFIG(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000f80)=ANY=[], 0x38}, 0x1, 0x0, 0x0, 0x20000800}, 0x0)

1m31.861886412s ago: executing program 3 (id=658):
bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='\n\x00\x00'], 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r0 = syz_io_uring_setup(0xa42, &(0x7f0000000140)={0x0, 0x1003, 0x80, 0x1, 0x802}, &(0x7f0000000240)=<r1=>0x0, &(0x7f00000001c0)=<r2=>0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_SYMLINKAT={0x26, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0, 0x1})
r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x18)
syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4)
io_uring_enter(r0, 0x47f8, 0x0, 0x0, 0x0, 0x0)
r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r4}, 0x18)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0)
perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00', r6}, 0x10)
r7 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="d800000018008103e00312ba0d8105040a600300ff0f040b067c55a1bc000900b80006990700000015000500fef32702d3001500030001400200000901ac040098007f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b66bce0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f00000e970300"/216, 0xd8}], 0x1}, 0x0)

1m31.609373763s ago: executing program 3 (id=666):
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x54c, &(0x7f0000000fc0)="$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")
inotify_init1(0x0) (async)
r1 = inotify_init1(0x0)
inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0xa0)
socket$nl_route(0x10, 0x3, 0x0) (async)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001880)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$TOKEN_CREATE(0x24, &(0x7f0000000540), 0x8)
pipe(&(0x7f0000000580)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x20, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
memfd_create(&(0x7f0000000000)='prodM\xb0\xea\a\x06\xbe\xaen/\xce4\xb7\xc1\xef\xba!\x9d\rSt\xa24\t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1dz\xd05\xe2e,\xb1\x84\xea\x91^%A\xe5\x9e\x13TdT\xc6^p\xb0#R\x04\x06\xae\xebA;Y\xeb\x8f\xec\xb4\xf9\x17\xb7\x04\xc2\xc0\xc6\xb4\v\xff\xfc\x88\x90\xabC\x02\x00\xf04\x03\x88\xae9\'>R^P{Vr!\xe2W\xc72\xea\xb7Wp\xc36\x96\xffZ\\A@\x00\x00\x00\xc9\xf3Y\xb8\x89#\xa1\xb1)Dk\xeb\xa1\t\x00{u[\xbd\x9d\xf4\xbf\\\xce\x02P\xf2MY\x05^\xffj\x9c\x14\xb7\xb6v\x1d*1>\x00 \x00\x00\x00\x00\x14C?]\x8c\xb4Y\xcf\x80\x85\xd6\x036\xc8~\xa8\f\x00\x00\xb5M\x9a\x9dc\xaaAU\xec\xe06\xed\xe4\xfb\xdf\a\xd0lg\x13\xf9\x8b:s>\xd7s\xef\xb3\x9f#\x15)\xf9\xe10\xc7\xb262<k\xa8\x88\x01\x00fhD\xe7\xb6\x17\x80\x95\xa8\x1e\t\xb01KB\xcb\x00\x1e\x7fE\x7f\x02\x00\x00\x00y<nGR\x94\x99\xb8\x89\x9b\x8f\xd5\xe6\x02\xb5C\xad\"u\xf4>\x00\x00\x00\x00\x00\x00\x00\x00Nz\x0eu\x8f\x01\x00\x00\x00\x00\x00\x00\xdd\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc3\xa7/\x0f\x9b`\xa5\x98\x81a\xeev\x00\x00\x00\x00\a\x10\x00m2\xf2\xd8,\x17\xf8\x8e\xae\xc8\xad\xed<\"\x8e\n\x9d\xb13\x8d\xef\x96\xd2I\"8=tg\xdfU\xd0q\x95/f\xec\xdc\xa3\xe1[\xc0\xaa\xefz\xc9\xf4[\x00\x00\x00Q\xff}5\x94\x88\xa1\xdc\xa1g\xe0q\xc5:\xe4\xdf\x80\xb3,\xb9\xb2\xdc\x81\x9f6\x0f\x84WY\xbfSY`\xb8\a\x19\xb1\x058\xa4\xc3\xbb\xf8aB:\x84\x02?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf3o-GU\xb0\x00F\xb3o(aI[\xd6\x9fG\xaeI\x83\x93\x8cC\xc0#\xe0q\xd0Ex|\xdb\xa8\x16\xfe>:\t0\xfd\x8a\xc7\x84\xb5\xc7M-0A\xf0\x94\xf3\xcc\x8d\xbb3\\\"\x882\xb3\xa84\xac\x00\xdd}Ft\xc6\xcc\f}1X#\xe4\xe1\x94i\xce\xa1\xff\x95\x80\xb4T\x9c\x01\xf3\x1cLB\x94m(m\f\xbc\xebY\xa0\xf7\xf0\x9d\x10\xbd\x86\x1by\xe6\xdf\xc0\xc5\xb9\xb9\xbf\xdf~9\nC\xe9\xc5\x0e\xda\x9c(\x9b\"\xc7\x97\xfc\b\xd9\xc2T\xa7*}]\xc8\xb3 .\x9b\x89\x0f\xf8$\xdd>lU\x13EG\xbb1] \xda\x19\xc5\x9b\x15\x95\xc4\xfcw\xbb\x92\x91\xc4\xa6\x907XK\xfc\x17]\xfa\xff\'\xef\x92\x1c\xb8\x1fK\xb2o \xd1\xbd\xb2\x11+\xa3R\xefQ\xc2\xbdW\x05\xec\xb3=@\x03\xc6^\xa2\x15%\xb0\'D#\xb6Q\x8f\x82?S>\x0fP\x9cE\x92{d\xe6\x9cj1\x87\xb3\x01\xde\xe8\x89\xc4s\xb7\x14~}\xaa\x8c\xc3\x95BAE\xf2.\x8f#;a\x94\"\xd1U\xff\xe8v\xd3\x84d\xf4\x134\xa6XI\xe5h\xaa\x15\x9a\xf7Z\xe3%\x88p\x90\xbb\x9dt\xa3\xe1\r\x8d\x94\"\x19\x8b\x17)\xea\xd5\x17\xeb\xe4\x1b\x0fBZ1\xbe\xee\xfa\x1c\xf9\xa6\x11\x94\x06\\P:\xaf\xcex\xc2\x82\x9a\x16\xfc\xa1\xf9q\x12\xe3\x1a\xdc\xb7\x12\xbba\b\xbb\xed\xb2\xd1W\xe2\x8b\x8d8}\x10W\xbd\xa60A\xc3\x03\xfa\x890\x86#\bQ\xcb)\x00]\x9e\x14\xd2\xea\x82\xa8\xb7ZG\x15r\xf1\t\x00\x00\x00 \xc1\xaf\x19?\x00\\\x91\x13\x1b8\xe1\xc3\xa4\v\x94\xbfJ\xb5\xde\x95\x82\x00]B|\xe2[%\xe3\xf0\x04\xba\xed\xdb\xf5\x7f\x9d\xfe>\xf6m$M&\x7fq]\xe4\xf6\x82\xc3\x00\xb1zg}\x99E\xa4\x19\xe9\x1a4a\xd75D-k\x84\xa6\x12+\xebk\xa1\xfek\x89\xef\x18\xc1)6\xa65\xe2D\xbe\xe1\xdfq\xdd68\xf37g\xab9m\xe7\xddO\v?\xe0\xbe}\xa9U\xc7{\xd3\x16W\xbb\xe5\xd2\x93\xfe\xa4\x9d\r$\xe91c8`\x86\xbc)\xe29\xc3}\xb9P\xd5F\xc6\x12\x8c_x\xa8\xfa\xb5K\x03\x85\x93k\xe1\x8e\x1f)\".\xcc\'\v\xa6\x1bj\\\n\xe98yA\xd8T\x85\x80A\xcbo\x99\x99\xeb)r\x1a\xce\x18(\x185LL\xbcOeO\'\xe2\x86&\xe4\xe2\xe7~\x92\xa2\xb2\x1b\xc3\x00\x85\xce\xad7\x87\xa0\xfcc\xf5\xf8\xaf\v,q\xd4\x18\xbdM\x1a\xde\xba*L\x05m6\xecH\xd0T\xb8m\xdb\b\xa6\x02\xfb\x13\xac\x91\x8a\x8d\x94\x93\x8d=\xb1\x84\x9c\x9b\xe5\xc7\xa6\xc9Q\xc1eUc\xcc\x180^\x00\x00\x00\x00\x00\x00\x00\x00\xe7]6+\\\x00\x00\x00\x00?#C.\x1dj\xd9\xc3\xdd&\x80g:N\xec\x06[\x8f\x92\xe2\xb01\xb0\xef\x10,\xde\xf3\x86D\x8b\xf7\xf1>AH\xef\\\xf9\x8b\a\xe0\xb2\xcb\xf0\x97\b\r\xd5`\xb9\xd6\xa4\x1e\xbe\x12-}\xc5\x84\xde@\x18\x87\f\x01O\xedS\x8f\x9en,\xbce\xb2\xe4\x82v\x1c\xed\x84-s\xab\x06b\x9c\xba\xec\xa5\xc9A\x84\xd0\xe0 S\xc8\xa2\xaf\x85\v\xad\xa5\x88\xcf\xb6}`\x14\'\xea\xbfN\xac)\xa1\xe8\xb2\x9f\x112TJ\x16\x8c9\xe9\xf5\x18\x15Dd\x8a%>\x91\x93\x88\xe9\x18\x82]\x9e&\xfa\xaa\xfa8Z2\x00'/1301, 0x0)
syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) (async)
r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000a40000000000000000850000006d000000850000009e00000095"], &(0x7f0000000880)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000a40000000000000000850000006d000000850000009e00000095"], &(0x7f0000000880)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) (async)
ioctl$EXT4_IOC_MIGRATE(r1, 0x6609)
r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x50)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sys_enter\x00', r7}, 0x10)
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async)
r8 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
tgkill(r8, r8, 0x1b) (async)
tgkill(r8, r8, 0x1b)
ioctl$USBDEVFS_FREE_STREAMS(r5, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="02002302230102090500000010000020"])
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r3}, 0x18)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'gretap0\x00', <r9=>0x0})
ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000080)=r9) (async)
ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000080)=r9)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'\x00', 0x6132})

1m31.270308155s ago: executing program 3 (id=674):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
mkdir(&(0x7f00000020c0)='./file0\x00', 0x0)
mount$tmpfs(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000080), 0x0, 0x0)
mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0)
chdir(&(0x7f0000000100)='./file0\x00')
r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000380), &(0x7f00000003c0)=r3}, 0x20)
open_by_handle_at(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="080000000100000008"], 0xffa1)
bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="170000000000000005000000ff"], 0x48)
r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x485e, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x3c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0xffff, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0)
write$binfmt_script(r5, &(0x7f0000000540), 0x84)
mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000400)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff4d, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0)
mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1e, 0x12, r6, 0x0)
sysfs$1(0x1, &(0x7f0000000000)='\x00')
mount$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2a00a9, &(0x7f0000000080)={[{@huge_never}]})
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480), 0x41, 0x3f7, &(0x7f0000019580)="$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")

1m31.036229396s ago: executing program 3 (id=680):
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="d800000018008103e00312ba0d8105040a600300ff0f040b067c55a1bc000900b80006990700000015000500fef32702d3001500030001400200000901ac040098007f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b66bce0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f00000e970300"/216, 0xd8}], 0x1}, 0x0)

1m18.252881813s ago: executing program 32 (id=642):
r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10)
socket$inet_udplite(0x2, 0x2, 0x88)
openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r4}, 0x18)
socket$netlink(0x10, 0x3, 0x0)
r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10)
r7 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@ipv6_newnexthop={0x24, 0x68, 0x309, 0x70bd2c, 0x0, {}, [@NHA_FDB={0x4}, @NHA_ID={0x8, 0x1, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004002}, 0x40004)

1m15.967323933s ago: executing program 33 (id=680):
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="d800000018008103e00312ba0d8105040a600300ff0f040b067c55a1bc000900b80006990700000015000500fef32702d3001500030001400200000901ac040098007f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b66bce0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f00000e970300"/216, 0xd8}], 0x1}, 0x0)

1m9.694736571s ago: executing program 1 (id=1021):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70)
r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x34}, 0x10)

1m9.647067961s ago: executing program 1 (id=1023):
connect$unix(0xffffffffffffffff, 0x0, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10)
syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800714, &(0x7f0000000500), 0xff, 0x485, &(0x7f0000001040)="$eJzs3M9rHFUcAPDvTJL+bhNrrba2Gq1i8UfSpFV78KCi4EFB0EM9xiSttdtGmgi2BI0i9SgF7+JR8C/w5kXUgwheFTxKoWgQmnqKzK9mu9mkSZpkbfbzgc2+t/Nm3/vOzNt9My+zAbSt3uxPErEjIn6LiO4ie3OB3uJpZnpy+Pr05HASs7Nv/JXk5a5NTw5XRav1tpeZw2lE+mkSzyfz6x2/cPHMUK02er7M90+cfa9//MLFp06fHTo1emr03ODx48eODjz7zODTqxJnFte1/R+OHdj3yluXXxs+cfntH7/JmrX3YLG8Po5but4koCZ6s63292yucdmjy2j7nWBnXTrpbGFDWJaOiMh2V1fe/7ujI+Z2Xne8/ElLGwesqey7afPCi6dmgQ0siVa3AGiN6os+O/+tHus09PhfuPpCxKYyPTM9OTxzI/7OSMvXu9aw/t6IODH175fZI5Z7HQIAYAXysc2TzcZ/aezNn4u5jl3lHEpPRNwVEbsj4u6I2BMR90TkZe+NiPuKlWe7l1h/b0N+/vgnvdK0zaskG/89Vzf2m6mLv3zq6ShzO/P4u5KTp2ujR8ptcji6Nmf5gUXq+O6lXz9faFn9+C97ZPVXY8GyAVc6Gy7QjQxNDK3WRrj6ccT+zmbxJzdmArIjYF9E7F/eW++qEqcf//rAQoVuHf8iVmGeafariMeK/T8VDfFXksXnJ/u3RG30SH91VMz30y+XXl+o/tuKfxVk+3/bzcd/Q4nuf5JivrYrarXR8+PLr+PS758teE6z0uN/U/JmPmf98zvFax8MTUycH4jYlLya56tzuvz1wbl1q3xVPov/8KHm/X93uU4W//0RkR3EByPigYh4sGz7QxHxcEQcWiT+H1585N1F4k8iiZbu/5Gmn383jv+epH6+fgWJjjPff7vQjPnS9v+xmMo/awv5598tLLWBt7n5AAAA4I6QRsSOSNK+It27I9K0r6/4H/49sS2tjY1PPHFy7P1zI8U9Aj3RlVZXurrrrocOJFPlOxb5wfJacbX8aHnd+IuOrXm+b3isNtLi2KHdbb+5/0fV/zN/drS6dcCac78WtK/G/p+2qB3A+lvK979zAdiYmvT/ra1oB7D+nP9D+2rW/z9qyBv/w8Y0v///0eQn64CNyPgf2pf+D+1L/4e2dDv39a88Ud0ssPL32bLkO/zbJVH94sVa1rU15l6JtOUht1Ei6zHrW+ncb6gAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADcyf4LAAD///ss5ts=")
r2 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x275a, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2)
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000200)={0x70c, 0xcc, 0x1, 'queue1\x00', 0x1})
r4 = syz_open_dev$usbfs(0x0, 0xe, 0x60882)
ioctl$USBDEVFS_ALLOC_STREAMS(r4, 0x8008551c, &(0x7f0000000100)={0xc418, 0x1, [{0x1, 0x1}]})
socket$inet_sctp(0x2, 0x5, 0x84)
r5 = socket$inet6_sctp(0xa, 0x5, 0x84)
r6 = socket$inet6_sctp(0xa, 0x5, 0x84)
r7 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r8=>0x0}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={r8, 0x10, &(0x7f0000000380)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000180)=0x10)
r9 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r10=>0x0}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000001580)={r10, @in={{0x2, 0x0, @private=0xa010101}}}, &(0x7f0000000540)=0x9c)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, 0x0, 0x0)
ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000006c0)={0x0, 0x2904c, 0x0, 0x10003, '\x00', [{}, {0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xb}]})
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
socket$nl_netfilter(0x10, 0x3, 0xc)

1m8.813408395s ago: executing program 1 (id=1046):
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)
r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000005"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20)
socket$inet_sctp(0x2, 0x5, 0x84)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, r0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x30, &(0x7f00000001c0)={0x43}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)

1m8.731696155s ago: executing program 1 (id=1048):
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000c80)='./file1\x00', 0x210000, &(0x7f00000002c0)={[{@jqfmt_vfsv1}, {}, {@barrier_val}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@resuid}, {@nodelalloc}, {@acl}, {@noinit_itable}]}, 0xfc, 0x572, &(0x7f0000003780)="$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")
socket$inet(0x2, 0x2, 0x0)
r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040), 0x802, 0x0)
write$UHID_CREATE2(r0, &(0x7f0000000100)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x5b, 0x7fff, 0x101, 0x5, 0x3, 0x10000, "95dbf0e73863028ee9f05c79d32e70c5ba8a0987c5e4bc9b0d6038f9d3e6fc0083317a4bd02c7dea417cde1c80cabd074af007a1eea1d763245fb2764d64eb4bd63d514826a41061de8bde212e2836514dcd7115a0afc38b525f9d"}}, 0x173)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './bus'}, 0x9)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0)
r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
ptrace$poke(0x5, r2, &(0x7f0000000080), 0x0)

1m8.678065036s ago: executing program 1 (id=1050):
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]})
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0x4, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10)
syz_emit_ethernet(0x1f, &(0x7f0000000180)=ANY=[@ANYBLOB="ffffffffffff000000e8ff00001142"], 0x0)

1m8.022342218s ago: executing program 1 (id=1060):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, <r2=>0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00010000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001100)=ANY=[@ANYBLOB="61156c00000000006113a20000000000bf5000000000000016000000080000003d03010000000000250500000000000069163e0000000000bf07000000000000450607000fff0720670600003f000000160300000ee60060bf500000000000002f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44e2a2235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932fb3bba54b3a6aa57f1ad2e99e0e67ab9ff16d20000009f0f53acbb40b4f8e273827017826251ed834f2af97787f696649a462e7ee4bcf800000000000000000000004000bc00f679629709e75b99f9632b6ce78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000007b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1fff5f1be1969a1ba791ad46d800000000c7f26a0337302f3341eae59809fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf48903d3fc78700d429a2d4c8b6d803eb83eecfe4c700000000a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db80300c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d4a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff139604faf0453b65586f65c7943d54b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da20000d9ef418cf19e7a8c4c328be0ce91798a9c2dca871073f6bd61940aabc86b94f8cbde4d470667bee722a6a2af483ad0d3415ed0f9db009acaba9eaea93f811d434e00000000000000000000d1542c882e672fea96aedf346279ec000000000000000000000000c6427829b65ee55eef70520871b2a26df69559b5a06ad06d3d0183ae3b317478fff42cc48b461c56baea65a667000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ec0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x48)
perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x3c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x3, 0xffff, 0x0, 0x0, 0xfffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2)
syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f00000002c0)={[{@mb_optimize_scan}, {@resuid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@auto_da_alloc}, {@nombcache}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$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")
lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000040)=ANY=[], 0xfe37, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10)
unlink(&(0x7f0000000180)='./file1\x00')
syz_emit_ethernet(0xd7, &(0x7f0000000a40)={@random="e27614f7e517", @random="6487a2bed3d6", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x6c, 0x0, @private}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x9]}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x6, 0x24]}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x1, {0x1}}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x4}, 0x2, {0x2}}}, {0x8, 0x6558, 0x0, "d69458efd0cdd3fd563649c919bb2069c987e5f88c4dd6d29ca40938d69f148677dc14924f34ccf208b276020414dc3e678c33b90a60b97cc2f44ea43eb5dd3b2fd23414dadc647f69d8e6cc0f4b9c36441ddfca9bd4e1dbf5baabb04378d99ae913a301696e84865a5104"}}}}}}, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r4 = socket$nl_route(0x10, 0x3, 0x0)
setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000380)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'veth0_macvtap\x00', <r5=>0x0})
bind$packet(r1, &(0x7f0000000140)={0x11, 0xf6, r5, 0x1, 0x0, 0x6, @remote}, 0x14)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r3, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0], 0x0, 0x25, &(0x7f0000000680)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000640), 0x8, 0x2e, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10)
getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000580)=0x14)
socket$inet6_sctp(0xa, 0x1, 0x84)
ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000480)={'team0\x00', <r6=>0x0})
r7 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x8c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r6, {0x0, 0x3}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x5c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1], 0x0, [0x8, 0x4, 0x1000], [0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10, 0x0, 0x200]}}]}}]}, 0x8c}}, 0x0)

1m8.010637898s ago: executing program 34 (id=1060):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, <r2=>0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00010000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001100)=ANY=[@ANYBLOB="61156c00000000006113a20000000000bf5000000000000016000000080000003d03010000000000250500000000000069163e0000000000bf07000000000000450607000fff0720670600003f000000160300000ee60060bf500000000000002f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44e2a2235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932fb3bba54b3a6aa57f1ad2e99e0e67ab9ff16d20000009f0f53acbb40b4f8e273827017826251ed834f2af97787f696649a462e7ee4bcf800000000000000000000004000bc00f679629709e75b99f9632b6ce78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000007b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1fff5f1be1969a1ba791ad46d800000000c7f26a0337302f3341eae59809fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf48903d3fc78700d429a2d4c8b6d803eb83eecfe4c700000000a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db80300c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d4a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff139604faf0453b65586f65c7943d54b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da20000d9ef418cf19e7a8c4c328be0ce91798a9c2dca871073f6bd61940aabc86b94f8cbde4d470667bee722a6a2af483ad0d3415ed0f9db009acaba9eaea93f811d434e00000000000000000000d1542c882e672fea96aedf346279ec000000000000000000000000c6427829b65ee55eef70520871b2a26df69559b5a06ad06d3d0183ae3b317478fff42cc48b461c56baea65a667000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ec0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x48)
perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x3c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x3, 0xffff, 0x0, 0x0, 0xfffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2)
syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f00000002c0)={[{@mb_optimize_scan}, {@resuid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@auto_da_alloc}, {@nombcache}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$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")
lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000040)=ANY=[], 0xfe37, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10)
unlink(&(0x7f0000000180)='./file1\x00')
syz_emit_ethernet(0xd7, &(0x7f0000000a40)={@random="e27614f7e517", @random="6487a2bed3d6", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x6c, 0x0, @private}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x9]}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x6, 0x24]}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x1, {0x1}}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x4}, 0x2, {0x2}}}, {0x8, 0x6558, 0x0, "d69458efd0cdd3fd563649c919bb2069c987e5f88c4dd6d29ca40938d69f148677dc14924f34ccf208b276020414dc3e678c33b90a60b97cc2f44ea43eb5dd3b2fd23414dadc647f69d8e6cc0f4b9c36441ddfca9bd4e1dbf5baabb04378d99ae913a301696e84865a5104"}}}}}}, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r4 = socket$nl_route(0x10, 0x3, 0x0)
setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000380)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'veth0_macvtap\x00', <r5=>0x0})
bind$packet(r1, &(0x7f0000000140)={0x11, 0xf6, r5, 0x1, 0x0, 0x6, @remote}, 0x14)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r3, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0], 0x0, 0x25, &(0x7f0000000680)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000640), 0x8, 0x2e, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10)
getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000580)=0x14)
socket$inet6_sctp(0xa, 0x1, 0x84)
ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000480)={'team0\x00', <r6=>0x0})
r7 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x8c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r6, {0x0, 0x3}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x5c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1], 0x0, [0x8, 0x4, 0x1000], [0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10, 0x0, 0x200]}}]}}]}, 0x8c}}, 0x0)

53.419169934s ago: executing program 7 (id=1467):
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x13, 0x0, 0x2}]}}, 0x0, 0x26, 0x0, 0x9, 0x0, 0x0, @void, @value}, 0x28)
io_setup(0x30, &(0x7f0000000600))
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000001000000000000"], 0x48)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000300)=ANY=[@ANYRES8=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r1 = socket$kcm(0x29, 0x2, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x48)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r3 = socket$netlink(0x10, 0x3, 0x6)
sendmsg$nl_route_sched(r3, &(0x7f0000005c40)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000000)=@getqdisc={0x24, 0x26, 0x8, 0x70bd2b, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0x54945eb5ff8b407, 0x3}, {0x0, 0x3}, {0xa, 0xb}}}, 0x24}}, 0x0)
unshare(0x2040400)
prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00')
fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
unshare(0x22000e00)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
sendmmsg$unix(r5, &(0x7f0000004cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000380)="a1", 0x1}], 0x1, &(0x7f0000000a40)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r4], 0x30, 0x40400d1}}], 0x1, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240))
sendmsg$inet(r1, &(0x7f0000000340)={0x0, 0x7ffcb000, &(0x7f0000000300), 0x6}, 0x0)
futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0)
io_uring_setup(0x17c7, &(0x7f00000002c0))
futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0)

52.479137238s ago: executing program 7 (id=1496):
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x73b, 0x200}, 0x280, 0x0, 0xfffffffe, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="141300001000010000000000000000000000000a20000000000a01010000000000000000020000000900010073797a300000000048000000030a01010000000000000000020000000900010073797a30000000000900030073797a3200000000080007006e617400140004800800014000000001080002"], 0xa4}}, 0x0)

52.255806898s ago: executing program 7 (id=1500):
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x2, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e)
sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0)
recvmmsg(r0, 0x0, 0x0, 0x2, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10)
r4 = socket$inet6_dccp(0xa, 0x6, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x550, 0x1c0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x480, 0xffffffff, 0xffffffff, 0x480, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x1a0, 0x1c0, 0x60030000, {0x0, 0xff000000}, [@common=@inet=@recent0={{0xf8}, {0x81, 0x0, 0x24, 0x0, 'syz1\x00'}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x298, 0x2c0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x1c8, 0x4, 0x0, 'syz0\x00'}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5b0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0)

51.364843882s ago: executing program 7 (id=1521):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000bcd8c204cd496b0fedc4a9007157", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000005000000feffffff00"/28], 0x50)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kfree\x00', r1}, 0x10)
syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READ_FIXED={0x4, 0x4, 0x0, @fd_index=0x8, 0x10, 0x20000000, 0x20004, 0x0, 0x0, {0x1}})
syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x400c84, &(0x7f0000000340), 0x1, 0x786, &(0x7f0000001900)="$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")
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0)
open(&(0x7f0000001780)='./bus\x00', 0x64842, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000340)='./bus\x00', 0x0, 0x1000, 0x0)
r2 = open(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0)
syz_io_uring_setup(0x1526, &(0x7f0000000100), 0x0, 0x0)
ioctl$FS_IOC_SETFLAGS(r2, 0x4c02, &(0x7f0000000140))
creat(&(0x7f00000003c0)='./file0\x00', 0x9f)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10)
write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0x4)
r5 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0)
ioctl$SG_GET_VERSION_NUM(r5, 0x2284, &(0x7f0000000080))
r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10)
add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2000081, &(0x7f0000000080)=ANY=[@ANYRES8=0x0, @ANYRES8, @ANYRES64=r0, @ANYRES64=0x0], 0x0, 0x23e, &(0x7f0000000bc0)="$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")
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000001)
r8 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0)
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r8, 0xc018937c, &(0x7f0000000540)={{0x1, 0x1, 0x18, r5}, './file0\x00'})
socket$inet_udp(0x2, 0x2, 0x0)

51.110557824s ago: executing program 7 (id=1527):
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10)
bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6)
recvmmsg(r0, &(0x7f0000000f80)=[{{0x0, 0x0, 0x0}, 0x9}], 0x1, 0x2040, 0x0)

50.834960455s ago: executing program 7 (id=1541):
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x28, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='signal_generate\x00', r1}, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18)
r2 = socket$inet(0xa, 0x801, 0x84)
connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10)
listen(r2, 0x28)
r3 = accept4(r2, 0x0, 0x0, 0x0)
sendto$inet(r3, &(0x7f00000002c0)="cc", 0x1, 0x0, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, 0x8)
close(r3)

50.818051035s ago: executing program 35 (id=1541):
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x28, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='signal_generate\x00', r1}, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18)
r2 = socket$inet(0xa, 0x801, 0x84)
connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10)
listen(r2, 0x28)
r3 = accept4(r2, 0x0, 0x0, 0x0)
sendto$inet(r3, &(0x7f00000002c0)="cc", 0x1, 0x0, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, 0x8)
close(r3)

46.723604653s ago: executing program 0 (id=1616):
r0 = syz_io_uring_setup(0xa42, &(0x7f0000000140)={0x0, 0x1003, 0x80, 0x1, 0x802}, &(0x7f0000000240)=<r1=>0x0, &(0x7f00000001c0)=<r2=>0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_SYMLINKAT={0x26, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0, 0x1})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4)
io_uring_enter(r0, 0x47f8, 0x0, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000000000008500000086000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00', r4}, 0x10)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="d800000018008103e00312ba0d8105040a600300ff0f040b067c55a1bc000900b80006990700000015000500fef32702d3001500030001400200000901ac040098007f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b66bce0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f00000e970300"/216, 0xd8}], 0x1}, 0x0)

46.527902335s ago: executing program 0 (id=1623):
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10)
r1 = socket$kcm(0x21, 0x2, 0x2)
sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)=ANY=[], 0x10b8}, 0x0)
r2 = socket$rxrpc(0x21, 0x2, 0x2)
bind$rxrpc(r2, &(0x7f0000000400)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x2d) (fail_nth: 7)

46.254800305s ago: executing program 0 (id=1624):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10)
symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00')
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r2, 0x0, 0x30, 0xe1515f8735398fb, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[0x45c], 0x0, 0x0, 0x1, 0x1}}, 0x3c)

46.254229735s ago: executing program 0 (id=1625):
syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x22000011, &(0x7f0000000000)={[{@nobarrier}, {@grpquota}, {@user_xattr}]}, 0x86, 0x4a4, &(0x7f0000000d80)="$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")
r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0)
getdents(r0, 0xfffffffffffffffd, 0xbb)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000440)='rpcgss_seqno\x00', 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x18)
unshare(0x60400)
r1 = fsopen(&(0x7f0000000000)='devtmpfs\x00', 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="000000000000000000000000b48800008f556b8ffabb1e8a831ee0d684456da03eb6b33d15eb386e2cffae6ec678e5ad52798a5423f014f5ea4394b25538b65f941dcd6ee27ff0a4f2f53fe4e7a5f0b1f616f42dcbc546f209fedbe8a68fd49346df28db60d107164801c079", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000265f996e8284e0400000000000"], 0x50)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002004007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10)
openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0)
r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5, @void, @value}, 0x94)
socket$nl_xfrm(0x10, 0x3, 0x6)
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10)
openat$sndseq(0xffffffffffffff9c, 0x0, 0x62181)
r6 = socket$packet(0x11, 0x4000000000002, 0x300)
setsockopt$packet_int(r6, 0x107, 0x9, 0x0, 0x0)
socketpair$tipc(0x1e, 0x5, 0x0, 0x0)
r7 = socket$netlink(0x10, 0x3, 0x14)
r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b040001219547c391c98e6d93fa3adf5200000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, @void, @value}, 0x90)
r9 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0xc, &(0x7f0000000040)=ANY=[@ANYRES8, @ANYRES64=r1, @ANYRES64=r2], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10)
sendmsg$RDMA_NLDEV_CMD_NEWLINK(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001040)=ANY=[@ANYBLOB="380002000000000000000080000000000900020073797a300000000008004100736977001400330076657468305f746f5f68737220000000"], 0x38}, 0x1, 0x0, 0x0, 0x200000c5}, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0)
socket$kcm(0x10, 0x2, 0x0)

46.000204887s ago: executing program 0 (id=1633):
socket$nl_route(0x10, 0x3, 0x0)
socket$inet6_mptcp(0xa, 0x1, 0x106)
socket$inet_udp(0x2, 0x2, 0x0)
socket$inet_dccp(0x2, 0x6, 0x0)
socket$l2tp6(0xa, 0x2, 0x73)
socket$inet6_udplite(0xa, 0x2, 0x88)
socket$l2tp6(0xa, 0x2, 0x73)
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x1, 0x803, 0x0)
pipe(&(0x7f0000000100))
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x58}, 0x1, 0x200000000000000}, 0x0)

45.422673089s ago: executing program 0 (id=1639):
r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10)
writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)='7\x00', 0x2}], 0x1)
perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x3, 0x5, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2)
r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
ioctl$sock_qrtr_TIOCINQ(r3, 0x541b, &(0x7f00000000c0))
syz_read_part_table(0x60d, &(0x7f0000002240)="$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")
bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000062c40066f79075352334c7884e3800000000000500000000de69fdad50e748d5568c9ca4d63d449568e02383f8"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r4}, 0x10)
prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000001c0)={0x2, &(0x7f0000000180)=[{0x9, 0x3, 0x63, 0x472}, {0x8, 0x7, 0x0, 0xd22f}]})
syz_emit_ethernet(0x66, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaaaabbbbbbbbbbbb86dd606410a60030000000000000000000000000ffff00000000fe800000000000004e96a8eb5e1c0806bda98e211f4b3c00000000000000aa2900000000000000223427d5c9a46b9fa14172170a013589317d2af31ba55431762f462a5abc3f46494ee91bfca594d5"], 0x0)
r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$TIOCSSOFTCAR(r5, 0x5453, 0x0)
creat(&(0x7f0000000040)='./bus\x00', 0x0)
mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0)
r6 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0)
r7 = socket(0x2000000015, 0x80005, 0x0)
bind$inet6(r7, &(0x7f0000000000)={0xa, 0x4e21, 0xb8d2, @loopback}, 0x1c)
unshare(0x28000600)
sendto$inet6(r7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c)
recvfrom$inet6(r7, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, 0x20000000)
pwritev2(r6, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1200, 0xfb, 0x3)
ioctl$KDGKBDIACR(r5, 0x4b4a, &(0x7f0000000200))
r8 = fcntl$dupfd(r0, 0x0, r0)
ioctl$SG_IO(r8, 0x2285, &(0x7f0000000040)={0x53, 0xfffffffc, 0x6, 0x0, @buffer={0x2, 0x41001, &(0x7f00000000c0)=""/81}, &(0x7f0000000380)="259374c96ee3", 0x0, 0x0, 0x0, 0x0, 0x0})

45.403352989s ago: executing program 36 (id=1639):
r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10)
writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)='7\x00', 0x2}], 0x1)
perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x3, 0x5, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2)
r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
ioctl$sock_qrtr_TIOCINQ(r3, 0x541b, &(0x7f00000000c0))
syz_read_part_table(0x60d, &(0x7f0000002240)="$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")
bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000062c40066f79075352334c7884e3800000000000500000000de69fdad50e748d5568c9ca4d63d449568e02383f8"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r4}, 0x10)
prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000001c0)={0x2, &(0x7f0000000180)=[{0x9, 0x3, 0x63, 0x472}, {0x8, 0x7, 0x0, 0xd22f}]})
syz_emit_ethernet(0x66, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaaaabbbbbbbbbbbb86dd606410a60030000000000000000000000000ffff00000000fe800000000000004e96a8eb5e1c0806bda98e211f4b3c00000000000000aa2900000000000000223427d5c9a46b9fa14172170a013589317d2af31ba55431762f462a5abc3f46494ee91bfca594d5"], 0x0)
r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$TIOCSSOFTCAR(r5, 0x5453, 0x0)
creat(&(0x7f0000000040)='./bus\x00', 0x0)
mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0)
r6 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0)
r7 = socket(0x2000000015, 0x80005, 0x0)
bind$inet6(r7, &(0x7f0000000000)={0xa, 0x4e21, 0xb8d2, @loopback}, 0x1c)
unshare(0x28000600)
sendto$inet6(r7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c)
recvfrom$inet6(r7, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, 0x20000000)
pwritev2(r6, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1200, 0xfb, 0x3)
ioctl$KDGKBDIACR(r5, 0x4b4a, &(0x7f0000000200))
r8 = fcntl$dupfd(r0, 0x0, r0)
ioctl$SG_IO(r8, 0x2285, &(0x7f0000000040)={0x53, 0xfffffffc, 0x6, 0x0, @buffer={0x2, 0x41001, &(0x7f00000000c0)=""/81}, &(0x7f0000000380)="259374c96ee3", 0x0, 0x0, 0x0, 0x0, 0x0})

25.607259477s ago: executing program 2 (id=2113):
rmdir(0x0)

25.594353057s ago: executing program 2 (id=2114):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10)
symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00')
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r2, 0x0, 0x30, 0xe1515f8735398fb, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[0x45c], 0x0, 0x0, 0x1, 0x1}}, 0x3c)

25.578693847s ago: executing program 2 (id=2115):
bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a00000002000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="00000000ffffea0000000000000000000000000093860619af2a3746c3b2db6d7eacf4931f4253f498fcfa81c9280855058a9e4b86934249590025c326", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000c80)='./file1\x00', 0x210000, &(0x7f0000000580)={[{@jqfmt_vfsv1}, {@stripe={'stripe', 0x3d, 0x8}}, {@barrier_val={'barrier', 0x3d, 0x4}}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@nodiscard}, {@nodelalloc}, {@acl}, {@dioread_lock}]}, 0x1, 0x572, &(0x7f0000003780)="$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")
bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48)
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffff7a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
sendto$inet(r0, &(0x7f0000000280)="7675701b677284b5cbb4e1fd266791672ea4f2e77fc073736ae0c514d06d781b42a4a6b2d6c23e09282cfde4232a57a1196ae04c909efdc630f2275201f0ca20b2de332d09381d5feecb5373014207e4", 0x50, 0x11, &(0x7f0000000200)={0x2, 0x4e20, @private=0xa010100}, 0x10)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00')
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732600000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00008, 0x0, 0x50032, 0xffffffffffffffff, 0x0)

25.525136307s ago: executing program 2 (id=2117):
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000740)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000100)='kmem_cache_free\x00', r1, 0x0, 0xfffffffffffbfffe}, 0x18)
renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000001e80)={[{@inlinecrypt}]}, 0x1, 0x549, &(0x7f0000001800)="$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")
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r2 = socket$inet6(0x10, 0x3, 0x0)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000009f910000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r4 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301)
ioctl$USBDEVFS_CONTROL(r4, 0xc0105500, &(0x7f0000000040)={0x1, 0x1, 0x9394, 0x370, 0x0, 0x0, 0x0})
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
prctl$PR_SET_SECUREBITS(0x1c, 0x25)
syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f00000004c0)='./file0\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0xfd, 0x1bf, &(0x7f0000000300)="$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")
syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00')
mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1)
mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0)
setresuid(0xee01, 0xee01, 0x0)
r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00')
fchdir(r6)
mount(0x0, &(0x7f0000000bc0)='.\x00', &(0x7f0000000000)='proc\x00', 0x1004818, 0x0)
r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_open_procfs$namespace(r7, &(0x7f0000000300)='ns/time\x00')
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000380)='neigh_update\x00', r5}, 0x10)
r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000380)='neigh_update\x00', r8}, 0x10)
sendto$inet6(r2, &(0x7f00000000c0)="900000001c001f4d154a817393278bff0a80a578020000000104740014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000760700c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0)
r9 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0)
fsetxattr$system_posix_acl(r9, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x24, 0x2)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x2000000, 0x0, 0x1, 0x0, &(0x7f0000000000))

25.355609808s ago: executing program 2 (id=2118):
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10)
syz_emit_ethernet(0x6e, &(0x7f0000000080)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x38, 0x3a, 0x0, @local, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x7d0, {0x0, 0x6, "8cb02b", 0x0, 0x2f, 0x0, @loopback, @local, [@srh]}}}}}}}, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$TIPC_NL_KEY_SET(r4, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000003000000400001802c0004001400010002000000ac14142a00000000000000001400020002000000e0dab85c6c000000000000000d0001007564703a73"], 0x54}}, 0x0)
sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000008c0)={0x378, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x27}]}, @TIPC_NLA_NODE={0xe0, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "492137e615a5e4b779d6a2ed70c1682f9417ae2f02efea6d51d0502b6c50c480615bc6"}}, @TIPC_NLA_NODE_ID={0x8e, 0x3, "4f732c21350449b2d7192d2bb15c82e36c4e14075c1701ed35ba43230d5635a4a4ffca2ef7aee4d9dd6517a8616bed7300fa8719145b15467d4952ee8786ab87593d941576be294a8f661a85a6ecbcf6146facb96575e880eb2f7c622341599d93849396419111a761df3562e9aeb6a2cad593114ffdd925eddd7f2f93c2be0a4ee5fa32401383dbdbdd"}]}, @TIPC_NLA_BEARER={0xc8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffa}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5eef}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e24, @rand_addr=0x64010101}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_NODE={0xbc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ID={0xa0, 0x3, "81ea8f04b3177c89d67b15a031bb1c61969e5691c67cbdd78f38671d3058418fc20c0d441b6a260077c40978380be6694f5987e44c3a88dbb080ae0b6954af07af4a86eae60e6fa580fb87a5ec450a7a1287c0a817b8c839312ffe1f7d538dc2485add0c852c3130b731158fdc46d2270cadd871ac1a0d2995c5536145d14cff7f2118c164bab20348f7864017ffff40f7d7242607bf6fd5dd269af2"}, @TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x10000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1f7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xaa}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}]}, @TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}]}]}, 0x378}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040040)
syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x2000c12, &(0x7f0000000100)=ANY=[], 0x2, 0xa3a, &(0x7f0000001300)="$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")
r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0)
getdents64(r5, 0x0, 0x0)

25.210979039s ago: executing program 2 (id=2120):
r0 = socket(0xa, 0x3, 0x3a)
setsockopt$MRT6_INIT(r0, 0x29, 0xc8, &(0x7f0000000340), 0x4)
setsockopt$MRT6_FLUSH(r0, 0x29, 0xd1, 0x0, 0x0) (fail_nth: 2)

25.194442129s ago: executing program 37 (id=2120):
r0 = socket(0xa, 0x3, 0x3a)
setsockopt$MRT6_INIT(r0, 0x29, 0xc8, &(0x7f0000000340), 0x4)
setsockopt$MRT6_FLUSH(r0, 0x29, 0xd1, 0x0, 0x0) (fail_nth: 2)

1.665420953s ago: executing program 9 (id=2586):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e0000000000000005000000"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10)
r2 = socket(0x1, 0x2, 0x0)
r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000f8ffffff"], 0x50)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000180), &(0x7f00000000c0)=@tcp6=r2}, 0x20)
recvmsg(r2, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000440)=""/103, 0x67}], 0x1, 0x0, 0x67}, 0x0)
sendmmsg$unix(r2, &(0x7f0000002100)=[{{&(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x6e, 0x0}}], 0x1, 0x0)

1.578481763s ago: executing program 4 (id=2592):
mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000003, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a000000050000000400000006"], 0x50)
syz_io_uring_submit(0x0, 0x0, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='freezer.state\x00', 0x275a, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={r3, 0x20, &(0x7f00000004c0)={&(0x7f0000000600)=""/188, 0xbc, <r4=>0x0, &(0x7f0000000340)=""/13, 0xd}}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0x4, &(0x7f0000000580)=ANY=[@ANYRES32], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800001, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x14, &(0x7f0000000400)=ANY=[@ANYRES64, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x478)
mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000001, 0x12, 0xffffffffffffffff, 0x0)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r5, 0x0, 0x30, 0xe1515f8735398fb, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[0x45c], 0x0, 0x0, 0x1f, 0x1}}, 0x3c)

1.523934723s ago: executing program 9 (id=2594):
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x2, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e)
sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0)
recvmmsg(r0, 0x0, 0x0, 0x2, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10)
r4 = socket$inet6_dccp(0xa, 0x6, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x550, 0x1c0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x480, 0xffffffff, 0xffffffff, 0x480, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x1a0, 0x1c0, 0x60030000, {0x0, 0xff000000}, [@common=@inet=@recent0={{0xf8}, {0x81, 0x0, 0x24, 0x0, 'syz1\x00'}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x298, 0x2c0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x1c8, 0x4, 0x0, 'syz0\x00'}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5b0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0)

1.510270813s ago: executing program 4 (id=2597):
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x13, 0x0, 0x2}]}}, 0x0, 0x26, 0x0, 0x9, 0x0, 0x0, @void, @value}, 0x28)
io_setup(0x30, &(0x7f0000000600))
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000001000000000000"], 0x48)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000300)=ANY=[@ANYRES8=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r1 = socket$kcm(0x29, 0x2, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r2 = socket$netlink(0x10, 0x3, 0x6)
sendmsg$nl_route_sched(r2, &(0x7f0000005c40)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000000)=@getqdisc={0x24, 0x26, 0x8, 0x70bd2b, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0x54945eb5ff8b407, 0x3}, {0x0, 0x3}, {0xa, 0xb}}}, 0x24}}, 0x0)
unshare(0x2040400)
prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00')
fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
unshare(0x22000e00)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
sendmmsg$unix(r4, &(0x7f0000004cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000380)="a1", 0x1}], 0x1, &(0x7f0000000a40)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r3], 0x30, 0x40400d1}}], 0x1, 0x10)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240))
sendmsg$inet(r1, &(0x7f0000000340)={0x0, 0x7ffcb000, &(0x7f0000000300), 0x6}, 0x0)
futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0)
r5 = io_uring_setup(0x17c7, &(0x7f00000002c0))
futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0)
futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000), &(0x7f0000048000)=0x1, 0x0)
close_range(r5, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]})

1.451737743s ago: executing program 6 (id=2598):
bpf$TOKEN_CREATE(0x24, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
modify_ldt$read(0x0, 0x0, 0x0)
r0 = syz_io_uring_setup(0x4174, &(0x7f0000000780)={0x0, 0x7e05, 0x10100}, &(0x7f0000000100)=<r1=>0x0, &(0x7f0000000040)=<r2=>0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/4, 0x4}], 0x27})
r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)
r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
prctl$PR_MCE_KILL(0x21, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10)
lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=@known='trusted.overlay.redirect\x00', &(0x7f0000000280)=""/105, 0x69)
io_uring_enter(r0, 0x567, 0x0, 0x0, 0x0, 0x0)

1.451500664s ago: executing program 6 (id=2599):
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=@newlink={0x38, 0x10, 0x439, 0x70fd2c, 0xffffffea, {0x0, 0x0, 0xe403, 0x0, 0x3, 0x610c3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}]}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x4000040)
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4)
r2 = socket$packet(0x11, 0x2, 0x300)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000240)={0x2, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10)
syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'gretap0\x00', <r3=>0x0})
sendto$packet(r1, &(0x7f0000000180)="0b036800e0ff64000200475400f6a13bb1000000080086dd4803", 0x100a6, 0x0, &(0x7f0000000140)={0x11, 0x0, r3}, 0x14)
r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_free\x00', r4}, 0x18)
write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='signal_generate\x00'}, 0x10)
syz_mount_image$iso9660(&(0x7f0000002900), &(0x7f0000000240)='./file1\x00', 0x8c48, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRESOCT=0x0, @ANYRES32], 0x1, 0x5d1, &(0x7f0000002940)="$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")

1.420894924s ago: executing program 6 (id=2600):
unshare(0x62040200)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
r0 = syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000000)='./file1\x00', 0x844, &(0x7f0000000bc0)=ANY=[@ANYBLOB="00694ba7e2ae8959c3a1a1006a809454d1b9e49ca9bcfc4fc4988c654d24bf47f27cf5182a66907790f63da0382e7e8b6fa7bc01215b438ad0a0c54300383d371f98a51969e94000800000d1a09c066c83c90eb1659f642d9740b323fc7da8f03a2e547ee2dd62af8c0b51da0e3b75a1ccf23bb04d83fa977502819dcc5fbe622c4c35880cfe115f8743ddf5255ed6532d8ce9391e704bb6c64bf7bd3c353b218ccf99b00749bc4d22cdc096d92b7e3f7731bfbfc5af583df7f136a59dade8dafa14bcefad343a259d07d5b6e7152b1031acbba628c1f5310e53cd87b92c6be007f8aa026ce147dfd51281dba68af9b738f0a097f69b277ef9a9bd369a107367e5ed6f27bd9ef071148bc60b4845accf826763066baf9b092754602e7fe53fbd347a39262850be890a0300863518f5cd8e1d6d388c66123eac43a65f0b3a585c80576666c4ee5d579c349d415741bd3de7fd5af2fa9b50f63bbd192fa1ee4eb9d2eb2b4afffa5dd5a32f292bffcecbcc18071375b13aa12b581b2b23e80fb7a1eca9816df0137b589441fca8b569993caed53c6d9deae218"], 0x1, 0x253, &(0x7f00000004c0)="$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")
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYRES64=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94)
r1 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0)
sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000ab4000000060a01040000000000000000020000280900010073797a30000000000900020073797a320000000088000480100001800c000100636f756e7465720014000180090001006d6173710000000004000280600001800a0001006c696d6974000000500002800c000140000000000000000808000440000000010c00014000000000000080010c00024000000000000000090800034000000fba0c0002"], 0xdc}}, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="170000000000000005000000ff"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
io_setup(0x81, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000ec0)=ANY=[@ANYBLOB="0b00ba69f35663662471a8300000000800000005000000a8c3d3d37f1a9aeece3cb9a8ae9f3333fb292e1f63868f8826ce1913dadd4bf4efb71711ff3cf7cadc9c891ca628e7fbc1dc56b9d793cde5b6246afea86f409019f4afe1bb0bceb95bfe5559f1650d2b40adc50938732e0d91cda2d7a46636570c62f2300fe7ffa06fad8addbf7e68f09f8fe53b62a6040c67653f6a9767d38af030ac5e9611e198727f2e82a9602df900"/179, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
fcntl$lock(r4, 0x26, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x3})
fcntl$lock(r4, 0x25, 0x0)
fcntl$lock(r4, 0x25, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r5 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000900)={&(0x7f0000000040), 0xc, &(0x7f00000008c0)={&(0x7f0000000d80)={0x114, 0x0, 0x5df1e6f79a0ca22, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x794}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x76}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffe}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffe}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x40}, 0x4044004)
perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x4e, 0x1, 0x0, 0x0, 0x0, 0x210e, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fff, 0xaea}, 0x110104, 0x8, 0x10000, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l')
r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080))
syz_clone3(&(0x7f0000000840)={0x8000, &(0x7f0000000240), &(0x7f0000000280)=<r7=>0x0, &(0x7f00000002c0), {0x2f}, &(0x7f0000000380)=""/65, 0x41, &(0x7f0000000740)=""/243, &(0x7f0000000300)=[0xffffffffffffffff], 0x1, {r4}}, 0x58)
fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000400)={0xca54d6adfb409e4b, 0x3, 0x1, 0x1, r7})
write$cgroup_subtree(r6, &(0x7f0000000100)={[{0x0, 'io'}]}, 0x4)
sendmsg$nl_xfrm(r5, 0x0, 0x4810)
bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0)
execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0)
openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0)

1.282253564s ago: executing program 8 (id=2608):
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=@newlink={0x38, 0x10, 0x439, 0x70fd2c, 0xffffffea, {0x0, 0x0, 0xe403, 0x0, 0x3, 0x610c3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}]}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x4000040)
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4)
r2 = socket$packet(0x11, 0x2, 0x300)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000240)={0x2, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10)
syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'gretap0\x00', <r3=>0x0})
sendto$packet(r1, &(0x7f0000000180)="0b036800e0ff64000200475400f6a13bb1000000080086dd4803", 0x100a6, 0x0, &(0x7f0000000140)={0x11, 0x0, r3}, 0x14)
r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_free\x00', r4}, 0x18)
write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
syz_emit_ethernet(0x12, &(0x7f00000004c0)={@multicast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @void, {@llc={0x4, {@llc={0x42, 0x42, "f3", "f4"}}}}}, 0x0)

1.179371295s ago: executing program 8 (id=2610):
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=@newlink={0x38, 0x10, 0x439, 0x70fd2c, 0xffffffea, {0x0, 0x0, 0xe403, 0x0, 0x3, 0x610c3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}]}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x4000040)
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4)
r2 = socket$packet(0x11, 0x2, 0x300)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000240)={0x2, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10)
syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'gretap0\x00', <r3=>0x0})
sendto$packet(r1, &(0x7f0000000180)="0b036800e0ff64000200475400f6a13bb1000000080086dd4803", 0x100a6, 0x0, &(0x7f0000000140)={0x11, 0x0, r3}, 0x14)
r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_free\x00', r4}, 0x18)
write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='signal_generate\x00'}, 0x10)
syz_mount_image$iso9660(&(0x7f0000002900), &(0x7f0000000240)='./file1\x00', 0x8c48, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRESOCT=0x0, @ANYRES32], 0x1, 0x5d1, &(0x7f0000002940)="$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")

1.124064365s ago: executing program 8 (id=2612):
r0 = syz_open_dev$loop(&(0x7f0000000280), 0x51, 0x20000)
ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000a40))
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x18)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]})
r4 = socket$inet_dccp(0x2, 0x6, 0x0)
getsockopt$inet_dccp_int(r4, 0x21, 0x10, &(0x7f0000000040), &(0x7f0000000340)=0x31)
r5 = io_uring_setup(0x2528, &(0x7f0000000600)={0x0, 0x10000, 0x400, 0x80000, 0x26c})
syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x804810, &(0x7f00000002c0), 0x4, 0x76b, &(0x7f0000001400)="$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")
creat(&(0x7f0000000300)='./file0\x00', 0x1a2)
mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='hugetlbfs\x00', 0x0, 0x0)
chdir(&(0x7f00000001c0)='./file0\x00')
r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0)
r7 = socket$inet6_sctp(0xa, 0x5, 0x84)
shutdown(r7, 0x0)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10)
r8 = socket(0x2, 0x80805, 0x0)
r9 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r10=>0x0}, &(0x7f0000000040)=0x8)
setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0x76, &(0x7f0000000140)=@assoc_value={r10}, 0x8)
getdents(r6, 0xfffffffffffffffd, 0x58)
syz_emit_ethernet(0x88, &(0x7f0000000100)={@remote, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x52, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "ef7cc1", 0x0, 0x0, 0x0, @private0, @dev, [], "2b03e411709c8af2a4e40d15eb620aa7b9a21c82b539efb86cae5c4cf5943ac4c10d"}}}}}}}, 0x0)
r11 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0)
io_uring_register$IORING_UNREGISTER_PERSONALITY(r5, 0x16, 0x20000002, r11)
r12 = socket$inet6_udplite(0xa, 0x2, 0x88)
sendmmsg$inet6(r12, &(0x7f0000000380)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote, 0x9}, 0x1c, 0x0, 0x0, &(0x7f00000020c0)=ANY=[@ANYBLOB="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"], 0x590}}], 0x1, 0x8008801)
mount$9p_fd(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000002c0), 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="7472616e732672668eb92b88d5612226556d4ac1646e6f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="2c6163636573733d757365722c646f6e745f61707072616973652c7375626a5f726f6c653d2c7375626a5f747970653dffffffffffff2c646f6e745f61707072616973652c6e6f6d616e642c61707072616973655f747970653d696d617369672c00"])
write$binfmt_script(r12, &(0x7f0000002d40)={'#! ', './file0', [{0x20, '(+p\xaa\xbfv\x1f\xdc\xf0\x93\xcf#@@P/\x87\xc1\x1d\xb7\x10-+\t\x13)K\x023l]\x13\x99\xc4\x9d\xea\xfbU\xd4]\x19\x9f\xdc\x87\xa4\xac\n\x93\xc1\xbf\x84\xac\xb5\xffdi/4\"9\x06\xd6\xdc\xe5\x94\xbdO\t\v\x92\xdd\xac\xca\x90\x83\x0fsR'}, {0x20, '\\'}]}, 0x5c)

875.388687ms ago: executing program 8 (id=2615):
socket$igmp(0x2, 0x3, 0x2)
mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000003, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e8500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000340)='tlb_flush\x00', r1}, 0x10)
r2 = creat(&(0x7f00000002c0)='./file0\x00', 0x0)
r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a000000050000000400000006"], 0x50)
syz_io_uring_submit(0x0, 0x0, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='freezer.state\x00', 0x275a, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={r4, 0x20, &(0x7f00000004c0)={&(0x7f0000000600)=""/188, 0xbc, <r5=>0x0, &(0x7f0000000340)=""/13, 0xd}}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0x4, &(0x7f0000000580)=ANY=[@ANYRES32], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800001, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x14, &(0x7f0000000400)=ANY=[@ANYRES64, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
write$binfmt_elf64(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x478)
mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000001, 0x12, 0xffffffffffffffff, 0x0)
r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r6, 0x0, 0x30, 0xe1515f8735398fb, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[0x45c], 0x0, 0x0, 0x1f, 0x1}}, 0x3c)

851.358436ms ago: executing program 5 (id=2617):
r0 = getpid()
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r2}, 0x10)
r3 = syz_pidfd_open(r0, 0x0)
setns(r3, 0x24020000)
syz_clone3(&(0x7f00000008c0)={0x14860000, 0x0, 0x0, 0x0, {0x28}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58)

815.330937ms ago: executing program 5 (id=2618):
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81a01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0xf)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000600000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000001eea397e00"/28], 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
close(r3)
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48)
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]})
syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x4000, &(0x7f0000000380), 0xd, 0x5d8, &(0x7f0000002080)="$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")
chdir(&(0x7f0000000080)='./file0\x00')
r6 = memfd_create(&(0x7f00000000c0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec', 0x0)
write$binfmt_script(r6, &(0x7f0000000200)={'#! ', './file0'}, 0xb)
execveat(r6, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

773.061647ms ago: executing program 6 (id=2619):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f0000"], 0x48)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000540)={{r0}, &(0x7f00000004c0), &(0x7f0000000500)='%-5lx  \x00'}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
readv(0xffffffffffffffff, &(0x7f0000001340), 0x100000000000027d)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10)
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a31000000001400078005001500070000000800124000000000050005000200000005000400000000000d000300686173683a6e6574"], 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x0)
sendmsg$IPSET_CMD_DESTROY(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="1c000000030601010000000000000000000000000500010007"], 0x1c}}, 0x0)

756.240927ms ago: executing program 5 (id=2620):
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x3)
r1 = socket$inet6(0xa, 0x1, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0xa, 0x2000, 0xa, @loopback, 0x2b5}, 0xffffffffffffff18)
r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="9feb010018000000000000000c000000080000000500000003f9ffffffffff07000000000000005f005266bcf639818f6dee533ef53349ed22dbb640ea6608fa1bf832e03575979a04b093346a93f81331d29c2441e0faa29b4478a81ad6ab1e33e87cee91d7406613ee0193c8"], 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0x2, &(0x7f00000000c0)=@raw=[@cb_func], &(0x7f0000000140)='syzkaller\x00', 0x6, 0xff, &(0x7f0000000340)=""/255, 0x0, 0x4e, '\x00', 0x0, 0x25, r2, 0x9, &(0x7f0000000200)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r4, &(0x7f0000000200), 0xf000)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r3, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xff, @void, @value}, 0x94)
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r6 = gettid()
syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file2\x00', 0x101080e, &(0x7f00000001c0)=ANY=[@ANYBLOB="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", @ANYRES16=r6, @ANYRESOCT=r6], 0x1, 0x67e, &(0x7f0000001600)="$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")
r7 = open$dir(&(0x7f0000000580)='./file0\x00', 0x0, 0x0)
mmap(&(0x7f0000268000/0x4000)=nil, 0x4000, 0x1000002, 0x4016012, r7, 0x0)
process_vm_writev(r6, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0)
r8 = socket$nl_xfrm(0x10, 0x3, 0x6)
r9 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYRESOCT=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r9}, &(0x7f0000000000), &(0x7f00000003c0)}, 0x20)
r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0xa, 0xc, &(0x7f0000000900)=ANY=[@ANYBLOB="0e7fb306594d050d2f25cdce99fa45179d7d950706ad0d7f1fca4f05840e8b4ee778033edba513eea4323b7f783b34e01aa64e129922a933fdd73c9ddfbf17e1954fcaac5d66346ac3ea12c5cb12d48b73bdbf6080db3e6641f6e507d088d15072aa8e36ba41fbf44431c225c6859e9cb86cccef36d358e1c01e9ee7292689aaf6599ddaf5e61c4678bdc1d92854d2c679dea1902ecffbf27d8908f0982ccca6ab77653829f4d6d6c760b13922b620fe43e37fe51f45a0f174dbcef97a6601895955cdf0d7b15150e9b10f09c480dba2df87abf36508bdb98b47a56de5625c8e5cfd5b54094589e5bfa0b3f8bd9bca5a6aa6ca", @ANYBLOB="24798826eaec297e19f29819abaaca2055ce3362f83caf1d27ae833b0056cc5e2ce886b975b3d8c7de0b91b2f5b68952d1e61ff509f7db2d9ac5d3befb8d4074ce751b2e80b468de0bb9bfecc529dd672b01d52a6663bb77749b4b85ec86d0b141c15cdff2f42abb1e0718ed14570b002471ede3fe4527f3fcea8f8c913b908004fff4f3226b1190c9e022b0e4c71e29868c791aaeac7d8e4ff953fce0ab2b67a29f67154e6266eb3f34abaaefb7cf485e", @ANYRES64], &(0x7f00000002c0)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x18)
r11 = socket(0x840000000002, 0x3, 0xff)
setsockopt$SO_BINDTODEVICE(r11, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10)
sendmmsg$inet(r11, &(0x7f0000000440)=[{{&(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000200)="a9050000000074640000000000003552bde5c064c6", 0x15}, {&(0x7f0000000340)="174640b6d80fb2eedc81ba60ccbb9d", 0xf}], 0x2}}], 0x1, 0x0)
sendmsg$nl_xfrm(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="fc0000001900674c0000000000000000e0000001000000000000000000000000e000000200000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000400000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000044000500000000000000000000000000000000000000000033"], 0xfc}}, 0x0)
sendmmsg$inet6(r1, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c11)

744.667517ms ago: executing program 8 (id=2621):
mmap(&(0x7f0000261000/0xc00000)=nil, 0xc00000, 0x1000001, 0x31, 0xffffffffffffffff, 0x0) (async)
syz_open_procfs(0xffffffffffffffff, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
openat$selinux_context(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async)
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x1, &(0x7f0000000180)=0x8) (async)
r1 = getpid() (async)
r2 = openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) (async)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e)
sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) (async)
recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r5 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'veth0_vlan\x00', <r6=>0x0})
sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=@getchain={0x24, 0x11, 0x43d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x24}}, 0x0)
mbind(&(0x7f0000651000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000000)=0x9, 0x4, 0x0)

706.689627ms ago: executing program 6 (id=2622):
r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d)
r2 = syz_open_procfs(0x0, &(0x7f0000000580)='net/tcp6\x00')
preadv(r2, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/65, 0x41}], 0x1, 0x1ef, 0x0)

595.606917ms ago: executing program 5 (id=2623):
socket$igmp(0x2, 0x3, 0x2)
mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000003, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0)
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a000000050000000400000006"], 0x50)
syz_io_uring_submit(0x0, 0x0, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='freezer.state\x00', 0x275a, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={r3, 0x20, &(0x7f00000004c0)={&(0x7f0000000600)=""/188, 0xbc, <r4=>0x0, &(0x7f0000000340)=""/13, 0xd}}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0x4, &(0x7f0000000580)=ANY=[@ANYRES32], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800001, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x14, &(0x7f0000000400)=ANY=[@ANYRES64, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x478)
mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000001, 0x12, 0xffffffffffffffff, 0x0)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r5, 0x0, 0x30, 0xe1515f8735398fb, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[0x45c], 0x0, 0x0, 0x1f, 0x1}}, 0x3c)

581.439537ms ago: executing program 5 (id=2624):
syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./bus\x00', 0x0, &(0x7f0000000040)={[{}]}, 0x1, 0x4e2, &(0x7f0000000b80)="$eJzs3c9vG1kdAPDvTOImm81usrASPwRsWRYKqmon7m602tNyAaHVSogVJw7ZkLhRFDuOYmdpQiXS/wGJSpzgT+CAxAGpJ+7c4MalHJAKVKAGiYPRjCdpSOMkbRMb7M9HGs28eeP5vldr3nO/SfwCGFlXI2IvIq5ExMcRMVOcT4ot3u9u2XWPH91Z3n90ZzmJTuejvyV5fXYujrwm83Jxz8mI+N63I36YPB23tbO7vlSv17aKcqXd2Ky0dnZvrDWWVmurtY1qdWF+Ye7dm+9UL6yvbzR+9fBbax98/7e/+eKD3+9948dZs6aLuqP9uEjdrpcO42TGI+KDywg2AGNFf64MuiE8lzQiPhURb+bP/0yM5e/m+ZzwWAMA/wc6nZnozBwtAwDDLs1zYElaLnIB05Gm5XI3h/d6TKX1Zqt9/VZze2OlmyubjVJ6a61emytyhbNRSrLyfH78pFw9Vr4ZEa9FxE8nXsrL5eXz5xkAgIv18rH5/58T3fkfABhyk2ddsNifdgAA/XPm/A8ADB3zPwCMHvM/AIwe8z8AjB7zPwCMnmL+Hxt0OwCAvvjuhx9mW2e/+P7rlU92ttebn9xYqbXWy43t5fJyc2uzvNpsrtZr5eVm46z71ZvNzfm3Y/t2pV1rtSutnd3FRnN7o72Yf6/3Yq3Ul14BAKd57Y37f0wiYu+9l/ItjqzlYK6G4ZYOugHAwMj5w+jyLdwwuvwfHzhrLc+evyJ87zmCdX7yHC8CLtq1z8n/w6iS/4fRJf8Po0v+H0ZXp5P0WvM/PbwEABgqcvxAX3/+DwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAENiOt+StFysBT4daVouR7wSEbNRSm6t1WtzEfFqRPxhojSRlecH3WgA4AWlf0mK9b+uzbw1fbz2SvKviXwfET/6+Uc/u73Ubm/NZ+f/fni+fa84Xx1E+wGAsxzM0wfz+IHHj+4sH2z9bM/Db3YXF83i7hdbt2Y8xvP9ZJQiYuofSVHuyj6vjF1A/L27EfHZk/qf5LmR2WLl0+Pxs9iv9DV++l/x07yuu8/+LT79DDHPWusVRsX9bPx5/6TnL42r+X7yxMWPJ/MR6sUdjH/7T41/6eH4N9Zj/Lt63hhv/+47PevuRnx+/KT4yWH8pEf8t84Z/09f+NKbveo6v4i4FifHPxqr0m5sVlo7uzfWGkurtdXaRrW6ML8w9+7Nd6qVPEddOchUP+2v711/9bT+T/WIP3lG/796aq87EwdHv/z3xz/48inxv/6Vk9//10+Jn82JXzs1/hNLU7/uuXx3Fn+l2/+7z/r+Xz9n/Ad/3l0556UAQB+0dnbXl+r12taFHpTigm945CC5pDY7GPKD7PP4i97nM0XK7H+gO5d9MOiRCbhsTx76QbcEAAAAAAAAAAAAAADo5dL/nCgddA8BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYZv8JAAD//wqryik=")
r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0)
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000005c0))
r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0)
r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
ftruncate(r3, 0x5)
lseek(r2, 0x7387, 0x0)
syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x200000, &(0x7f0000000440)={[{@nojournal_checksum}, {@nombcache}, {@errors_remount}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@bh}, {@mblk_io_submit}, {@usrquota}, {@noauto_da_alloc}]}, 0xfa, 0x57a, &(0x7f00000013c0)="$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")
setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000900)=ANY=[], 0xfeeb, 0x0)
r4 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0)
unlinkat(r4, &(0x7f0000000000)='./file0\x00', 0x0)
r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0)
sendfile(r2, r5, 0x0, 0x8400fffffffa)
ioctl$EXT4_IOC_MIGRATE(r1, 0x6609)
ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2)

529.711568ms ago: executing program 9 (id=2625):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001e80)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021181500001e0a05010000000000000000070000000900020073797a31000000000900010073797a3000000000ec140380300000802c000180250001"], 0x159c}}, 0x0) (fail_nth: 7)

526.744878ms ago: executing program 4 (id=2626):
r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="020000000400fcff070000000100000180000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r0}, 0x4)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r2}, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x520, 0x340, 0x25, 0x148, 0x0, 0x60, 0x488, 0x2a8, 0x2a8, 0x488, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@set={{0x40}}, @common=@unspec=@statistic={{0x38}}]}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x580)

513.185698ms ago: executing program 6 (id=2627):
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x4, @multicast, 'erspan0\x00'}}, 0x1e)
r2 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r2, &(0x7f00000000c0)={0x18, 0x0, {0x2, @empty, 'veth1_to_bridge\x00'}}, 0x1e)
sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800000010000108000000000000020000000000", @ANYRES32=0x0, @ANYBLOB="804001000000000008001b00"], 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x0)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0), 0xffffffffffffffff)
sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01000000000000000000010000004000018007000600666f000008000800000000000600010002000000080005"], 0x54}, 0x1, 0x0, 0x0, 0x40001}, 0x0)

179.531019ms ago: executing program 4 (id=2628):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$inet6_tcp_int(r0, 0x6, 0x24, 0x0, &(0x7f0000000100))
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x3e, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10)
r4 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='cpu&-0\t||')
socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x4, 0x0, 0x0)

179.313209ms ago: executing program 9 (id=2629):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10)
symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00')
bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0)

179.05272ms ago: executing program 4 (id=2630):
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10)
r1 = socket$inet6(0xa, 0x2, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10)
bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
recvmmsg(r1, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0}, 0x8001}], 0x1, 0x0, 0x0)
sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)

152.60744ms ago: executing program 9 (id=2631):
socket$igmp(0x2, 0x3, 0x2)
mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000003, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e8500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000340)='tlb_flush\x00', r1}, 0x10)
r2 = creat(&(0x7f00000002c0)='./file0\x00', 0x0)
r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a000000050000000400000006"], 0x50)
syz_io_uring_submit(0x0, 0x0, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='freezer.state\x00', 0x275a, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={r4, 0x20, &(0x7f00000004c0)={&(0x7f0000000600)=""/188, 0xbc, <r5=>0x0, &(0x7f0000000340)=""/13, 0xd}}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0x4, &(0x7f0000000580)=ANY=[@ANYRES32], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800001, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x14, &(0x7f0000000400)=ANY=[@ANYRES64, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
write$binfmt_elf64(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x478)
mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000001, 0x12, 0xffffffffffffffff, 0x0)
r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r6, 0x0, 0x30, 0xe1515f8735398fb, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[0x45c], 0x0, 0x0, 0x1f, 0x1}}, 0x3c)

71.75558ms ago: executing program 4 (id=2632):
r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00'}, 0x18)
unshare(0xa000200)
semtimedop(0x0, 0x0, 0x0, 0x0)
unshare(0x60400) (fail_nth: 17)

12.18356ms ago: executing program 5 (id=2633):
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x13, 0x0, 0x2}]}}, 0x0, 0x26, 0x0, 0x9, 0x0, 0x0, @void, @value}, 0x28)
io_setup(0x30, &(0x7f0000000600))
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000001000000000000"], 0x48)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000300)=ANY=[@ANYRES8=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r1 = socket$kcm(0x29, 0x2, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x48)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r3 = socket$netlink(0x10, 0x3, 0x6)
sendmsg$nl_route_sched(r3, &(0x7f0000005c40)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000000)=@getqdisc={0x24, 0x26, 0x8, 0x70bd2b, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0x54945eb5ff8b407, 0x3}, {0x0, 0x3}, {0xa, 0xb}}}, 0x24}}, 0x0)
unshare(0x2040400)
prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00')
fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
unshare(0x22000e00)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
sendmmsg$unix(r5, &(0x7f0000004cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000380)="a1", 0x1}], 0x1, &(0x7f0000000a40)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r4], 0x30, 0x40400d1}}], 0x1, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240))
sendmsg$inet(r1, &(0x7f0000000340)={0x0, 0x7ffcb000, &(0x7f0000000300), 0x6}, 0x0)
futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0)
r6 = io_uring_setup(0x17c7, &(0x7f00000002c0))
futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0)
close_range(r6, 0xffffffffffffffff, 0x0)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]})

11.93937ms ago: executing program 8 (id=2634):
socket$igmp(0x2, 0x3, 0x2)
mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000003, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a000000050000000400000006"], 0x50)
syz_io_uring_submit(0x0, 0x0, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='freezer.state\x00', 0x275a, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={r3, 0x20, &(0x7f00000004c0)={&(0x7f0000000600)=""/188, 0xbc, <r4=>0x0, &(0x7f0000000340)=""/13, 0xd}}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0x4, &(0x7f0000000580)=ANY=[@ANYRES32], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800001, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x14, &(0x7f0000000400)=ANY=[@ANYRES64, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB="7f454c4607280800050000000000000000003e000f0000000b0200000000000040000000000000004303000000000000020000000200380001000100080002000000000005000000ffffffffffffffff090000000000000001000000000000008696320d00000000faffffffffffffff08000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000208d6e2ba52cda5f000000000000000000000000000000000000d9e41c7fb8a32eb9d66ba061a692c16f94c2763490d7bef8b420d05235a73b0ef8e02593dca048558fc428882dafe43863872cd3c91bebe79c6defdd20180e2e1b788ec7cd5b44681eeba65210c1cfaa1a306646f1a15e96ebb078f87f0e"], 0x478)
mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000001, 0x12, 0xffffffffffffffff, 0x0)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r5, 0x0, 0x30, 0xe1515f8735398fb, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[0x45c], 0x0, 0x0, 0x1f, 0x1}}, 0x3c)

0s ago: executing program 9 (id=2635):
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x2, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e)
sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0)
recvmmsg(r0, 0x0, 0x0, 0x2, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10)
r4 = socket$inet6_dccp(0xa, 0x6, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x550, 0x1c0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x480, 0xffffffff, 0xffffffff, 0x480, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x1a0, 0x1c0, 0x60030000, {0x0, 0xff000000}, [@common=@inet=@recent0={{0xf8}, {0x81, 0x0, 0x24, 0x0, 'syz1\x00'}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x298, 0x2c0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x1c8, 0x4, 0x0, 'syz0\x00'}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5b0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0)

kernel console output (not intermixed with test programs):

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff)
[  129.153006][ T9465] ext4 filesystem being mounted at /1/file2 supports timestamps until 2038-01-19 (0x7fffffff)
[  129.209911][ T9465] EXT4-fs (loop4): re-mounted 00000000-0000-0000-0000-000000000000 r/w. Quota mode: writeback.
[  129.232348][ T9470] EXT4-fs (loop6): warning: checktime reached, running e2fsck is recommended
[  129.244986][ T9483] loop8: detected capacity change from 0 to 1024
[  129.252906][ T9465] bond1: entered promiscuous mode
[  129.258031][ T9465] bond1: entered allmulticast mode
[  129.260485][ T9470] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002]
[  129.269616][ T9465] 8021q: adding VLAN 0 to HW filter on device bond1
[  129.271423][ T9470] System zones: 0-2, 18-18, 34-34
[  129.284765][ T9470] EXT4-fs warning (device loop6): ext4_update_dynamic_rev:1145: updating to rev 1 because of new feature flag, running e2fsck is recommended
[  129.304612][ T9470] EXT4-fs (loop6): 1 truncate cleaned up
[  129.319231][ T9465] bond1 (unregistering): Released all slaves
[  129.333024][ T9490] SELinux:  Context #! ./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
[  129.455914][ T9495] lo speed is unknown, defaulting to 1000
[  129.858344][ T9515] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant.
[  129.858344][ T9515] The task syz.4.2185 (9515) triggered the difference, watch for misbehavior.
[  130.011813][ T9527] loop8: detected capacity change from 0 to 128
[  130.013868][ T9526] netlink: 12 bytes leftover after parsing attributes in process `syz.9.2187'.
[  130.027381][ T9526] FAULT_INJECTION: forcing a failure.
[  130.027381][ T9526] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  130.040487][ T9526] CPU: 1 UID: 0 PID: 9526 Comm: syz.9.2187 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  130.052480][ T9526] Tainted: [W]=WARN
[  130.052875][ T9529] loop6: detected capacity change from 0 to 1024
[  130.056290][ T9526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  130.056304][ T9526] Call Trace:
[  130.056312][ T9526]  <TASK>
[  130.079056][ T9526]  dump_stack_lvl+0xf2/0x150
[  130.083668][ T9526]  dump_stack+0x15/0x1a
[  130.087945][ T9526]  should_fail_ex+0x223/0x230
[  130.092677][ T9526]  should_fail+0xb/0x10
[  130.096912][ T9526]  should_fail_usercopy+0x1a/0x20
[  130.098024][ T9529] EXT4-fs: Ignoring removed nobh option
[  130.101945][ T9526]  _copy_to_user+0x20/0xa0
[  130.101979][ T9526]  simple_read_from_buffer+0xa0/0x110
[  130.107593][ T9529] EXT4-fs: Ignoring removed orlov option
[  130.111913][ T9526]  proc_fail_nth_read+0xf9/0x140
[  130.127958][ T9526]  ? __pfx_proc_fail_nth_read+0x10/0x10
[  130.133562][ T9526]  vfs_read+0x1a2/0x700
[  130.137822][ T9526]  ? __rcu_read_unlock+0x4e/0x70
[  130.142824][ T9526]  ? __fget_files+0x17c/0x1c0
[  130.147573][ T9526]  ksys_read+0xe8/0x1b0
[  130.151780][ T9526]  __x64_sys_read+0x42/0x50
[  130.156282][ T9526]  x64_sys_call+0x2874/0x2dc0
[  130.160954][ T9526]  do_syscall_64+0xc9/0x1c0
[  130.165455][ T9526]  ? clear_bhb_loop+0x55/0xb0
[  130.170231][ T9526]  ? clear_bhb_loop+0x55/0xb0
[  130.174968][ T9526]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  130.180856][ T9526] RIP: 0033:0x7f2c6dcaf25c
[  130.185262][ T9526] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 8e 02 00 48
[  130.204945][ T9526] RSP: 002b:00007f2c6c327050 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[  130.213372][ T9526] RAX: ffffffffffffffda RBX: 00007f2c6de75fa0 RCX: 00007f2c6dcaf25c
[  130.221400][ T9526] RDX: 000000000000000f RSI: 00007f2c6c3270b0 RDI: 0000000000000007
[  130.229499][ T9526] RBP: 00007f2c6c3270a0 R08: 0000000000000000 R09: 0000000000000000
[  130.237463][ T9526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  130.245425][ T9526] R13: 0000000000000000 R14: 00007f2c6de75fa0 R15: 00007ffc309acb48
[  130.253504][ T9526]  </TASK>
[  130.291291][ T9539] loop9: detected capacity change from 0 to 128
[  130.338777][ T9541] loop5: detected capacity change from 0 to 256
[  130.353860][ T9541] FAT-fs (loop5): Volume was not properly unmounted. Some data may be corrupt. Please run fsck.
[  130.470514][ T9550] FAULT_INJECTION: forcing a failure.
[  130.470514][ T9550] name failslab, interval 1, probability 0, space 0, times 0
[  130.483357][ T9550] CPU: 1 UID: 0 PID: 9550 Comm: syz.5.2195 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  130.495178][ T9550] Tainted: [W]=WARN
[  130.499029][ T9550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  130.509080][ T9550] Call Trace:
[  130.512347][ T9550]  <TASK>
[  130.515273][ T9550]  dump_stack_lvl+0xf2/0x150
[  130.519950][ T9550]  dump_stack+0x15/0x1a
[  130.524196][ T9550]  should_fail_ex+0x223/0x230
[  130.528968][ T9550]  should_failslab+0x8f/0xb0
[  130.533555][ T9550]  kmem_cache_alloc_noprof+0x52/0x320
[  130.538947][ T9550]  ? alloc_empty_file+0xd0/0x200
[  130.543903][ T9550]  ? _raw_spin_unlock+0x26/0x50
[  130.548789][ T9550]  alloc_empty_file+0xd0/0x200
[  130.553544][ T9550]  alloc_file_pseudo+0xc3/0x140
[  130.558460][ T9550]  sock_alloc_file+0x9b/0x1c0
[  130.563245][ T9550]  do_accept+0x1e3/0x390
[  130.567538][ T9550]  __sys_accept4+0xc3/0x150
[  130.572203][ T9550]  __x64_sys_accept4+0x53/0x60
[  130.576965][ T9550]  x64_sys_call+0x2824/0x2dc0
[  130.581692][ T9550]  do_syscall_64+0xc9/0x1c0
[  130.586193][ T9550]  ? clear_bhb_loop+0x55/0xb0
[  130.590931][ T9550]  ? clear_bhb_loop+0x55/0xb0
[  130.595604][ T9550]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  130.601518][ T9550] RIP: 0033:0x7feafae00849
[  130.605928][ T9550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  130.625555][ T9550] RSP: 002b:00007feaf9477058 EFLAGS: 00000246 ORIG_RAX: 0000000000000120
[  130.634013][ T9550] RAX: ffffffffffffffda RBX: 00007feafafc5fa0 RCX: 00007feafae00849
[  130.641977][ T9550] RDX: 0000000000000000 RSI: 9999999999999999 RDI: 0000000000000005
[  130.650026][ T9550] RBP: 00007feaf94770a0 R08: 0000000000000000 R09: 0000000000000000
[  130.658002][ T9550] R10: 0000000000000800 R11: 0000000000000246 R12: 0000000000000001
[  130.665964][ T9550] R13: 0000000000000000 R14: 00007feafafc5fa0 R15: 00007fff41d4c2b8
[  130.673979][ T9550]  </TASK>
[  130.763519][ T9569] netlink: 24 bytes leftover after parsing attributes in process `syz.5.2200'.
[  130.766174][ T9570] loop4: detected capacity change from 0 to 128
[  130.786583][ T9570] FAT-fs (loop4): error, invalid access to FAT (entry 0x0fffff00)
[  130.794508][ T9570] FAT-fs (loop4): Filesystem has been set read-only
[  130.817889][ T9575] loop9: detected capacity change from 0 to 128
[  130.819922][ T9574] loop5: detected capacity change from 0 to 1024
[  130.838665][ T9574] EXT4-fs (loop5): stripe (8) is not aligned with cluster size (16), stripe is disabled
[  130.890799][ T9587] FAULT_INJECTION: forcing a failure.
[  130.890799][ T9587] name failslab, interval 1, probability 0, space 0, times 0
[  130.903511][ T9587] CPU: 1 UID: 0 PID: 9587 Comm: syz.6.2208 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  130.904797][ T9589] loop4: detected capacity change from 0 to 1024
[  130.915445][ T9587] Tainted: [W]=WARN
[  130.915454][ T9587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  130.915465][ T9587] Call Trace:
[  130.915472][ T9587]  <TASK>
[  130.915479][ T9587]  dump_stack_lvl+0xf2/0x150
[  130.915512][ T9587]  dump_stack+0x15/0x1a
[  130.925012][ T9589] EXT4-fs: Ignoring removed nobh option
[  130.925602][ T9587]  should_fail_ex+0x223/0x230
[  130.935701][ T9589] EXT4-fs: Ignoring removed orlov option
[  130.938907][ T9587]  should_failslab+0x8f/0xb0
[  130.938939][ T9587]  kmem_cache_alloc_node_noprof+0x59/0x320
[  130.976993][ T9587]  ? __alloc_skb+0x10b/0x310
[  130.981650][ T9587]  __alloc_skb+0x10b/0x310
[  130.986074][ T9587]  ? audit_log_start+0x34c/0x6b0
[  130.991077][ T9587]  audit_log_start+0x368/0x6b0
[  130.996003][ T9587]  ? kmem_cache_free+0xdc/0x2d0
[  131.000934][ T9587]  audit_seccomp+0x4b/0x130
[  131.005486][ T9587]  __seccomp_filter+0x6fa/0x1180
[  131.010446][ T9587]  ? __perf_event_task_sched_out+0x138/0x1010
[  131.016537][ T9587]  ? __dequeue_entity+0x22/0x310
[  131.021484][ T9587]  __secure_computing+0x9f/0x1c0
[  131.026432][ T9587]  syscall_trace_enter+0xd1/0x1f0
[  131.031511][ T9587]  do_syscall_64+0xaa/0x1c0
[  131.036055][ T9587]  ? clear_bhb_loop+0x55/0xb0
[  131.040871][ T9587]  ? clear_bhb_loop+0x55/0xb0
[  131.045545][ T9587]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  131.051433][ T9587] RIP: 0033:0x7efe86b0f25c
[  131.055838][ T9587] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 8e 02 00 48
[  131.075484][ T9587] RSP: 002b:00007efe85187050 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[  131.083965][ T9587] RAX: ffffffffffffffda RBX: 00007efe86cd5fa0 RCX: 00007efe86b0f25c
[  131.091973][ T9587] RDX: 000000000000000f RSI: 00007efe851870b0 RDI: 0000000000000003
[  131.099936][ T9587] RBP: 00007efe851870a0 R08: 0000000000000000 R09: 0000000000000000
[  131.107927][ T9587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  131.115914][ T9587] R13: 0000000000000000 R14: 00007efe86cd5fa0 R15: 00007ffeeaef57f8
[  131.123879][ T9587]  </TASK>
[  131.135735][ T9592] SELinux:  Context � is not valid (left unmapped).
[  131.194534][ T9601] netlink: 256 bytes leftover after parsing attributes in process `syz.6.2212'.
[  131.229199][ T9606] netlink: 24 bytes leftover after parsing attributes in process `syz.5.2213'.
[  131.275381][ T9601] macvlan0: entered promiscuous mode
[  131.285701][ T9601] ipvlan0: entered promiscuous mode
[  131.292564][ T9601] ipvlan0: left promiscuous mode
[  131.298100][ T9601] macvlan0: left promiscuous mode
[  131.531433][ T9658] loop5: detected capacity change from 0 to 1024
[  131.532142][ T9660] loop4: detected capacity change from 0 to 128
[  131.538284][ T9658] EXT4-fs: Ignoring removed nobh option
[  131.549813][ T9658] EXT4-fs: Ignoring removed orlov option
[  131.553145][ T9660] FAT-fs (loop4): error, invalid access to FAT (entry 0x0fffff00)
[  131.563349][ T9660] FAT-fs (loop4): Filesystem has been set read-only
[  131.681380][ T9668] loop5: detected capacity change from 0 to 128
[  131.690788][ T9668] FAT-fs (loop5): error, invalid access to FAT (entry 0x0fffff00)
[  131.698663][ T9668] FAT-fs (loop5): Filesystem has been set read-only
[  131.834143][ T9681] netlink: 8 bytes leftover after parsing attributes in process `syz.5.2234'.
[  131.843201][ T9681] FAULT_INJECTION: forcing a failure.
[  131.843201][ T9681] name failslab, interval 1, probability 0, space 0, times 0
[  131.855855][ T9681] CPU: 1 UID: 0 PID: 9681 Comm: syz.5.2234 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  131.867707][ T9681] Tainted: [W]=WARN
[  131.871499][ T9681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  131.881603][ T9681] Call Trace:
[  131.884863][ T9681]  <TASK>
[  131.887804][ T9681]  dump_stack_lvl+0xf2/0x150
[  131.892564][ T9681]  dump_stack+0x15/0x1a
[  131.896709][ T9681]  should_fail_ex+0x223/0x230
[  131.901413][ T9681]  ? macvlan_common_newlink+0x56e/0xbb0
[  131.907020][ T9681]  should_failslab+0x8f/0xb0
[  131.911655][ T9681]  __kmalloc_cache_noprof+0x4e/0x320
[  131.917012][ T9681]  macvlan_common_newlink+0x56e/0xbb0
[  131.922384][ T9681]  ? validate_linkmsg+0x4f7/0x570
[  131.927445][ T9681]  macvlan_newlink+0x35/0x50
[  131.932042][ T9681]  ? __pfx_macvlan_newlink+0x10/0x10
[  131.937386][ T9681]  rtnl_newlink_create+0x1ab/0x5c0
[  131.942532][ T9681]  rtnl_newlink+0xe3a/0x1200
[  131.947194][ T9681]  ? xa_load+0xb9/0xe0
[  131.951294][ T9681]  ? memcg_list_lru_alloc+0xce/0x4e0
[  131.956561][ T9681]  ? mod_objcg_state+0x2ea/0x4f0
[  131.961508][ T9681]  ? mod_objcg_state+0x2ea/0x4f0
[  131.966439][ T9681]  ? __rcu_read_unlock+0x4e/0x70
[  131.971367][ T9681]  ? avc_has_perm_noaudit+0x1cc/0x210
[  131.976727][ T9681]  ? selinux_capable+0x1f2/0x260
[  131.981660][ T9681]  ? security_capable+0x81/0x90
[  131.986501][ T9681]  ? ns_capable+0x7d/0xb0
[  131.990909][ T9681]  ? __pfx_rtnl_newlink+0x10/0x10
[  131.995942][ T9681]  rtnetlink_rcv_msg+0x651/0x710
[  132.000887][ T9681]  ? ref_tracker_free+0x3a5/0x410
[  132.005944][ T9681]  ? __dev_queue_xmit+0x186/0x2090
[  132.011067][ T9681]  netlink_rcv_skb+0x12c/0x230
[  132.015915][ T9681]  ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[  132.021448][ T9681]  rtnetlink_rcv+0x1c/0x30
[  132.025859][ T9681]  netlink_unicast+0x599/0x670
[  132.030616][ T9681]  netlink_sendmsg+0x5cc/0x6e0
[  132.035365][ T9681]  ? __pfx_netlink_sendmsg+0x10/0x10
[  132.040634][ T9681]  __sock_sendmsg+0x140/0x180
[  132.045317][ T9681]  ____sys_sendmsg+0x312/0x410
[  132.050216][ T9681]  __sys_sendmsg+0x19d/0x230
[  132.054942][ T9681]  __x64_sys_sendmsg+0x46/0x50
[  132.059720][ T9681]  x64_sys_call+0x2734/0x2dc0
[  132.064385][ T9681]  do_syscall_64+0xc9/0x1c0
[  132.068875][ T9681]  ? clear_bhb_loop+0x55/0xb0
[  132.073580][ T9681]  ? clear_bhb_loop+0x55/0xb0
[  132.078271][ T9681]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  132.084164][ T9681] RIP: 0033:0x7feafae00849
[  132.088648][ T9681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  132.108281][ T9681] RSP: 002b:00007feaf9477058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  132.116700][ T9681] RAX: ffffffffffffffda RBX: 00007feafafc5fa0 RCX: 00007feafae00849
[  132.124667][ T9681] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000004
[  132.133119][ T9681] RBP: 00007feaf94770a0 R08: 0000000000000000 R09: 0000000000000000
[  132.141131][ T9681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  132.149158][ T9681] R13: 0000000000000000 R14: 00007feafafc5fa0 R15: 00007fff41d4c2b8
[  132.157138][ T9681]  </TASK>
[  132.186682][ T9683] macvtap0: entered promiscuous mode
[  132.194102][ T9683] macvtap0: left promiscuous mode
[  132.206446][ T9685] loop8: detected capacity change from 0 to 128
[  132.215217][ T9685] FAT-fs (loop8): error, invalid access to FAT (entry 0x0fffff00)
[  132.223091][ T9685] FAT-fs (loop8): Filesystem has been set read-only
[  132.247829][ T9687] loop8: detected capacity change from 0 to 1024
[  132.254581][ T9687] EXT4-fs: Ignoring removed nobh option
[  132.260203][ T9687] EXT4-fs: Ignoring removed orlov option
[  132.355616][   T29] kauditd_printk_skb: 225 callbacks suppressed
[  132.355629][   T29] audit: type=1400 audit(1733122307.901:9284): avc:  denied  { create } for  pid=9694 comm="syz.5.2240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1
[  132.361769][ T9697] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2241'.
[  132.362587][ T9695] netlink: 'syz.5.2240': attribute type 4 has an invalid length.
[  132.381432][   T29] audit: type=1400 audit(1733122307.901:9285): avc:  denied  { ioctl } for  pid=9696 comm="syz.6.2241" path="socket:[28301]" dev="sockfs" ino=28301 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  132.390104][ T9695] netlink: 17 bytes leftover after parsing attributes in process `syz.5.2240'.
[  132.397846][   T29] audit: type=1400 audit(1733122307.921:9286): avc:  denied  { write } for  pid=9694 comm="syz.5.2240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1
[  132.459776][   T29] audit: type=1326 audit(1733122308.011:9287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9701 comm="syz.8.2243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2cc31d0849 code=0x7ffc0000
[  132.483272][   T29] audit: type=1326 audit(1733122308.011:9288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9701 comm="syz.8.2243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2cc31d0849 code=0x7ffc0000
[  132.506682][   T29] audit: type=1326 audit(1733122308.011:9289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9701 comm="syz.8.2243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2cc31d0849 code=0x7ffc0000
[  132.520745][ T9707] loop8: detected capacity change from 0 to 1024
[  132.530407][   T29] audit: type=1326 audit(1733122308.011:9290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9701 comm="syz.8.2243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2cc31d0849 code=0x7ffc0000
[  132.560846][   T29] audit: type=1326 audit(1733122308.011:9291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9704 comm="syz.5.2244" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feafae00849 code=0x7ffc0000
[  132.568342][ T9707] EXT4-fs (loop8): stripe (8) is not aligned with cluster size (16), stripe is disabled
[  132.584282][   T29] audit: type=1326 audit(1733122308.011:9292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9704 comm="syz.5.2244" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feafae00849 code=0x7ffc0000
[  132.617604][   T29] audit: type=1326 audit(1733122308.011:9293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9704 comm="syz.5.2244" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7feafae00849 code=0x7ffc0000
[  132.679943][ T9713] loop8: detected capacity change from 0 to 128
[  132.688618][ T9713] FAT-fs (loop8): error, invalid access to FAT (entry 0x0fffff00)
[  132.696487][ T9713] FAT-fs (loop8): Filesystem has been set read-only
[  132.737624][ T9719] netlink: 57 bytes leftover after parsing attributes in process `syz.6.2250'.
[  132.771198][ T9723] tipc: Started in network mode
[  132.776112][ T9723] tipc: Node identity f0, cluster identity 4711
[  132.782604][ T9723] tipc: Node number set to 240
[  132.839417][ T9725] lo speed is unknown, defaulting to 1000
[  133.369864][ T9736] loop5: detected capacity change from 0 to 2048
[  133.380110][ T9736] SELinux:  Context /usr/sbin/ntpd is not valid (left unmapped).
[  133.592818][ T9740] loop8: detected capacity change from 0 to 128
[  133.601560][ T9740] FAT-fs (loop8): error, invalid access to FAT (entry 0x0fffff00)
[  133.609433][ T9740] FAT-fs (loop8): Filesystem has been set read-only
[  133.658846][ T9748] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2262'.
[  133.668123][ T9749] FAULT_INJECTION: forcing a failure.
[  133.668123][ T9749] name failslab, interval 1, probability 0, space 0, times 0
[  133.674834][ T9748] netlink: 104 bytes leftover after parsing attributes in process `syz.4.2262'.
[  133.680836][ T9749] CPU: 1 UID: 0 PID: 9749 Comm: syz.8.2261 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  133.680875][ T9749] Tainted: [W]=WARN
[  133.705498][ T9749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  133.715592][ T9749] Call Trace:
[  133.718982][ T9749]  <TASK>
[  133.721991][ T9749]  dump_stack_lvl+0xf2/0x150
[  133.726584][ T9749]  dump_stack+0x15/0x1a
[  133.730756][ T9749]  should_fail_ex+0x223/0x230
[  133.735503][ T9749]  should_failslab+0x8f/0xb0
[  133.740092][ T9749]  kmem_cache_alloc_noprof+0x52/0x320
[  133.745458][ T9749]  ? security_file_alloc+0x32/0x100
[  133.750650][ T9749]  security_file_alloc+0x32/0x100
[  133.755670][ T9749]  init_file+0x5b/0x1b0
[  133.759832][ T9749]  alloc_empty_file+0xea/0x200
[  133.764672][ T9749]  path_openat+0x6a/0x1fa0
[  133.769159][ T9749]  ? mntput+0x49/0x70
[  133.773141][ T9749]  ? terminate_walk+0x260/0x280
[  133.777996][ T9749]  ? path_openat+0x1a5a/0x1fa0
[  133.782776][ T9749]  ? _parse_integer_limit+0x167/0x180
[  133.788228][ T9749]  do_filp_open+0x107/0x230
[  133.792791][ T9749]  do_open_execat+0xd0/0x280
[  133.797418][ T9749]  alloc_bprm+0x28/0x5d0
[  133.801657][ T9749]  do_execveat_common+0x134/0x800
[  133.806739][ T9749]  __x64_sys_execve+0x5a/0x70
[  133.811501][ T9749]  x64_sys_call+0x1333/0x2dc0
[  133.816176][ T9749]  do_syscall_64+0xc9/0x1c0
[  133.820695][ T9749]  ? clear_bhb_loop+0x55/0xb0
[  133.825374][ T9749]  ? clear_bhb_loop+0x55/0xb0
[  133.830158][ T9749]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  133.836134][ T9749] RIP: 0033:0x7f2cc31d0849
[  133.840548][ T9749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  133.860147][ T9749] RSP: 002b:00007f2cc1847058 EFLAGS: 00000246 ORIG_RAX: 000000000000003b
[  133.868581][ T9749] RAX: ffffffffffffffda RBX: 00007f2cc3395fa0 RCX: 00007f2cc31d0849
[  133.876587][ T9749] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000200
[  133.884548][ T9749] RBP: 00007f2cc18470a0 R08: 0000000000000000 R09: 0000000000000000
[  133.892509][ T9749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  133.900482][ T9749] R13: 0000000000000000 R14: 00007f2cc3395fa0 R15: 00007ffc796bf878
[  133.908450][ T9749]  </TASK>
[  133.967702][ T9754] loop9: detected capacity change from 0 to 512
[  133.975030][ T9754] EXT4-fs (loop9): feature flags set on rev 0 fs, running e2fsck is recommended
[  133.984418][ T9754] EXT4-fs (loop9): mounting ext2 file system using the ext4 subsystem
[  133.998025][ T9754] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002]
[  134.006121][ T9754] System zones: 0-2, 18-18, 34-34
[  134.012997][ T9754] EXT4-fs warning (device loop9): ext4_update_dynamic_rev:1145: updating to rev 1 because of new feature flag, running e2fsck is recommended
[  134.026553][ T9766] loop6: detected capacity change from 0 to 128
[  134.030143][ T9754] EXT4-fs error (device loop9): ext4_validate_block_bitmap:432: comm syz.9.2264: bg 0: block 18: invalid block bitmap
[  134.046441][ T9754] EXT4-fs error (device loop9) in ext4_mb_clear_bb:6550: Corrupt filesystem
[  134.061158][ T9754] EXT4-fs (loop9): 1 truncate cleaned up
[  134.114134][ T9766] FAT-fs (loop6): error, invalid access to FAT (entry 0x0fffff00)
[  134.122094][ T9766] FAT-fs (loop6): Filesystem has been set read-only
[  134.221887][ T9775] Cannot find del_set index 0 as target
[  134.238815][ T9783] netlink: 256 bytes leftover after parsing attributes in process `syz.6.2276'.
[  134.248034][ T9783] FAULT_INJECTION: forcing a failure.
[  134.248034][ T9783] name failslab, interval 1, probability 0, space 0, times 0
[  134.260755][ T9783] CPU: 1 UID: 0 PID: 9783 Comm: syz.6.2276 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  134.272581][ T9783] Tainted: [W]=WARN
[  134.276376][ T9783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  134.286574][ T9783] Call Trace:
[  134.289836][ T9783]  <TASK>
[  134.292780][ T9783]  dump_stack_lvl+0xf2/0x150
[  134.297380][ T9783]  dump_stack+0x15/0x1a
[  134.301608][ T9783]  should_fail_ex+0x223/0x230
[  134.306371][ T9783]  should_failslab+0x8f/0xb0
[  134.311036][ T9783]  __kmalloc_node_track_caller_noprof+0xa8/0x410
[  134.317478][ T9783]  ? kvasprintf_const+0x5d/0x100
[  134.322430][ T9783]  kvasprintf+0x8c/0x110
[  134.326742][ T9783]  ? finish_task_switch+0xb5/0x2b0
[  134.331858][ T9783]  kvasprintf_const+0x5d/0x100
[  134.336656][ T9783]  kobject_set_name_vargs+0x44/0xe0
[  134.341852][ T9783]  dev_set_name+0x84/0xb0
[  134.346170][ T9783]  ? hrtimer_init+0x104/0x1f0
[  134.350834][ T9783]  ? wpan_phy_new+0xbe/0x190
[  134.355492][ T9783]  ? device_initialize+0x1fe/0x210
[  134.360631][ T9783]  wpan_phy_new+0xd0/0x190
[  134.365039][ T9783]  ieee802154_alloc_hw+0xbd/0x5b0
[  134.370052][ T9783]  hwsim_add_one+0x48/0xa80
[  134.374595][ T9783]  ? genl_family_rcv_msg_attrs_parse+0x148/0x1a0
[  134.380947][ T9783]  ? genl_family_rcv_msg_attrs_parse+0x182/0x1a0
[  134.387342][ T9783]  hwsim_new_radio_nl+0x2e/0x40
[  134.392266][ T9783]  genl_rcv_msg+0x61b/0x6c0
[  134.396762][ T9783]  ? __pfx_hwsim_new_radio_nl+0x10/0x10
[  134.402329][ T9783]  ? should_fail_ex+0x31/0x230
[  134.407197][ T9783]  netlink_rcv_skb+0x12c/0x230
[  134.411951][ T9783]  ? __pfx_genl_rcv_msg+0x10/0x10
[  134.417035][ T9783]  genl_rcv+0x28/0x40
[  134.421040][ T9783]  netlink_unicast+0x599/0x670
[  134.425918][ T9783]  netlink_sendmsg+0x5cc/0x6e0
[  134.430680][ T9783]  ? __pfx_netlink_sendmsg+0x10/0x10
[  134.436003][ T9783]  __sock_sendmsg+0x140/0x180
[  134.440847][ T9783]  ____sys_sendmsg+0x312/0x410
[  134.445677][ T9783]  __sys_sendmsg+0x19d/0x230
[  134.450267][ T9783]  __x64_sys_sendmsg+0x46/0x50
[  134.455129][ T9783]  x64_sys_call+0x2734/0x2dc0
[  134.459802][ T9783]  do_syscall_64+0xc9/0x1c0
[  134.464328][ T9783]  ? clear_bhb_loop+0x55/0xb0
[  134.469097][ T9783]  ? clear_bhb_loop+0x55/0xb0
[  134.473765][ T9783]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  134.479746][ T9783] RIP: 0033:0x7efe86b10849
[  134.484186][ T9783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  134.503854][ T9783] RSP: 002b:00007efe85187058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  134.512331][ T9783] RAX: ffffffffffffffda RBX: 00007efe86cd5fa0 RCX: 00007efe86b10849
[  134.520301][ T9783] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004
[  134.528258][ T9783] RBP: 00007efe851870a0 R08: 0000000000000000 R09: 0000000000000000
[  134.536224][ T9783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  134.544198][ T9783] R13: 0000000000000000 R14: 00007efe86cd5fa0 R15: 00007ffeeaef57f8
[  134.552158][ T9783]  </TASK>
[  135.009477][ T9806] vlan2: entered allmulticast mode
[  135.070375][ T9809] FAULT_INJECTION: forcing a failure.
[  135.070375][ T9809] name failslab, interval 1, probability 0, space 0, times 0
[  135.083085][ T9809] CPU: 1 UID: 0 PID: 9809 Comm: +}[@ Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  135.094472][ T9809] Tainted: [W]=WARN
[  135.098273][ T9809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  135.108359][ T9809] Call Trace:
[  135.111632][ T9809]  <TASK>
[  135.114551][ T9809]  dump_stack_lvl+0xf2/0x150
[  135.119167][ T9809]  dump_stack+0x15/0x1a
[  135.123474][ T9809]  should_fail_ex+0x223/0x230
[  135.128208][ T9809]  should_failslab+0x8f/0xb0
[  135.132799][ T9809]  kmem_cache_alloc_node_noprof+0x59/0x320
[  135.138599][ T9809]  ? __alloc_skb+0x10b/0x310
[  135.143185][ T9809]  __alloc_skb+0x10b/0x310
[  135.147616][ T9809]  ? audit_log_start+0x34c/0x6b0
[  135.152613][ T9809]  audit_log_start+0x368/0x6b0
[  135.157399][ T9809]  ? kmem_cache_free+0xdc/0x2d0
[  135.162243][ T9809]  audit_seccomp+0x4b/0x130
[  135.166809][ T9809]  __seccomp_filter+0x6fa/0x1180
[  135.171765][ T9809]  ? __perf_event_task_sched_out+0x138/0x1010
[  135.177829][ T9809]  ? update_load_avg+0x1f7/0x7c0
[  135.182839][ T9809]  __secure_computing+0x9f/0x1c0
[  135.187856][ T9809]  syscall_trace_enter+0xd1/0x1f0
[  135.192911][ T9809]  do_syscall_64+0xaa/0x1c0
[  135.197524][ T9809]  ? clear_bhb_loop+0x55/0xb0
[  135.202272][ T9809]  ? clear_bhb_loop+0x55/0xb0
[  135.206944][ T9809]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  135.212831][ T9809] RIP: 0033:0x7f2cc3202925
[  135.217303][ T9809] Code: 24 0c 89 3c 24 48 89 4c 24 18 e8 d6 57 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 8b 74 24 0c 8b 3c 24 b8 e6 00 00 00 0f 05 <44> 89 c7 48 89 04 24 e8 2f 58 ff ff 48 8b 04 24 48 83 c4 28 f7 d8
[  135.236997][ T9809] RSP: 002b:00007f2cc1846fc0 EFLAGS: 00000293 ORIG_RAX: 00000000000000e6
[  135.245435][ T9809] RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f2cc3202925
[  135.253397][ T9809] RDX: 00007f2cc1847000 RSI: 0000000000000000 RDI: 0000000000000000
[  135.261538][ T9809] RBP: 00007f2cc18470a0 R08: 0000000000000000 R09: 0000000000000000
[  135.269562][ T9809] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001
[  135.277532][ T9809] R13: 0000000000000000 R14: 00007f2cc3395fa0 R15: 00007ffc796bf878
[  135.285499][ T9809]  </TASK>
[  135.512404][ T9823] Cannot find del_set index 0 as target
[  135.966250][ T9838] FAULT_INJECTION: forcing a failure.
[  135.966250][ T9838] name failslab, interval 1, probability 0, space 0, times 0
[  135.979180][ T9838] CPU: 0 UID: 0 PID: 9838 Comm: syz.5.2298 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  135.991054][ T9838] Tainted: [W]=WARN
[  135.994880][ T9838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  136.004927][ T9838] Call Trace:
[  136.008195][ T9838]  <TASK>
[  136.011114][ T9838]  dump_stack_lvl+0xf2/0x150
[  136.015758][ T9838]  dump_stack+0x15/0x1a
[  136.020039][ T9838]  should_fail_ex+0x223/0x230
[  136.024778][ T9838]  should_failslab+0x8f/0xb0
[  136.029388][ T9838]  kmem_cache_alloc_noprof+0x52/0x320
[  136.034758][ T9838]  ? security_file_alloc+0x32/0x100
[  136.039948][ T9838]  security_file_alloc+0x32/0x100
[  136.045041][ T9838]  init_file+0x5b/0x1b0
[  136.049181][ T9838]  alloc_empty_file+0xea/0x200
[  136.053931][ T9838]  alloc_file_pseudo+0xc3/0x140
[  136.058792][ T9838]  aio_setup_ring+0x135/0x6a0
[  136.063580][ T9838]  ioctx_alloc+0x2b2/0x4c0
[  136.067994][ T9838]  __se_sys_io_setup+0x6b/0x1b0
[  136.072851][ T9838]  __x64_sys_io_setup+0x31/0x40
[  136.077750][ T9838]  x64_sys_call+0x160f/0x2dc0
[  136.082543][ T9838]  do_syscall_64+0xc9/0x1c0
[  136.087072][ T9838]  ? clear_bhb_loop+0x55/0xb0
[  136.091887][ T9838]  ? clear_bhb_loop+0x55/0xb0
[  136.096577][ T9838]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  136.102461][ T9838] RIP: 0033:0x7feafae00849
[  136.106869][ T9838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  136.126540][ T9838] RSP: 002b:00007feaf9477058 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce
[  136.134962][ T9838] RAX: ffffffffffffffda RBX: 00007feafafc5fa0 RCX: 00007feafae00849
[  136.142952][ T9838] RDX: 0000000000000000 RSI: 0000000020000680 RDI: 0000000000002004
[  136.150937][ T9838] RBP: 00007feaf94770a0 R08: 0000000000000000 R09: 0000000000000000
[  136.158934][ T9838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  136.167019][ T9838] R13: 0000000000000000 R14: 00007feafafc5fa0 R15: 00007fff41d4c2b8
[  136.175173][ T9838]  </TASK>
[  136.236077][ T9850] FAULT_INJECTION: forcing a failure.
[  136.236077][ T9850] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  136.249277][ T9850] CPU: 1 UID: 0 PID: 9850 Comm: syz.9.2303 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  136.261089][ T9850] Tainted: [W]=WARN
[  136.264932][ T9850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  136.275040][ T9850] Call Trace:
[  136.278374][ T9850]  <TASK>
[  136.281312][ T9850]  dump_stack_lvl+0xf2/0x150
[  136.285973][ T9850]  dump_stack+0x15/0x1a
[  136.290252][ T9850]  should_fail_ex+0x223/0x230
[  136.295010][ T9850]  should_fail+0xb/0x10
[  136.299176][ T9850]  should_fail_usercopy+0x1a/0x20
[  136.304264][ T9850]  _copy_from_iter+0xd5/0xd00
[  136.308942][ T9850]  ? alloc_pages_mpol_noprof+0xd5/0x1e0
[  136.314486][ T9850]  copy_page_from_iter+0x14f/0x280
[  136.319595][ T9850]  tun_get_user+0x686/0x25b0
[  136.324229][ T9850]  ? ref_tracker_alloc+0x1f5/0x2f0
[  136.329388][ T9850]  tun_chr_write_iter+0x188/0x240
[  136.334489][ T9850]  vfs_write+0x77f/0x920
[  136.338780][ T9850]  ? __pfx_tun_chr_write_iter+0x10/0x10
[  136.344321][ T9850]  ksys_write+0xe8/0x1b0
[  136.348634][ T9850]  __x64_sys_write+0x42/0x50
[  136.353229][ T9850]  x64_sys_call+0x287e/0x2dc0
[  136.357966][ T9850]  do_syscall_64+0xc9/0x1c0
[  136.362466][ T9850]  ? clear_bhb_loop+0x55/0xb0
[  136.367146][ T9850]  ? clear_bhb_loop+0x55/0xb0
[  136.371819][ T9850]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  136.377714][ T9850] RIP: 0033:0x7f2c6dcaf2ff
[  136.382118][ T9850] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 8e 02 00 48
[  136.401789][ T9850] RSP: 002b:00007f2c6c327020 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
[  136.410286][ T9850] RAX: ffffffffffffffda RBX: 00007f2c6de75fa0 RCX: 00007f2c6dcaf2ff
[  136.418269][ T9850] RDX: 0000000000000036 RSI: 00000000200000c0 RDI: 00000000000000c8
[  136.426237][ T9850] RBP: 00007f2c6c3270a0 R08: 0000000000000000 R09: 0000000000000000
[  136.434295][ T9850] R10: 0000000000000036 R11: 0000000000000293 R12: 0000000000000001
[  136.442257][ T9850] R13: 0000000000000000 R14: 00007f2c6de75fa0 R15: 00007ffc309acb48
[  136.450256][ T9850]  </TASK>
[  136.522101][ T9856] loop6: detected capacity change from 0 to 128
[  136.568128][ T9866] FAULT_INJECTION: forcing a failure.
[  136.568128][ T9866] name failslab, interval 1, probability 0, space 0, times 0
[  136.580904][ T9866] CPU: 1 UID: 0 PID: 9866 Comm: syz.6.2311 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  136.592742][ T9866] Tainted: [W]=WARN
[  136.596538][ T9866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  136.606846][ T9866] Call Trace:
[  136.610110][ T9866]  <TASK>
[  136.613058][ T9866]  dump_stack_lvl+0xf2/0x150
[  136.617239][    C0] ip6_tunnel: ip6gre1 xmit: Local address not yet configured!
[  136.617789][ T9866]  dump_stack+0x15/0x1a
[  136.629458][ T9866]  should_fail_ex+0x223/0x230
[  136.634126][ T9866]  should_failslab+0x8f/0xb0
[  136.638730][ T9866]  kmem_cache_alloc_node_noprof+0x59/0x320
[  136.644560][ T9866]  ? __alloc_skb+0x10b/0x310
[  136.649210][ T9866]  __alloc_skb+0x10b/0x310
[  136.653637][ T9866]  netlink_alloc_large_skb+0xad/0xe0
[  136.658937][ T9866]  netlink_sendmsg+0x3b4/0x6e0
[  136.663687][ T9866]  ? __pfx_netlink_sendmsg+0x10/0x10
[  136.668956][ T9866]  __sock_sendmsg+0x140/0x180
[  136.673651][ T9866]  ____sys_sendmsg+0x312/0x410
[  136.678577][ T9866]  __sys_sendmsg+0x19d/0x230
[  136.683182][ T9866]  __x64_sys_sendmsg+0x46/0x50
[  136.687948][ T9866]  x64_sys_call+0x2734/0x2dc0
[  136.692625][ T9866]  do_syscall_64+0xc9/0x1c0
[  136.697203][ T9866]  ? clear_bhb_loop+0x55/0xb0
[  136.701871][ T9866]  ? clear_bhb_loop+0x55/0xb0
[  136.706541][ T9866]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  136.712424][ T9866] RIP: 0033:0x7efe86b10849
[  136.716824][ T9866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  136.736485][ T9866] RSP: 002b:00007efe85187058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  136.744885][ T9866] RAX: ffffffffffffffda RBX: 00007efe86cd5fa0 RCX: 00007efe86b10849
[  136.752849][ T9866] RDX: 0000000000040080 RSI: 0000000020000100 RDI: 0000000000000003
[  136.760821][ T9866] RBP: 00007efe851870a0 R08: 0000000000000000 R09: 0000000000000000
[  136.768865][ T9866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  136.776839][ T9866] R13: 0000000000000000 R14: 00007efe86cd5fa0 R15: 00007ffeeaef57f8
[  136.784812][ T9866]  </TASK>
[  136.840180][ T9880] loop6: detected capacity change from 0 to 128
[  136.851882][ T9880] FAT-fs (loop6): error, invalid access to FAT (entry 0x0fffff00)
[  136.859856][ T9880] FAT-fs (loop6): Filesystem has been set read-only
[  136.894776][ T9884] loop6: detected capacity change from 0 to 128
[  136.904545][ T9884] FAT-fs (loop6): error, invalid access to FAT (entry 0x0fffff00)
[  136.912504][ T9884] FAT-fs (loop6): Filesystem has been set read-only
[  137.079793][ T9902] loop8: detected capacity change from 0 to 1024
[  137.086969][ T9902] EXT4-fs: Ignoring removed nobh option
[  137.092613][ T9902] EXT4-fs: Ignoring removed orlov option
[  137.101565][ T9898] hub 6-0:1.0: USB hub found
[  137.106417][ T9898] hub 6-0:1.0: 8 ports detected
[  137.138601][ T9905] loop9: detected capacity change from 0 to 1024
[  137.145474][ T9905] EXT4-fs: Ignoring removed nobh option
[  137.151091][ T9905] EXT4-fs: Ignoring removed orlov option
[  137.186867][ T9902] EXT4-fs mount: 52 callbacks suppressed
[  137.186883][ T9902] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  137.217178][ T9905] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  137.392635][ T9919] netlink: 256 bytes leftover after parsing attributes in process `syz.4.2329'.
[  137.411739][ T7544] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  137.441898][   T29] kauditd_printk_skb: 346 callbacks suppressed
[  137.441912][   T29] audit: type=1326 audit(1733122312.991:9638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9922 comm="syz.8.2330" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2cc31d0849 code=0x7ffc0000
[  137.472101][   T29] audit: type=1326 audit(1733122312.991:9639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9922 comm="syz.8.2330" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2cc31d0849 code=0x7ffc0000
[  137.483979][ T9919] macvlan0: entered promiscuous mode
[  137.495574][   T29] audit: type=1326 audit(1733122312.991:9640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9922 comm="syz.8.2330" exe="/root/syz-executor" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7f2cc31d0849 code=0x7ffc0000
[  137.524253][   T29] audit: type=1326 audit(1733122312.991:9641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9922 comm="syz.8.2330" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2cc31d0849 code=0x7ffc0000
[  137.547713][   T29] audit: type=1326 audit(1733122312.991:9642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9922 comm="syz.8.2330" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2cc31d0849 code=0x7ffc0000
[  137.571247][   T29] audit: type=1326 audit(1733122312.991:9643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9922 comm="syz.8.2330" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2cc31d0849 code=0x7ffc0000
[  137.594764][   T29] audit: type=1326 audit(1733122312.991:9644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9922 comm="syz.8.2330" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2cc31d0849 code=0x7ffc0000
[  137.618329][   T29] audit: type=1326 audit(1733122312.991:9645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9922 comm="syz.8.2330" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2cc31d0849 code=0x7ffc0000
[  137.641888][   T29] audit: type=1326 audit(1733122312.991:9646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9922 comm="syz.8.2330" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f2cc31d0849 code=0x7ffc0000
[  137.665405][   T29] audit: type=1326 audit(1733122312.991:9647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9922 comm="syz.8.2330" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2cc31d0849 code=0x7ffc0000
[  137.707934][ T9919] ipvlan0: entered promiscuous mode
[  137.714904][ T7896] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  137.720228][ T9928] loop8: detected capacity change from 0 to 1024
[  137.731183][ T9919] ipvlan0: left promiscuous mode
[  137.736298][ T9919] macvlan0: left promiscuous mode
[  137.750648][ T9928] EXT4-fs (loop8): stripe (8) is not aligned with cluster size (16), stripe is disabled
[  137.788631][ T9928] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  137.808782][ T9942] FAULT_INJECTION: forcing a failure.
[  137.808782][ T9942] name failslab, interval 1, probability 0, space 0, times 0
[  137.821567][ T9942] CPU: 0 UID: 0 PID: 9942 Comm: syz.4.2338 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  137.833514][ T9942] Tainted: [W]=WARN
[  137.837382][ T9942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  137.847450][ T9942] Call Trace:
[  137.850167][ T9945] loop6: detected capacity change from 0 to 1024
[  137.850722][ T9942]  <TASK>
[  137.857826][ T9945] EXT4-fs: Ignoring removed nobh option
[  137.860060][ T9942]  dump_stack_lvl+0xf2/0x150
[  137.865591][ T9945] EXT4-fs: Ignoring removed orlov option
[  137.870216][ T9942]  dump_stack+0x15/0x1a
[  137.878874][ T9945] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  137.880035][ T9942]  should_fail_ex+0x223/0x230
[  137.896893][ T9942]  should_failslab+0x8f/0xb0
[  137.901476][ T9942]  __kmalloc_noprof+0xab/0x3f0
[  137.906276][ T9942]  ? genl_family_rcv_msg_attrs_parse+0x75/0x1a0
[  137.912554][ T9942]  genl_family_rcv_msg_attrs_parse+0x75/0x1a0
[  137.918694][ T9942]  ? ns_capable+0x7d/0xb0
[  137.923031][ T9942]  genl_rcv_msg+0x470/0x6c0
[  137.927570][ T9942]  ? __pfx_ethnl_act_cable_test_tdr+0x10/0x10
[  137.933674][ T9942]  ? __dev_queue_xmit+0xb6e/0x2090
[  137.938799][ T9942]  ? ref_tracker_free+0x3a5/0x410
[  137.943805][ T9942]  ? __dev_queue_xmit+0x186/0x2090
[  137.948938][ T9942]  netlink_rcv_skb+0x12c/0x230
[  137.953746][ T9942]  ? __pfx_genl_rcv_msg+0x10/0x10
[  137.958835][ T9942]  genl_rcv+0x28/0x40
[  137.962809][ T9942]  netlink_unicast+0x599/0x670
[  137.967610][ T9942]  netlink_sendmsg+0x5cc/0x6e0
[  137.972375][ T9942]  ? __pfx_netlink_sendmsg+0x10/0x10
[  137.977661][ T9942]  __sock_sendmsg+0x140/0x180
[  137.982536][ T9942]  ____sys_sendmsg+0x312/0x410
[  137.987361][ T9942]  __sys_sendmsg+0x19d/0x230
[  137.991955][ T9942]  __x64_sys_sendmsg+0x46/0x50
[  137.996751][ T9942]  x64_sys_call+0x2734/0x2dc0
[  138.001524][ T9942]  do_syscall_64+0xc9/0x1c0
[  138.006084][ T9942]  ? clear_bhb_loop+0x55/0xb0
[  138.010748][ T9942]  ? clear_bhb_loop+0x55/0xb0
[  138.015490][ T9942]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  138.021455][ T9942] RIP: 0033:0x7f6f948f0849
[  138.025856][ T9942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  138.045556][ T9942] RSP: 002b:00007f6f92f67058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  138.053971][ T9942] RAX: ffffffffffffffda RBX: 00007f6f94ab5fa0 RCX: 00007f6f948f0849
[  138.061979][ T9942] RDX: 0000000000000000 RSI: 0000000020001540 RDI: 0000000000000003
[  138.069961][ T9942] RBP: 00007f6f92f670a0 R08: 0000000000000000 R09: 0000000000000000
[  138.078128][ T9942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  138.086103][ T9942] R13: 0000000000000000 R14: 00007f6f94ab5fa0 R15: 00007fff27373718
[  138.094093][ T9942]  </TASK>
[  138.099708][ T7544] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  138.124618][ T9952] loop8: detected capacity change from 0 to 128
[  138.135896][ T9952] FAT-fs (loop8): error, invalid access to FAT (entry 0x0fffff00)
[  138.143931][ T9952] FAT-fs (loop8): Filesystem has been set read-only
[  138.180601][ T9954] netlink: 52 bytes leftover after parsing attributes in process `syz.4.2343'.
[  138.191075][ T5706] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  138.349693][ T9968] loop5: detected capacity change from 0 to 1024
[  138.360542][ T9968] EXT4-fs (loop5): stripe (8) is not aligned with cluster size (16), stripe is disabled
[  138.371998][ T9972] FAULT_INJECTION: forcing a failure.
[  138.371998][ T9972] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  138.385100][ T9972] CPU: 1 UID: 0 PID: 9972 Comm: syz.6.2348 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  138.396926][ T9972] Tainted: [W]=WARN
[  138.400729][ T9972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  138.410785][ T9972] Call Trace:
[  138.414066][ T9972]  <TASK>
[  138.417055][ T9972]  dump_stack_lvl+0xf2/0x150
[  138.421754][ T9972]  dump_stack+0x15/0x1a
[  138.425925][ T9972]  should_fail_ex+0x223/0x230
[  138.430684][ T9972]  should_fail+0xb/0x10
[  138.434832][ T9972]  should_fail_usercopy+0x1a/0x20
[  138.439894][ T9972]  _copy_from_user+0x1e/0xb0
[  138.444552][ T9972]  memdup_user+0x64/0xc0
[  138.448797][ T9972]  strndup_user+0x68/0xa0
[  138.453127][ T9972]  keyctl_restrict_keyring+0x153/0x1b0
[  138.458590][ T9972]  __se_sys_keyctl+0x20f/0xbb0
[  138.463371][ T9972]  ? __fget_files+0x17c/0x1c0
[  138.468051][ T9972]  ? fput+0x1c4/0x200
[  138.472025][ T9972]  ? ksys_write+0x176/0x1b0
[  138.476658][ T9972]  __x64_sys_keyctl+0x67/0x80
[  138.481333][ T9972]  x64_sys_call+0x163d/0x2dc0
[  138.486024][ T9972]  do_syscall_64+0xc9/0x1c0
[  138.490527][ T9972]  ? clear_bhb_loop+0x55/0xb0
[  138.495281][ T9972]  ? clear_bhb_loop+0x55/0xb0
[  138.499955][ T9972]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  138.505846][ T9972] RIP: 0033:0x7efe86b10849
[  138.510287][ T9972] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  138.529888][ T9972] RSP: 002b:00007efe85187058 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa
[  138.538305][ T9972] RAX: ffffffffffffffda RBX: 00007efe86cd5fa0 RCX: 00007efe86b10849
[  138.546267][ T9972] RDX: 0000000020000380 RSI: 0000000027df59b1 RDI: 000000000000001d
[  138.554230][ T9972] RBP: 00007efe851870a0 R08: 0000000000000000 R09: 0000000000000000
[  138.562193][ T9972] R10: 0000000020000500 R11: 0000000000000246 R12: 0000000000000001
[  138.570161][ T9972] R13: 0000000000000000 R14: 00007efe86cd5fa0 R15: 00007ffeeaef57f8
[  138.578171][ T9972]  </TASK>
[  138.589599][ T9968] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  138.619458][ T5569] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  138.632805][ T9976] loop6: detected capacity change from 0 to 128
[  138.663513][ T9982] loop9: detected capacity change from 0 to 1024
[  138.671117][ T9976] FAT-fs (loop6): error, invalid access to FAT (entry 0x0fffff00)
[  138.673002][ T9982] EXT4-fs: Ignoring removed nobh option
[  138.678994][ T9976] FAT-fs (loop6): Filesystem has been set read-only
[  138.684565][ T9982] EXT4-fs: Ignoring removed orlov option
[  138.716851][ T9988] loop8: detected capacity change from 0 to 128
[  138.725166][ T9982] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  138.782413][ T9994] dccp_close: ABORT with 340 bytes unread
[  138.804250][ T7896] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  138.842288][T10000] loop6: detected capacity change from 0 to 1024
[  138.861823][T10000] EXT4-fs (loop6): stripe (8) is not aligned with cluster size (16), stripe is disabled
[  138.875574][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  138.883058][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  138.890548][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  138.897963][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  138.905437][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  138.912867][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  138.920318][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  138.927817][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  138.935255][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  138.942713][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  138.950243][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  138.957733][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  138.965171][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  138.972593][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  138.980106][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  138.987520][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  138.994988][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.002413][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.009929][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.017459][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.024891][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.032306][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.039838][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.047455][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.054936][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.062364][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.069797][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.077207][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.084665][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.092259][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.099754][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.107148][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.114621][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.122186][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.129597][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.137012][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.144451][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.151874][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.159299][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.159327][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.159369][T10000] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  139.159397][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.159416][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.159436][    T8] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[  139.159820][    T8] hid-generic 0000:0000:0000.0006: hidraw0: <UNKNOWN> HID v0.00 Device [syz0] on syz0
[  139.235627][ T5706] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  139.256314][T10034] loop5: detected capacity change from 0 to 1024
[  139.277706][T10034] EXT4-fs (loop5): warning: checktime reached, running e2fsck is recommended
[  139.289262][T10034] EXT4-fs warning (device loop5): ext4_enable_quotas:7156: Failed to enable quota tracking (type=1, err=-22, ino=4). Please run e2fsck to fix.
[  139.304159][T10034] EXT4-fs (loop5): mount failed
[  139.310761][T10039] FAULT_INJECTION: forcing a failure.
[  139.310761][T10039] name failslab, interval 1, probability 0, space 0, times 0
[  139.315745][T10034] loop5: detected capacity change from 0 to 128
[  139.323476][T10039] CPU: 1 UID: 0 PID: 10039 Comm: syz.9.2372 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  139.341551][T10039] Tainted: [W]=WARN
[  139.345448][T10039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  139.353809][T10034] syz.5.2371: attempt to access beyond end of device
[  139.353809][T10034] loop5: rw=2049, sector=145, nr_sectors = 896 limit=128
[  139.355494][T10039] Call Trace:
[  139.355503][T10039]  <TASK>
[  139.355512][T10039]  dump_stack_lvl+0xf2/0x150
[  139.379997][T10039]  dump_stack+0x15/0x1a
[  139.384194][T10039]  should_fail_ex+0x223/0x230
[  139.388961][T10039]  should_failslab+0x8f/0xb0
[  139.393687][T10039]  __kmalloc_node_noprof+0xad/0x410
[  139.398964][T10039]  ? qdisc_alloc+0x65/0x450
[  139.403456][T10039]  qdisc_alloc+0x65/0x450
[  139.407821][T10039]  qdisc_create+0xe5/0xae0
[  139.412320][T10039]  ? __nla_parse+0x40/0x60
[  139.416754][T10039]  tc_modify_qdisc+0x65f/0x1050
[  139.421605][T10039]  ? __schedule+0x6fa/0x930
[  139.426120][T10039]  ? __pfx_tc_modify_qdisc+0x10/0x10
[  139.431448][T10039]  rtnetlink_rcv_msg+0x6aa/0x710
[  139.436397][T10039]  ? ref_tracker_free+0x3a5/0x410
[  139.441445][T10039]  ? __dev_queue_xmit+0x186/0x2090
[  139.446641][T10039]  netlink_rcv_skb+0x12c/0x230
[  139.451494][T10039]  ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[  139.457018][T10039]  rtnetlink_rcv+0x1c/0x30
[  139.461424][T10039]  netlink_unicast+0x599/0x670
[  139.466183][T10039]  netlink_sendmsg+0x5cc/0x6e0
[  139.470964][T10039]  ? __pfx_netlink_sendmsg+0x10/0x10
[  139.476228][T10039]  __sock_sendmsg+0x140/0x180
[  139.480907][T10039]  ____sys_sendmsg+0x312/0x410
[  139.485771][T10039]  __sys_sendmsg+0x19d/0x230
[  139.490363][T10039]  __x64_sys_sendmsg+0x46/0x50
[  139.495167][T10039]  x64_sys_call+0x2734/0x2dc0
[  139.499882][T10039]  do_syscall_64+0xc9/0x1c0
[  139.504436][T10039]  ? clear_bhb_loop+0x55/0xb0
[  139.509135][T10039]  ? clear_bhb_loop+0x55/0xb0
[  139.513848][T10039]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  139.519808][T10039] RIP: 0033:0x7f2c6dcb0849
[  139.524220][T10039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  139.543833][T10039] RSP: 002b:00007f2c6c327058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  139.552325][T10039] RAX: ffffffffffffffda RBX: 00007f2c6de75fa0 RCX: 00007f2c6dcb0849
[  139.560368][T10039] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000006
[  139.568399][T10039] RBP: 00007f2c6c3270a0 R08: 0000000000000000 R09: 0000000000000000
[  139.576370][T10039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  139.584390][T10039] R13: 0000000000000000 R14: 00007f2c6de75fa0 R15: 00007ffc309acb48
[  139.592394][T10039]  </TASK>
[  139.596601][ T7300] kworker/u8:36: attempt to access beyond end of device
[  139.596601][ T7300] loop5: rw=1, sector=161, nr_sectors = 8 limit=128
[  139.657523][T10050] FAULT_INJECTION: forcing a failure.
[  139.657523][T10050] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  139.670793][T10050] CPU: 0 UID: 0 PID: 10050 Comm: syz.8.2376 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  139.682706][T10050] Tainted: [W]=WARN
[  139.686562][T10050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  139.696395][T10052] loop9: detected capacity change from 0 to 128
[  139.696610][T10050] Call Trace:
[  139.696619][T10050]  <TASK>
[  139.696626][T10050]  dump_stack_lvl+0xf2/0x150
[  139.713705][T10050]  dump_stack+0x15/0x1a
[  139.717911][T10050]  should_fail_ex+0x223/0x230
[  139.722623][T10050]  should_fail+0xb/0x10
[  139.726796][T10050]  should_fail_usercopy+0x1a/0x20
[  139.731889][T10050]  _copy_from_user+0x1e/0xb0
[  139.736482][T10050]  copy_msghdr_from_user+0x54/0x2a0
[  139.741746][T10050]  ? __fget_files+0x17c/0x1c0
[  139.746429][T10050]  do_recvmmsg+0x256/0x6d0
[  139.750883][T10050]  __x64_sys_recvmmsg+0xe2/0x170
[  139.755853][T10050]  x64_sys_call+0x2a9a/0x2dc0
[  139.760525][T10050]  do_syscall_64+0xc9/0x1c0
[  139.765145][T10050]  ? clear_bhb_loop+0x55/0xb0
[  139.769849][T10050]  ? clear_bhb_loop+0x55/0xb0
[  139.774581][T10050]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  139.780469][T10050] RIP: 0033:0x7f2cc31d0849
[  139.784883][T10050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  139.804494][T10050] RSP: 002b:00007f2cc1847058 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[  139.812972][T10050] RAX: ffffffffffffffda RBX: 00007f2cc3395fa0 RCX: 00007f2cc31d0849
[  139.820939][T10050] RDX: 0000000000000001 RSI: 00000000200049c0 RDI: 0000000000000007
[  139.828901][T10050] RBP: 00007f2cc18470a0 R08: 0000000000000000 R09: 0000000000000000
[  139.836874][T10050] R10: 0000000000002000 R11: 0000000000000246 R12: 0000000000000001
[  139.844839][T10050] R13: 0000000000000000 R14: 00007f2cc3395fa0 R15: 00007ffc796bf878
[  139.852809][T10050]  </TASK>
[  139.898686][T10058] loop8: detected capacity change from 0 to 1024
[  139.900684][T10052] FAT-fs (loop9): error, invalid access to FAT (entry 0x0fffff00)
[  139.905955][T10058] EXT4-fs (loop8): stripe (8) is not aligned with cluster size (16), stripe is disabled
[  139.912894][T10052] FAT-fs (loop9): Filesystem has been set read-only
[  139.950095][T10058] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  139.971562][T10068] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2384'.
[  139.994854][ T7544] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  140.779009][T10093] FAULT_INJECTION: forcing a failure.
[  140.779009][T10093] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  140.792193][T10093] CPU: 0 UID: 0 PID: 10093 Comm: syz.6.2392 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  140.795902][T10095] loop5: detected capacity change from 0 to 128
[  140.804128][T10093] Tainted: [W]=WARN
[  140.804137][T10093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  140.804147][T10093] Call Trace:
[  140.804154][T10093]  <TASK>
[  140.804162][T10093]  dump_stack_lvl+0xf2/0x150
[  140.814292][T10095] FAT-fs (loop5): error, invalid access to FAT (entry 0x0fffff00)
[  140.814451][T10093]  dump_stack+0x15/0x1a
[  140.824548][T10095] FAT-fs (loop5): Filesystem has been set read-only
[  140.827750][T10093]  should_fail_ex+0x223/0x230
[  140.827778][T10093]  should_fail+0xb/0x10
[  140.862728][T10093]  should_fail_usercopy+0x1a/0x20
[  140.867764][T10093]  _copy_from_user+0x1e/0xb0
[  140.872378][T10093]  copy_msghdr_from_user+0x54/0x2a0
[  140.877592][T10093]  do_recvmmsg+0x256/0x6d0
[  140.882112][T10093]  __x64_sys_recvmmsg+0xe2/0x170
[  140.887105][T10093]  x64_sys_call+0x2a9a/0x2dc0
[  140.891805][T10093]  do_syscall_64+0xc9/0x1c0
[  140.896401][T10093]  ? clear_bhb_loop+0x55/0xb0
[  140.901091][T10093]  ? clear_bhb_loop+0x55/0xb0
[  140.905764][T10093]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  140.911665][T10093] RIP: 0033:0x7efe86b10849
[  140.916070][T10093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  140.935935][T10093] RSP: 002b:00007efe85187058 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[  140.944341][T10093] RAX: ffffffffffffffda RBX: 00007efe86cd5fa0 RCX: 00007efe86b10849
[  140.952304][T10093] RDX: 0000000000000002 RSI: 0000000020005fc0 RDI: 0000000000000007
[  140.960459][T10093] RBP: 00007efe851870a0 R08: 0000000000000000 R09: 0000000000000000
[  140.968421][T10093] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001
[  140.976390][T10093] R13: 0000000000000000 R14: 00007efe86cd5fa0 R15: 00007ffeeaef57f8
[  140.984360][T10093]  </TASK>
[  141.085970][T10115] loop9: detected capacity change from 0 to 512
[  141.093510][T10115] EXT4-fs (loop9): feature flags set on rev 0 fs, running e2fsck is recommended
[  141.096971][T10119] loop6: detected capacity change from 0 to 512
[  141.103531][T10115] EXT4-fs (loop9): mounting ext2 file system using the ext4 subsystem
[  141.122698][T10115] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002]
[  141.130968][T10115] System zones: 0-2, 18-18, 34-34
[  141.138165][T10115] EXT4-fs warning (device loop9): ext4_update_dynamic_rev:1145: updating to rev 1 because of new feature flag, running e2fsck is recommended
[  141.152973][T10115] EXT4-fs error (device loop9): ext4_validate_block_bitmap:432: comm syz.9.2402: bg 0: block 18: invalid block bitmap
[  141.167165][T10115] EXT4-fs error (device loop9) in ext4_mb_clear_bb:6550: Corrupt filesystem
[  141.177957][T10115] EXT4-fs (loop9): 1 truncate cleaned up
[  141.185239][T10115] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  141.212586][T10119] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback.
[  141.248238][T10119] ext4 filesystem being mounted at /318/file1 supports timestamps until 2038-01-19 (0x7fffffff)
[  141.305659][ T7896] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  141.396997][T10129] loop8: detected capacity change from 0 to 1024
[  141.409953][T10129] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-001000000000 ro without journal. Quota mode: writeback.
[  141.472790][T10137] block device autoloading is deprecated and will be removed.
[  141.506950][ T7544] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-001000000000.
[  141.510182][T10137] syz.6.2405: attempt to access beyond end of device
[  141.510182][T10137] md34: rw=2048, sector=0, nr_sectors = 8 limit=0
[  141.534704][T10151] loop9: detected capacity change from 0 to 512
[  141.543398][T10151] EXT4-fs: Ignoring removed orlov option
[  141.550142][T10151] EXT4-fs (loop9): encrypted files will use data=ordered instead of data journaling mode
[  141.562990][T10151] EXT4-fs (loop9): 1 orphan inode deleted
[  141.568808][T10151] EXT4-fs (loop9): 1 truncate cleaned up
[  141.574929][T10151] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  141.597106][T10156] loop8: detected capacity change from 0 to 2048
[  141.603589][T10151] veth0_to_team: entered promiscuous mode
[  141.609471][T10151] veth0_to_team: entered allmulticast mode
[  141.616986][ T5706] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  141.634256][ T7896] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  141.637805][T10156] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  141.659399][T10156] FAULT_INJECTION: forcing a failure.
[  141.659399][T10156] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  141.671398][T10160] loop9: detected capacity change from 0 to 2048
[  141.672503][T10156] CPU: 1 UID: 0 PID: 10156 Comm: syz.8.2417 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  141.690717][T10156] Tainted: [W]=WARN
[  141.694528][T10156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  141.704586][T10156] Call Trace:
[  141.707939][T10156]  <TASK>
[  141.710949][T10156]  dump_stack_lvl+0xf2/0x150
[  141.715593][T10156]  dump_stack+0x15/0x1a
[  141.719785][T10156]  should_fail_ex+0x223/0x230
[  141.724456][T10156]  should_fail+0xb/0x10
[  141.728605][T10156]  should_fail_usercopy+0x1a/0x20
[  141.734151][T10156]  strncpy_from_user+0x25/0x210
[  141.739091][T10156]  ? kmem_cache_alloc_noprof+0x18e/0x320
[  141.744727][T10156]  ? getname_flags+0x81/0x3b0
[  141.749533][T10156]  getname_flags+0xb0/0x3b0
[  141.754107][T10156]  user_path_at+0x26/0x120
[  141.758560][T10156]  do_faccessat+0x396/0x640
[  141.763061][T10156]  __x64_sys_faccessat+0x43/0x50
[  141.768074][T10156]  x64_sys_call+0x1e6d/0x2dc0
[  141.772791][T10156]  do_syscall_64+0xc9/0x1c0
[  141.777291][T10156]  ? clear_bhb_loop+0x55/0xb0
[  141.782089][T10156]  ? clear_bhb_loop+0x55/0xb0
[  141.786857][T10156]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  141.792789][T10156] RIP: 0033:0x7f2cc31d0849
[  141.797223][T10156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  141.816827][T10156] RSP: 002b:00007f2cc1847058 EFLAGS: 00000246 ORIG_RAX: 000000000000010d
[  141.825247][T10156] RAX: ffffffffffffffda RBX: 00007f2cc3395fa0 RCX: 00007f2cc31d0849
[  141.833223][T10156] RDX: 0000000000000005 RSI: 0000000020000000 RDI: 0000000000000007
[  141.841190][T10156] RBP: 00007f2cc18470a0 R08: 0000000000000000 R09: 0000000000000000
[  141.849214][T10156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  141.857182][T10156] R13: 0000000000000000 R14: 00007f2cc3395fa0 R15: 00007ffc796bf878
[  141.865150][T10156]  </TASK>
[  141.888807][T10160] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  141.906273][ T7544] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  142.002974][T10184] loop8: detected capacity change from 0 to 1024
[  142.014095][T10187] loop6: detected capacity change from 0 to 128
[  142.022485][T10184] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback.
[  142.025158][T10187] FAT-fs (loop6): error, invalid access to FAT (entry 0x0fffff00)
[  142.043051][T10187] FAT-fs (loop6): Filesystem has been set read-only
[  142.050570][ T7544] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  142.084936][T10191] FAULT_INJECTION: forcing a failure.
[  142.084936][T10191] name failslab, interval 1, probability 0, space 0, times 0
[  142.097766][T10191] CPU: 0 UID: 0 PID: 10191 Comm: syz.6.2427 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  142.109665][T10191] Tainted: [W]=WARN
[  142.113465][T10191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  142.123532][T10191] Call Trace:
[  142.126811][T10191]  <TASK>
[  142.129756][T10191]  dump_stack_lvl+0xf2/0x150
[  142.134441][T10191]  dump_stack+0x15/0x1a
[  142.138665][T10191]  should_fail_ex+0x223/0x230
[  142.143365][T10191]  should_failslab+0x8f/0xb0
[  142.148065][T10191]  kmem_cache_alloc_noprof+0x52/0x320
[  142.153448][T10191]  ? security_inode_alloc+0x37/0x100
[  142.158804][T10191]  security_inode_alloc+0x37/0x100
[  142.163981][T10191]  inode_init_always_gfp+0x4a2/0x4f0
[  142.169261][T10191]  ? __pfx_shmem_alloc_inode+0x10/0x10
[  142.174747][T10191]  alloc_inode+0x82/0x160
[  142.179073][T10191]  new_inode+0x1e/0x100
[  142.183304][T10191]  shmem_get_inode+0x24e/0x730
[  142.188106][T10191]  __shmem_file_setup+0x127/0x1f0
[  142.193243][T10191]  shmem_file_setup+0x3b/0x50
[  142.197908][T10191]  __se_sys_memfd_create+0x31d/0x5c0
[  142.203245][T10191]  __x64_sys_memfd_create+0x31/0x40
[  142.208463][T10191]  x64_sys_call+0x2d4c/0x2dc0
[  142.213145][T10191]  do_syscall_64+0xc9/0x1c0
[  142.217639][T10191]  ? clear_bhb_loop+0x55/0xb0
[  142.222376][T10191]  ? clear_bhb_loop+0x55/0xb0
[  142.227063][T10191]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  142.232992][T10191] RIP: 0033:0x7efe86b10849
[  142.237407][T10191] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  142.257020][T10191] RSP: 002b:00007efe85186e38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f
[  142.265522][T10191] RAX: ffffffffffffffda RBX: 000000000000052e RCX: 00007efe86b10849
[  142.273544][T10191] RDX: 00007efe85186f10 RSI: 0000000000000000 RDI: 00007efe86b84209
[  142.281528][T10191] RBP: 0000000020000f00 R08: 00007efe85186bd7 R09: 00007efe85186e60
[  142.289569][T10191] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000000
[  142.297526][T10191] R13: 00007efe85186f10 R14: 00007efe85186ed0 R15: 00000000200003c0
[  142.305569][T10191]  </TASK>
[  142.344564][T10201] loop6: detected capacity change from 0 to 128
[  142.407069][T10210] macvlan0: entered promiscuous mode
[  142.413662][T10210] ipvlan0: entered promiscuous mode
[  142.420582][T10210] ipvlan0: left promiscuous mode
[  142.423465][T10212] loop5: detected capacity change from 0 to 128
[  142.431824][T10210] macvlan0: left promiscuous mode
[  142.452509][   T29] kauditd_printk_skb: 678 callbacks suppressed
[  142.452525][   T29] audit: type=1326 audit(1733122318.002:10326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10214 comm="syz.5.2436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feafae00849 code=0x7ffc0000
[  142.460053][T10215] loop5: detected capacity change from 0 to 1024
[  142.482468][   T29] audit: type=1326 audit(1733122318.002:10327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10214 comm="syz.5.2436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feafae00849 code=0x7ffc0000
[  142.493436][T10215] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback.
[  142.512458][   T29] audit: type=1326 audit(1733122318.002:10328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10214 comm="syz.5.2436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7feafae00849 code=0x7ffc0000
[  142.512489][   T29] audit: type=1326 audit(1733122318.002:10329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10214 comm="syz.5.2436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7feafae00883 code=0x7ffc0000
[  142.572010][   T29] audit: type=1326 audit(1733122318.002:10330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10214 comm="syz.5.2436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7feafadff2ff code=0x7ffc0000
[  142.595410][   T29] audit: type=1326 audit(1733122318.022:10331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10214 comm="syz.5.2436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7feafae008d7 code=0x7ffc0000
[  142.618951][   T29] audit: type=1326 audit(1733122318.022:10332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10214 comm="syz.5.2436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7feafadff1b0 code=0x7ffc0000
[  142.642587][   T29] audit: type=1326 audit(1733122318.022:10333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10214 comm="syz.5.2436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7feafae0044b code=0x7ffc0000
[  142.668474][   T29] audit: type=1326 audit(1733122318.052:10334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10214 comm="syz.5.2436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7feafadff4aa code=0x7ffc0000
[  142.691938][   T29] audit: type=1326 audit(1733122318.052:10335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10214 comm="syz.5.2436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7feafadff4aa code=0x7ffc0000
[  142.715919][ T5569] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  142.716441][ T7896] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  142.801346][T10225] loop9: detected capacity change from 0 to 164
[  142.810046][T10225] syz.9.2438: attempt to access beyond end of device
[  142.810046][T10225] loop9: rw=524288, sector=263328, nr_sectors = 4 limit=164
[  142.824261][T10225] syz.9.2438: attempt to access beyond end of device
[  142.824261][T10225] loop9: rw=0, sector=263328, nr_sectors = 4 limit=164
[  142.858952][T10235] FAULT_INJECTION: forcing a failure.
[  142.858952][T10235] name failslab, interval 1, probability 0, space 0, times 0
[  142.871631][T10235] CPU: 1 UID: 0 PID: 10235 Comm: syz.4.2445 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  142.883599][T10235] Tainted: [W]=WARN
[  142.887392][T10235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  142.897452][T10235] Call Trace:
[  142.900888][T10235]  <TASK>
[  142.903804][T10235]  dump_stack_lvl+0xf2/0x150
[  142.908417][T10235]  dump_stack+0x15/0x1a
[  142.912583][T10235]  should_fail_ex+0x223/0x230
[  142.917321][T10235]  ? __hw_addr_add_ex+0x13d/0x360
[  142.922351][T10235]  should_failslab+0x8f/0xb0
[  142.927080][T10235]  __kmalloc_cache_noprof+0x4e/0x320
[  142.932457][T10235]  __hw_addr_add_ex+0x13d/0x360
[  142.937476][T10235]  dev_mc_add+0x63/0xa0
[  142.941635][T10235]  garp_init_applicant+0xed/0x2d0
[  142.946779][T10235]  vlan_gvrp_init_applicant+0x1c/0x30
[  142.952171][T10235]  register_vlan_dev+0xf9/0x470
[  142.957061][T10235]  vlan_newlink+0x2e3/0x320
[  142.961562][T10235]  ? __pfx_vlan_newlink+0x10/0x10
[  142.966605][T10235]  rtnl_newlink_create+0x1ab/0x5c0
[  142.971929][T10235]  rtnl_newlink+0xe3a/0x1200
[  142.976629][T10235]  ? __kfree_skb+0x102/0x150
[  142.981318][T10235]  ? bpf_get_current_comm+0x8e/0xc0
[  142.986583][T10235]  ? __rcu_read_unlock+0x34/0x70
[  142.991518][T10235]  ? bpf_trace_run3+0x12b/0x1d0
[  142.996405][T10235]  ? packet_rcv+0xd4/0x990
[  143.000815][T10235]  ? __kfree_skb+0x102/0x150
[  143.005509][T10235]  ? packet_rcv+0xd4/0x990
[  143.009916][T10235]  ? __rcu_read_unlock+0x4e/0x70
[  143.014853][T10235]  ? avc_has_perm_noaudit+0x1cc/0x210
[  143.020349][T10235]  ? selinux_capable+0x1f2/0x260
[  143.025355][T10235]  ? security_capable+0x81/0x90
[  143.030374][T10235]  ? ns_capable+0x7d/0xb0
[  143.034710][T10235]  ? __pfx_rtnl_newlink+0x10/0x10
[  143.039794][T10235]  rtnetlink_rcv_msg+0x651/0x710
[  143.044733][T10235]  ? ref_tracker_free+0x3a5/0x410
[  143.049752][T10235]  ? __dev_queue_xmit+0x186/0x2090
[  143.054905][T10235]  netlink_rcv_skb+0x12c/0x230
[  143.059714][T10235]  ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[  143.065176][T10235]  rtnetlink_rcv+0x1c/0x30
[  143.069631][T10235]  netlink_unicast+0x599/0x670
[  143.074392][T10235]  netlink_sendmsg+0x5cc/0x6e0
[  143.079147][T10235]  ? __pfx_netlink_sendmsg+0x10/0x10
[  143.084465][T10235]  __sock_sendmsg+0x140/0x180
[  143.089188][T10235]  ____sys_sendmsg+0x312/0x410
[  143.093994][T10235]  __sys_sendmsg+0x19d/0x230
[  143.098774][T10235]  __x64_sys_sendmsg+0x46/0x50
[  143.103545][T10235]  x64_sys_call+0x2734/0x2dc0
[  143.108291][T10235]  do_syscall_64+0xc9/0x1c0
[  143.112792][T10235]  ? clear_bhb_loop+0x55/0xb0
[  143.117558][T10235]  ? clear_bhb_loop+0x55/0xb0
[  143.122292][T10235]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  143.128261][T10235] RIP: 0033:0x7f6f948f0849
[  143.132693][T10235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  143.152294][T10235] RSP: 002b:00007f6f92f67058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  143.160699][T10235] RAX: ffffffffffffffda RBX: 00007f6f94ab5fa0 RCX: 00007f6f948f0849
[  143.168657][T10235] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003
[  143.176617][T10235] RBP: 00007f6f92f670a0 R08: 0000000000000000 R09: 0000000000000000
[  143.184628][T10235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  143.192589][T10235] R13: 0000000000000000 R14: 00007f6f94ab5fa0 R15: 00007fff27373718
[  143.200665][T10235]  </TASK>
[  143.313678][T10259] loop6: detected capacity change from 0 to 128
[  143.323781][T10259] FAT-fs (loop6): error, invalid access to FAT (entry 0x0fffff00)
[  143.331742][T10259] FAT-fs (loop6): Filesystem has been set read-only
[  143.353250][T10264] loop6: detected capacity change from 0 to 128
[  143.396287][T10272] netlink: 'syz.8.2457': attribute type 3 has an invalid length.
[  143.406763][T10268] vlan0: entered promiscuous mode
[  143.579758][T10285] loop8: detected capacity change from 0 to 736
[  143.699590][T10293] macvlan0: entered promiscuous mode
[  143.705720][T10293] ipvlan0: entered promiscuous mode
[  143.711496][T10293] ipvlan0: left promiscuous mode
[  143.716691][T10293] macvlan0: left promiscuous mode
[  144.190560][T10303] FAULT_INJECTION: forcing a failure.
[  144.190560][T10303] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  144.203673][T10303] CPU: 1 UID: 0 PID: 10303 Comm: syz.4.2468 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  144.215594][T10303] Tainted: [W]=WARN
[  144.219460][T10303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  144.229555][T10303] Call Trace:
[  144.232823][T10303]  <TASK>
[  144.235768][T10303]  dump_stack_lvl+0xf2/0x150
[  144.240388][T10303]  dump_stack+0x15/0x1a
[  144.244697][T10303]  should_fail_ex+0x223/0x230
[  144.249370][T10303]  should_fail+0xb/0x10
[  144.253573][T10303]  should_fail_usercopy+0x1a/0x20
[  144.258834][T10303]  strncpy_from_user+0x25/0x210
[  144.263708][T10303]  ? audit_seccomp+0x107/0x130
[  144.268464][T10303]  path_getxattrat+0xb3/0x290
[  144.273145][T10303]  __x64_sys_fgetxattr+0x5b/0x70
[  144.278144][T10303]  x64_sys_call+0xbc6/0x2dc0
[  144.282784][T10303]  do_syscall_64+0xc9/0x1c0
[  144.287379][T10303]  ? clear_bhb_loop+0x55/0xb0
[  144.292056][T10303]  ? clear_bhb_loop+0x55/0xb0
[  144.296763][T10303]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  144.302710][T10303] RIP: 0033:0x7f6f948f0849
[  144.307120][T10303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  144.326782][T10303] RSP: 002b:00007f6f92f67058 EFLAGS: 00000246 ORIG_RAX: 00000000000000c1
[  144.335223][T10303] RAX: ffffffffffffffda RBX: 00007f6f94ab5fa0 RCX: 00007f6f948f0849
[  144.343194][T10303] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff
[  144.351190][T10303] RBP: 00007f6f92f670a0 R08: 0000000000000000 R09: 0000000000000000
[  144.359153][T10303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  144.367182][T10303] R13: 0000000000000000 R14: 00007f6f94ab5fa0 R15: 00007fff27373718
[  144.375224][T10303]  </TASK>
[  144.406936][T10306] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=182 sclass=netlink_route_socket pid=10306 comm=syz.4.2469
[  144.425609][T10308] loop6: detected capacity change from 0 to 164
[  144.432376][T10308] iso9660: Unknown parameter 'cru�>�ft'
[  144.437038][T10310] FAULT_INJECTION: forcing a failure.
[  144.437038][T10310] name failslab, interval 1, probability 0, space 0, times 0
[  144.450831][T10310] CPU: 1 UID: 0 PID: 10310 Comm: syz.4.2471 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  144.462761][T10310] Tainted: [W]=WARN
[  144.466554][T10310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  144.476701][T10310] Call Trace:
[  144.479969][T10310]  <TASK>
[  144.482893][T10310]  dump_stack_lvl+0xf2/0x150
[  144.487608][T10310]  dump_stack+0x15/0x1a
[  144.491760][T10310]  should_fail_ex+0x223/0x230
[  144.496433][T10310]  should_failslab+0x8f/0xb0
[  144.501050][T10310]  kmem_cache_alloc_noprof+0x52/0x320
[  144.506420][T10310]  ? getname_flags+0x81/0x3b0
[  144.511163][T10310]  getname_flags+0x81/0x3b0
[  144.515740][T10310]  getname+0x17/0x20
[  144.519627][T10310]  path_getxattrat+0x124/0x290
[  144.524393][T10310]  __x64_sys_getxattr+0x5c/0x70
[  144.529295][T10310]  x64_sys_call+0x176d/0x2dc0
[  144.533963][T10310]  do_syscall_64+0xc9/0x1c0
[  144.538584][T10310]  ? clear_bhb_loop+0x55/0xb0
[  144.543266][T10310]  ? clear_bhb_loop+0x55/0xb0
[  144.547944][T10310]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  144.553836][T10310] RIP: 0033:0x7f6f948f0849
[  144.558238][T10310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  144.577921][T10310] RSP: 002b:00007f6f92f67058 EFLAGS: 00000246 ORIG_RAX: 00000000000000bf
[  144.586537][T10310] RAX: ffffffffffffffda RBX: 00007f6f94ab5fa0 RCX: 00007f6f948f0849
[  144.594645][T10310] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000140
[  144.602607][T10310] RBP: 00007f6f92f670a0 R08: 0000000000000000 R09: 0000000000000000
[  144.610571][T10310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  144.618543][T10310] R13: 0000000000000000 R14: 00007f6f94ab5fa0 R15: 00007fff27373718
[  144.626510][T10310]  </TASK>
[  144.711706][T10324] loop6: detected capacity change from 0 to 1024
[  144.725662][T10326] lo speed is unknown, defaulting to 1000
[  144.748879][T10324] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback.
[  144.798032][T10341] SELinux:  truncated policydb string identifier
[  144.814656][T10341] SELinux: failed to load policy
[  144.846665][ T5706] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  144.897893][T10350] FAULT_INJECTION: forcing a failure.
[  144.897893][T10350] name failslab, interval 1, probability 0, space 0, times 0
[  144.910658][T10350] CPU: 1 UID: 0 PID: 10350 Comm: syz.5.2482 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  144.922602][T10350] Tainted: [W]=WARN
[  144.926443][T10350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  144.936582][T10350] Call Trace:
[  144.939862][T10350]  <TASK>
[  144.942792][T10350]  dump_stack_lvl+0xf2/0x150
[  144.947422][T10350]  dump_stack+0x15/0x1a
[  144.951679][T10350]  should_fail_ex+0x223/0x230
[  144.956395][T10350]  should_failslab+0x8f/0xb0
[  144.961118][T10350]  kmem_cache_alloc_noprof+0x52/0x320
[  144.966498][T10350]  ? mas_alloc_nodes+0x1e3/0x490
[  144.971449][T10350]  mas_alloc_nodes+0x1e3/0x490
[  144.976263][T10350]  mas_preallocate+0x44a/0x650
[  144.981061][T10350]  __mmap_region+0x809/0x13f0
[  144.985864][T10350]  ? kernelmode_fixup_or_oops+0x58/0xb0
[  144.991424][T10350]  mmap_region+0x164/0x1e0
[  144.995870][T10350]  do_mmap+0x718/0xb60
[  145.000037][T10350]  vm_mmap_pgoff+0x133/0x290
[  145.004781][T10350]  ksys_mmap_pgoff+0xd0/0x330
[  145.009475][T10350]  ? syscall_trace_enter+0x104/0x1f0
[  145.014827][T10350]  ? fpregs_assert_state_consistent+0x83/0xa0
[  145.021026][T10350]  x64_sys_call+0x1940/0x2dc0
[  145.025697][T10350]  do_syscall_64+0xc9/0x1c0
[  145.030201][T10350]  ? clear_bhb_loop+0x55/0xb0
[  145.034874][T10350]  ? clear_bhb_loop+0x55/0xb0
[  145.039629][T10350]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  145.045606][T10350] RIP: 0033:0x7feafae00849
[  145.050015][T10350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  145.069659][T10350] RSP: 002b:00007feaf9435058 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
[  145.078069][T10350] RAX: ffffffffffffffda RBX: 00007feafafc6160 RCX: 00007feafae00849
[  145.086030][T10350] RDX: 0000000000000000 RSI: 0000000000fbe000 RDI: 0000000020000000
[  145.094022][T10350] RBP: 00007feaf94350a0 R08: ffffffffffffffff R09: 0000000000000000
[  145.101983][T10350] R10: 0000000000000031 R11: 0000000000000246 R12: 0000000000000001
[  145.109953][T10350] R13: 0000000000000000 R14: 00007feafafc6160 R15: 00007fff41d4c2b8
[  145.118099][T10350]  </TASK>
[  145.147134][T10356] FAULT_INJECTION: forcing a failure.
[  145.147134][T10356] name failslab, interval 1, probability 0, space 0, times 0
[  145.159829][T10356] CPU: 1 UID: 0 PID: 10356 Comm: syz.9.2489 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  145.171805][T10356] Tainted: [W]=WARN
[  145.175610][T10356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  145.185670][T10356] Call Trace:
[  145.188999][T10356]  <TASK>
[  145.191916][T10356]  dump_stack_lvl+0xf2/0x150
[  145.196510][T10356]  dump_stack+0x15/0x1a
[  145.200849][T10356]  should_fail_ex+0x223/0x230
[  145.205556][T10356]  should_failslab+0x8f/0xb0
[  145.210180][T10356]  __kmalloc_cache_node_noprof+0x56/0x320
[  145.215897][T10356]  ? __get_vm_area_node+0xfb/0x1c0
[  145.221001][T10356]  __get_vm_area_node+0xfb/0x1c0
[  145.226011][T10356]  __vmalloc_node_range_noprof+0x280/0xe80
[  145.231806][T10356]  ? sel_write_load+0x152/0x360
[  145.236658][T10356]  ? _parse_integer_limit+0x167/0x180
[  145.242054][T10356]  ? avc_has_perm_noaudit+0x1cc/0x210
[  145.247508][T10356]  ? sel_write_load+0x152/0x360
[  145.252377][T10356]  vmalloc_noprof+0x5e/0x70
[  145.256874][T10356]  ? sel_write_load+0x152/0x360
[  145.261730][T10356]  sel_write_load+0x152/0x360
[  145.266553][T10356]  ? __pfx_sel_write_load+0x10/0x10
[  145.271821][T10356]  vfs_write+0x281/0x920
[  145.276081][T10356]  ? __fget_files+0x17c/0x1c0
[  145.280768][T10356]  ksys_write+0xe8/0x1b0
[  145.285020][T10356]  __x64_sys_write+0x42/0x50
[  145.289632][T10356]  x64_sys_call+0x287e/0x2dc0
[  145.294353][T10356]  do_syscall_64+0xc9/0x1c0
[  145.298885][T10356]  ? clear_bhb_loop+0x55/0xb0
[  145.303591][T10356]  ? clear_bhb_loop+0x55/0xb0
[  145.308312][T10356]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  145.314273][T10356] RIP: 0033:0x7f2c6dcb0849
[  145.318685][T10356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  145.338461][T10356] RSP: 002b:00007f2c6c327058 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  145.346869][T10356] RAX: ffffffffffffffda RBX: 00007f2c6de75fa0 RCX: 00007f2c6dcb0849
[  145.354840][T10356] RDX: 000000000000000c RSI: 0000000020000500 RDI: 0000000000000003
[  145.362864][T10356] RBP: 00007f2c6c3270a0 R08: 0000000000000000 R09: 0000000000000000
[  145.370819][T10356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  145.378776][T10356] R13: 0000000000000000 R14: 00007f2c6de75fa0 R15: 00007ffc309acb48
[  145.386871][T10356]  </TASK>
[  145.390257][T10356] syz.9.2489: vmalloc error: size 12, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0
[  145.403857][T10356] CPU: 1 UID: 0 PID: 10356 Comm: syz.9.2489 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  145.415866][T10356] Tainted: [W]=WARN
[  145.419719][T10356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  145.429766][T10356] Call Trace:
[  145.433183][T10356]  <TASK>
[  145.436231][T10356]  dump_stack_lvl+0xf2/0x150
[  145.440835][T10356]  dump_stack+0x15/0x1a
[  145.445067][T10356]  warn_alloc+0x145/0x1b0
[  145.449419][T10356]  __vmalloc_node_range_noprof+0x2a5/0xe80
[  145.455229][T10356]  ? _parse_integer_limit+0x167/0x180
[  145.460743][T10356]  ? avc_has_perm_noaudit+0x1cc/0x210
[  145.466201][T10356]  ? sel_write_load+0x152/0x360
[  145.471083][T10356]  vmalloc_noprof+0x5e/0x70
[  145.476100][T10356]  ? sel_write_load+0x152/0x360
[  145.480970][T10356]  sel_write_load+0x152/0x360
[  145.485668][T10356]  ? __pfx_sel_write_load+0x10/0x10
[  145.490878][T10356]  vfs_write+0x281/0x920
[  145.495121][T10356]  ? __fget_files+0x17c/0x1c0
[  145.499928][T10356]  ksys_write+0xe8/0x1b0
[  145.504199][T10356]  __x64_sys_write+0x42/0x50
[  145.508850][T10356]  x64_sys_call+0x287e/0x2dc0
[  145.513512][T10356]  do_syscall_64+0xc9/0x1c0
[  145.518057][T10356]  ? clear_bhb_loop+0x55/0xb0
[  145.522761][T10356]  ? clear_bhb_loop+0x55/0xb0
[  145.527466][T10356]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  145.533436][T10356] RIP: 0033:0x7f2c6dcb0849
[  145.537835][T10356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  145.557506][T10356] RSP: 002b:00007f2c6c327058 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  145.565974][T10356] RAX: ffffffffffffffda RBX: 00007f2c6de75fa0 RCX: 00007f2c6dcb0849
[  145.573958][T10356] RDX: 000000000000000c RSI: 0000000020000500 RDI: 0000000000000003
[  145.581935][T10356] RBP: 00007f2c6c3270a0 R08: 0000000000000000 R09: 0000000000000000
[  145.589957][T10356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  145.598019][T10356] R13: 0000000000000000 R14: 00007f2c6de75fa0 R15: 00007ffc309acb48
[  145.606045][T10356]  </TASK>
[  145.609299][T10356] Mem-Info:
[  145.612614][T10356] active_anon:3289 inactive_anon:0 isolated_anon:0
[  145.612614][T10356]  active_file:7021 inactive_file:12628 isolated_file:0
[  145.612614][T10356]  unevictable:0 dirty:70 writeback:25
[  145.612614][T10356]  slab_reclaimable:3183 slab_unreclaimable:23168
[  145.612614][T10356]  mapped:28851 shmem:606 pagetables:710
[  145.612614][T10356]  sec_pagetables:0 bounce:0
[  145.612614][T10356]  kernel_misc_reclaimable:0
[  145.612614][T10356]  free:1887618 free_pcp:6822 free_cma:0
[  145.657467][T10356] Node 0 active_anon:13156kB inactive_anon:0kB active_file:28084kB inactive_file:50512kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:115404kB dirty:280kB writeback:100kB shmem:2424kB writeback_tmp:0kB kernel_stack:3712kB pagetables:2840kB sec_pagetables:0kB all_unreclaimable? no
[  145.685578][T10356] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB
[  145.712580][T10356] lowmem_reserve[]: 0 2866 7844 0
[  145.717820][T10356] Node 0 DMA32 free:2950376kB boost:0kB min:4136kB low:7068kB high:10000kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2953908kB mlocked:0kB bounce:0kB free_pcp:3532kB local_pcp:0kB free_cma:0kB
[  145.746393][T10356] lowmem_reserve[]: 0 0 4978 0
[  145.750496][T10369] netlink: 12 bytes leftover after parsing attributes in process `syz.8.2494'.
[  145.751169][T10356] Node 0 Normal free:4582688kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB active_anon:13156kB inactive_anon:0kB active_file:28084kB inactive_file:50512kB unevictable:0kB writepending:264kB present:5242880kB managed:5098208kB mlocked:0kB bounce:0kB free_pcp:23660kB local_pcp:10500kB free_cma:0kB
[  145.751228][T10356] lowmem_reserve[]: 0
[  145.760282][T10369] FAULT_INJECTION: forcing a failure.
[  145.760282][T10369] name failslab, interval 1, probability 0, space 0, times 0
[  145.790276][T10356]  0 0 0
[  145.790319][T10356] Node 0 DMA: 
[  145.794282][T10369] CPU: 0 UID: 0 PID: 10369 Comm: syz.8.2494 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  145.806853][T10356] 0*4kB 
[  145.809653][T10369] Tainted: [W]=WARN
[  145.809660][T10369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  145.809671][T10369] Call Trace:
[  145.809677][T10369]  <TASK>
[  145.809685][T10369]  dump_stack_lvl+0xf2/0x150
[  145.813051][T10356] 0*8kB 0*16kB 
[  145.824903][T10369]  dump_stack+0x15/0x1a
[  145.827842][T10356] 0*32kB 
[  145.831522][T10369]  should_fail_ex+0x223/0x230
[  145.841587][T10356] 0*64kB 
[  145.844810][T10369]  should_failslab+0x8f/0xb0
[  145.844838][T10369]  kmem_cache_alloc_node_noprof+0x59/0x320
[  145.844859][T10369]  ? __alloc_skb+0x10b/0x310
[  145.847784][T10356] 0*128kB 
[  145.852330][T10369]  __alloc_skb+0x10b/0x310
[  145.852379][T10369]  netlink_ack+0xef/0x4f0
[  145.855822][T10356] 0*256kB 0*512kB 1*1024kB 
[  145.859964][T10369]  netlink_rcv_skb+0x19c/0x230
[  145.859994][T10369]  ? __pfx_genl_rcv_msg+0x10/0x10
[  145.863017][T10356] (U) 
[  145.867614][T10369]  genl_rcv+0x28/0x40
[  145.870534][T10356] 1*2048kB 
[  145.875090][T10369]  netlink_unicast+0x599/0x670
[  145.880877][T10356] (M) 
[  145.885422][T10369]  netlink_sendmsg+0x5cc/0x6e0
[  145.888505][T10356] 3*4096kB 
[  145.892879][T10369]  ? __pfx_netlink_sendmsg+0x10/0x10
[  145.897187][T10356] (M) 
[  145.901646][T10369]  __sock_sendmsg+0x140/0x180
[  145.906428][T10356] = 15360kB
[  145.911376][T10369]  ____sys_sendmsg+0x312/0x410
[  145.914025][T10356] Node 0 DMA32: 
[  145.917981][T10369]  __sys_sendmsg+0x19d/0x230
[  145.918020][T10369]  __x64_sys_sendmsg+0x46/0x50
[  145.921135][T10356] 4*4kB 
[  145.925869][T10369]  x64_sys_call+0x2734/0x2dc0
[  145.928551][T10356] (M) 1*8kB (M) 1*16kB (M) 4*32kB (M) 
[  145.933313][T10369]  do_syscall_64+0xc9/0x1c0
[  145.936411][T10356] 3*64kB 
[  145.941694][T10369]  ? clear_bhb_loop+0x55/0xb0
[  145.944342][T10356] (M) 3*128kB 
[  145.948988][T10369]  ? clear_bhb_loop+0x55/0xb0
[  145.952090][T10356] (M) 2*256kB 
[  145.956825][T10369]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  145.956854][T10369] RIP: 0033:0x7f2cc31d0849
[  145.956870][T10369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  145.960391][T10356] (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 
[  145.964984][T10369] RSP: 002b:00007f2cc1847058 EFLAGS: 00000246
[  145.969848][T10356] 718*4096kB 
[  145.972656][T10369]  ORIG_RAX: 000000000000002e
[  145.977419][T10356] (M) 
[  145.982832][T10369] RAX: ffffffffffffffda RBX: 00007f2cc3395fa0 RCX: 00007f2cc31d0849
[  145.987322][T10356] = 2950376kB
[  145.990217][T10369] RDX: 0000000000000000 RSI: 0000000020001ac0 RDI: 0000000000000003
[  145.994867][T10356] Node 0 Normal: 
[  145.998211][T10369] RBP: 00007f2cc18470a0 R08: 0000000000000000 R09: 0000000000000000
[  145.998226][T10369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  146.002875][T10356] 2*4kB 
[  146.006215][T10369] R13: 0000000000000000 R14: 00007f2cc3395fa0 R15: 00007ffc796bf878
[  146.006240][T10369]  </TASK>
[  146.076180][T10366] vxcan1: Master is either lo or non-ether device
[  146.078538][T10356] (ME) 
[  146.085053][T10373] IPVS: sync thread started: state = MASTER, mcast_ifn = ip6gre0, syncid = 1, id = 0
[  146.090121][T10356] 79*8kB (ME) 743*16kB (UM) 678*32kB (UME) 574*64kB (UME) 223*128kB (UM) 352*256kB (UME) 550*512kB (UME) 477*1024kB (UM) 191*2048kB (UME) 789*4096kB (UM) = 4582576kB
[  146.148164][T10356] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB
[  146.157458][T10356] 20255 total pagecache pages
[  146.162134][T10356] 0 pages in swap cache
[  146.166285][T10356] Free swap  = 124660kB
[  146.170455][T10356] Total swap = 124996kB
[  146.174583][T10356] 2097051 pages RAM
[  146.178402][T10356] 0 pages HighMem/MovableOnly
[  146.183128][T10356] 80182 pages reserved
[  146.205011][T10375] loop9: detected capacity change from 0 to 736
[  146.338914][T10394] loop6: detected capacity change from 0 to 128
[  146.350990][T10395] FAULT_INJECTION: forcing a failure.
[  146.350990][T10395] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  146.353409][T10397] netlink: 28 bytes leftover after parsing attributes in process `syz.9.2507'.
[  146.364115][T10395] CPU: 1 UID: 0 PID: 10395 Comm: syz.8.2505 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  146.373133][T10397] netlink: 28 bytes leftover after parsing attributes in process `syz.9.2507'.
[  146.385011][T10395] Tainted: [W]=WARN
[  146.385020][T10395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  146.385032][T10395] Call Trace:
[  146.385038][T10395]  <TASK>
[  146.385047][T10395]  dump_stack_lvl+0xf2/0x150
[  146.418659][T10395]  dump_stack+0x15/0x1a
[  146.422829][T10395]  should_fail_ex+0x223/0x230
[  146.427499][T10395]  should_fail+0xb/0x10
[  146.431648][T10395]  should_fail_usercopy+0x1a/0x20
[  146.436668][T10395]  _copy_from_user+0x1e/0xb0
[  146.441364][T10395]  io_register_files_update+0x5a/0x100
[  146.446917][T10395]  __se_sys_io_uring_register+0xaf3/0x21d0
[  146.452803][T10395]  ? get_pid_task+0x8e/0xc0
[  146.457305][T10395]  ? proc_fail_nth_write+0x12a/0x150
[  146.462618][T10395]  ? __pfx_proc_fail_nth_write+0x10/0x10
[  146.468314][T10395]  ? vfs_write+0x596/0x920
[  146.472828][T10395]  ? __fget_files+0x17c/0x1c0
[  146.477535][T10395]  ? fput+0x1c4/0x200
[  146.481509][T10395]  ? ksys_write+0x176/0x1b0
[  146.486017][T10395]  __x64_sys_io_uring_register+0x55/0x70
[  146.491715][T10395]  x64_sys_call+0x2c52/0x2dc0
[  146.496376][T10395]  do_syscall_64+0xc9/0x1c0
[  146.500949][T10395]  ? clear_bhb_loop+0x55/0xb0
[  146.505699][T10395]  ? clear_bhb_loop+0x55/0xb0
[  146.510389][T10395]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  146.516275][T10395] RIP: 0033:0x7f2cc31d0849
[  146.520689][T10395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  146.540308][T10395] RSP: 002b:00007f2cc1847058 EFLAGS: 00000246 ORIG_RAX: 00000000000001ab
[  146.548714][T10395] RAX: ffffffffffffffda RBX: 00007f2cc3395fa0 RCX: 00007f2cc31d0849
[  146.556736][T10395] RDX: 00000000200001c0 RSI: 0000000000000006 RDI: 0000000000000004
[  146.565026][T10395] RBP: 00007f2cc18470a0 R08: 0000000000000000 R09: 0000000000000000
[  146.572984][T10395] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001
[  146.580945][T10395] R13: 0000000000000000 R14: 00007f2cc3395fa0 R15: 00007ffc796bf878
[  146.588967][T10395]  </TASK>
[  146.594000][T10397] netdevsim netdevsim9 netdevsim0: entered promiscuous mode
[  146.618843][T10397] dummy0: entered promiscuous mode
[  146.628058][T10401] netlink: 36 bytes leftover after parsing attributes in process `syz.5.2509'.
[  146.640914][T10401] netlink: 36 bytes leftover after parsing attributes in process `syz.5.2509'.
[  146.678077][T10412] syz.9.2512[10412] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  146.678214][T10412] syz.9.2512[10412] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  146.680786][T10411] lo speed is unknown, defaulting to 1000
[  146.712033][T10412] syz.9.2512[10412] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  146.728870][T10415] FAULT_INJECTION: forcing a failure.
[  146.728870][T10415] name failslab, interval 1, probability 0, space 0, times 0
[  146.752929][T10415] CPU: 1 UID: 0 PID: 10415 Comm: syz.8.2513 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  146.764951][T10415] Tainted: [W]=WARN
[  146.768805][T10415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  146.778878][T10415] Call Trace:
[  146.782156][T10415]  <TASK>
[  146.785096][T10415]  dump_stack_lvl+0xf2/0x150
[  146.789748][T10415]  dump_stack+0x15/0x1a
[  146.793918][T10415]  should_fail_ex+0x223/0x230
[  146.798609][T10415]  should_failslab+0x8f/0xb0
[  146.799752][T10420] syzkaller0: entered allmulticast mode
[  146.803222][T10415]  kmem_cache_alloc_noprof+0x52/0x320
[  146.814259][T10415]  ? audit_log_start+0x34c/0x6b0
[  146.819290][T10415]  audit_log_start+0x34c/0x6b0
[  146.824141][T10415]  audit_seccomp+0x4b/0x130
[  146.828662][T10415]  __seccomp_filter+0x6fa/0x1180
[  146.833643][T10415]  ? rep_movs_alternative+0x4c/0x70
[  146.838859][T10415]  __secure_computing+0x9f/0x1c0
[  146.843799][T10415]  syscall_trace_enter+0xd1/0x1f0
[  146.848827][T10415]  ? fpregs_assert_state_consistent+0x83/0xa0
[  146.854906][T10415]  do_syscall_64+0xaa/0x1c0
[  146.859443][T10415]  ? clear_bhb_loop+0x55/0xb0
[  146.864234][T10415]  ? clear_bhb_loop+0x55/0xb0
[  146.868909][T10415]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  146.874805][T10415] RIP: 0033:0x7f2cc31cf25c
[  146.879287][T10415] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 8e 02 00 48
[  146.898966][T10415] RSP: 002b:00007f2cc1826050 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[  146.907419][T10415] RAX: ffffffffffffffda RBX: 00007f2cc3396080 RCX: 00007f2cc31cf25c
[  146.915458][T10415] RDX: 000000000000000f RSI: 00007f2cc18260b0 RDI: 0000000000000003
[  146.923507][T10415] RBP: 00007f2cc18260a0 R08: 0000000000000000 R09: 0000000000000000
[  146.931521][T10415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  146.939482][T10415] R13: 0000000000000000 R14: 00007f2cc3396080 R15: 00007ffc796bf878
[  146.947452][T10415]  </TASK>
[  146.961633][T10417] netlink: 96 bytes leftover after parsing attributes in process `syz.5.2516'.
[  147.008384][T10428] loop8: detected capacity change from 0 to 736
[  147.016404][T10416] syzkaller0: left allmulticast mode
[  147.061687][T10435] lo speed is unknown, defaulting to 1000
[  147.133112][T10447] loop8: detected capacity change from 0 to 512
[  147.142784][T10447] EXT4-fs error (device loop8): ext4_clear_blocks:876: inode #13: comm syz.8.2525: attempt to clear invalid blocks 1 len 1
[  147.160182][T10447] EXT4-fs error (device loop8): ext4_validate_block_bitmap:441: comm syz.8.2525: bg 0: block 343: padding at end of block bitmap is not set
[  147.162338][T10435] netlink: 'syz.5.2522': attribute type 1 has an invalid length.
[  147.177463][T10447] EXT4-fs error (device loop8) in ext4_mb_clear_bb:6550: Corrupt filesystem
[  147.188868][T10435] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2522'.
[  147.191314][T10447] EXT4-fs error (device loop8): ext4_free_branches:1023: inode #13: comm syz.8.2525: invalid indirect mapped block 1819239214 (level 0)
[  147.214243][T10447] EXT4-fs error (device loop8): ext4_free_branches:1023: inode #13: comm syz.8.2525: invalid indirect mapped block 1819239214 (level 1)
[  147.230647][T10447] EXT4-fs (loop8): 1 truncate cleaned up
[  147.237131][T10447] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  147.269503][T10447] tmpfs: Bad value for 'mpol'
[  147.382954][T10447] ext4: Unknown parameter '�����������18446744073709551615����1844674407370955161518446744073709551615'
[  147.395424][T10447] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[  147.406402][T10447] batman_adv: batadv0: Removing interface: batadv_slave_1
[  147.506266][ T7544] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  147.573500][T10460] IPv6: NLM_F_CREATE should be specified when creating new route
[  147.582022][T10460] netlink: 232 bytes leftover after parsing attributes in process `syz.8.2529'.
[  147.605223][T10462] FAULT_INJECTION: forcing a failure.
[  147.605223][T10462] name failslab, interval 1, probability 0, space 0, times 0
[  147.617981][T10462] CPU: 0 UID: 0 PID: 10462 Comm: syz.9.2530 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  147.629886][T10462] Tainted: [W]=WARN
[  147.633684][T10462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  147.644161][T10462] Call Trace:
[  147.647429][T10462]  <TASK>
[  147.650373][T10462]  dump_stack_lvl+0xf2/0x150
[  147.654957][T10462]  dump_stack+0x15/0x1a
[  147.659146][T10462]  should_fail_ex+0x223/0x230
[  147.663919][T10462]  should_failslab+0x8f/0xb0
[  147.668506][T10462]  kmem_cache_alloc_noprof+0x52/0x320
[  147.673875][T10462]  ? security_file_alloc+0x32/0x100
[  147.679236][T10462]  security_file_alloc+0x32/0x100
[  147.684246][T10462]  init_file+0x5b/0x1b0
[  147.688395][T10462]  alloc_empty_file+0xea/0x200
[  147.693171][T10462]  path_openat+0x6a/0x1fa0
[  147.697820][T10462]  ? mntput+0x49/0x70
[  147.701811][T10462]  ? terminate_walk+0x260/0x280
[  147.706878][T10462]  ? path_openat+0x1a5a/0x1fa0
[  147.711626][T10462]  ? _parse_integer_limit+0x167/0x180
[  147.717101][T10462]  do_filp_open+0x107/0x230
[  147.721701][T10462]  do_open_execat+0xd0/0x280
[  147.726354][T10462]  alloc_bprm+0x28/0x5d0
[  147.730609][T10462]  do_execveat_common+0x134/0x800
[  147.735709][T10462]  __x64_sys_execve+0x5a/0x70
[  147.740434][T10462]  x64_sys_call+0x1333/0x2dc0
[  147.745100][T10462]  do_syscall_64+0xc9/0x1c0
[  147.749602][T10462]  ? clear_bhb_loop+0x55/0xb0
[  147.754297][T10462]  ? clear_bhb_loop+0x55/0xb0
[  147.758962][T10462]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  147.764883][T10462] RIP: 0033:0x7f2c6dcb0849
[  147.769352][T10462] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  147.788946][T10462] RSP: 002b:00007f2c6c327058 EFLAGS: 00000246 ORIG_RAX: 000000000000003b
[  147.797401][T10462] RAX: ffffffffffffffda RBX: 00007f2c6de75fa0 RCX: 00007f2c6dcb0849
[  147.805372][T10462] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000200
[  147.813366][T10462] RBP: 00007f2c6c3270a0 R08: 0000000000000000 R09: 0000000000000000
[  147.821409][T10462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  147.829432][T10462] R13: 0000000000000000 R14: 00007f2c6de75fa0 R15: 00007ffc309acb48
[  147.837399][T10462]  </TASK>
[  147.856962][   T29] kauditd_printk_skb: 406 callbacks suppressed
[  147.856976][   T29] audit: type=1326 audit(1733122323.412:10740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.2531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c6dcb0849 code=0x7ffc0000
[  147.863523][T10464] loop9: detected capacity change from 0 to 1024
[  147.888312][   T29] audit: type=1326 audit(1733122323.412:10741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.2531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c6dcb0849 code=0x7ffc0000
[  147.906960][T10464] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback.
[  147.917023][   T29] audit: type=1326 audit(1733122323.412:10742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.2531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f2c6dcb0849 code=0x7ffc0000
[  147.953324][   T29] audit: type=1326 audit(1733122323.412:10743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.2531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f2c6dcb0883 code=0x7ffc0000
[  147.976981][   T29] audit: type=1326 audit(1733122323.412:10744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.2531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f2c6dcaf2ff code=0x7ffc0000
[  148.000375][   T29] audit: type=1326 audit(1733122323.412:10745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.2531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f2c6dcb08d7 code=0x7ffc0000
[  148.024418][   T29] audit: type=1326 audit(1733122323.412:10746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.2531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2c6dcaf1b0 code=0x7ffc0000
[  148.048059][   T29] audit: type=1326 audit(1733122323.412:10747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.2531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f2c6dcb044b code=0x7ffc0000
[  148.073693][   T29] audit: type=1326 audit(1733122323.442:10748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.2531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f2c6dcaf4aa code=0x7ffc0000
[  148.097237][   T29] audit: type=1326 audit(1733122323.442:10749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.2531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f2c6dcaf4aa code=0x7ffc0000
[  148.125698][ T7896] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  148.138127][T10467] macvlan0: entered promiscuous mode
[  148.146748][T10467] ipvlan0: entered promiscuous mode
[  148.152670][T10467] ipvlan0: left promiscuous mode
[  148.157917][T10467] macvlan0: left promiscuous mode
[  148.194312][T10477] loop6: detected capacity change from 0 to 128
[  148.211930][T10477] FAT-fs (loop6): error, invalid access to FAT (entry 0x0fffff00)
[  148.219929][T10477] FAT-fs (loop6): Filesystem has been set read-only
[  148.228009][T10482] syz.5.2539[10482] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  148.228141][T10482] syz.5.2539[10482] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  148.241471][T10482] syz.5.2539[10482] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  148.287732][T10486] loop5: detected capacity change from 0 to 1024
[  148.314657][T10488] macvlan0: entered promiscuous mode
[  148.322017][T10486] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback.
[  148.346388][T10488] ipvlan0: entered promiscuous mode
[  148.352325][T10488] ipvlan0: left promiscuous mode
[  148.362386][ T5569] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  148.372960][T10488] macvlan0: left promiscuous mode
[  148.386656][T10499] netlink: 4 bytes leftover after parsing attributes in process `syz.8.2548'.
[  148.395562][T10499] netlink: 4 bytes leftover after parsing attributes in process `syz.8.2548'.
[  148.432528][T10505] macvlan0: entered promiscuous mode
[  148.449994][T10505] ipvlan0: entered promiscuous mode
[  148.456121][T10505] ipvlan0: left promiscuous mode
[  148.468157][T10505] macvlan0: left promiscuous mode
[  148.628707][T10523] loop8: detected capacity change from 0 to 1024
[  148.635386][T10523] EXT4-fs: Ignoring removed mblk_io_submit option
[  148.642688][T10523] EXT4-fs (loop8): stripe (9) is not aligned with cluster size (4096), stripe is disabled
[  148.654622][T10523] EXT4-fs (loop8): revision level too high, forcing read-only mode
[  148.663182][T10523] EXT4-fs (loop8): orphan cleanup on readonly fs
[  148.674563][T10523] EXT4-fs error (device loop8): __ext4_get_inode_loc:4435: comm syz.8.2554: Invalid inode table block 0 in block_group 0
[  148.689069][T10523] EXT4-fs (loop8): Remounting filesystem read-only
[  148.695666][T10523] EXT4-fs (loop8): 1 truncate cleaned up
[  148.702240][T10528] FAULT_INJECTION: forcing a failure.
[  148.702240][T10528] name failslab, interval 1, probability 0, space 0, times 0
[  148.702380][T10523] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback.
[  148.714946][T10528] CPU: 1 UID: 0 PID: 10528 Comm: syz.4.2559 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  148.728930][T10523] SELinux: (dev loop8, type ext4) getxattr errno 5
[  148.739092][T10528] Tainted: [W]=WARN
[  148.739101][T10528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  148.739113][T10528] Call Trace:
[  148.747575][T10523] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  148.749409][T10528]  <TASK>
[  148.774646][T10528]  dump_stack_lvl+0xf2/0x150
[  148.779245][T10528]  dump_stack+0x15/0x1a
[  148.783449][T10528]  should_fail_ex+0x223/0x230
[  148.788193][T10528]  should_failslab+0x8f/0xb0
[  148.792825][T10528]  __kmalloc_noprof+0xab/0x3f0
[  148.797629][T10528]  ? genl_family_rcv_msg_attrs_parse+0x75/0x1a0
[  148.803917][T10528]  genl_family_rcv_msg_attrs_parse+0x75/0x1a0
[  148.810062][T10528]  ? ns_capable+0x7d/0xb0
[  148.814395][T10528]  genl_rcv_msg+0x470/0x6c0
[  148.818892][T10528]  ? __pfx_ip_vs_genl_set_cmd+0x10/0x10
[  148.824431][T10528]  ? __dev_queue_xmit+0xb6e/0x2090
[  148.829543][T10528]  ? ref_tracker_free+0x3a5/0x410
[  148.834560][T10528]  ? __dev_queue_xmit+0x186/0x2090
[  148.839735][T10528]  netlink_rcv_skb+0x12c/0x230
[  148.844500][T10528]  ? __pfx_genl_rcv_msg+0x10/0x10
[  148.849547][T10528]  genl_rcv+0x28/0x40
[  148.853614][T10528]  netlink_unicast+0x599/0x670
[  148.858395][T10528]  netlink_sendmsg+0x5cc/0x6e0
[  148.863200][T10528]  ? __pfx_netlink_sendmsg+0x10/0x10
[  148.868477][T10528]  __sock_sendmsg+0x140/0x180
[  148.873173][T10528]  ____sys_sendmsg+0x312/0x410
[  148.878046][T10528]  __sys_sendmsg+0x19d/0x230
[  148.882706][T10528]  __x64_sys_sendmsg+0x46/0x50
[  148.887476][T10528]  x64_sys_call+0x2734/0x2dc0
[  148.892210][T10528]  do_syscall_64+0xc9/0x1c0
[  148.896744][T10528]  ? clear_bhb_loop+0x55/0xb0
[  148.901501][T10528]  ? clear_bhb_loop+0x55/0xb0
[  148.906232][T10528]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  148.912156][T10528] RIP: 0033:0x7f6f948f0849
[  148.916563][T10528] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  148.936266][T10528] RSP: 002b:00007f6f92f67058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  148.944676][T10528] RAX: ffffffffffffffda RBX: 00007f6f94ab5fa0 RCX: 00007f6f948f0849
[  148.952716][T10528] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000003
[  148.960682][T10528] RBP: 00007f6f92f670a0 R08: 0000000000000000 R09: 0000000000000000
[  148.968646][T10528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  148.976614][T10528] R13: 0000000000000000 R14: 00007f6f94ab5fa0 R15: 00007fff27373718
[  148.984582][T10528]  </TASK>
[  149.033629][T10530] gretap0: entered promiscuous mode
[  149.039254][T10530] macsec1: entered promiscuous mode
[  149.044658][T10530] macsec1: entered allmulticast mode
[  149.050099][T10530] gretap0: entered allmulticast mode
[  149.089357][T10536] loop9: detected capacity change from 0 to 128
[  149.101550][T10536] FAT-fs (loop9): error, invalid access to FAT (entry 0x0fffff00)
[  149.109572][T10536] FAT-fs (loop9): Filesystem has been set read-only
[  149.200716][T10548] loop9: detected capacity change from 0 to 128
[  149.211362][T10548] FAT-fs (loop9): error, invalid access to FAT (entry 0x0fffff00)
[  149.219276][T10548] FAT-fs (loop9): Filesystem has been set read-only
[  149.242986][T10552] macvlan0: entered promiscuous mode
[  149.251284][T10552] ipvlan0: entered promiscuous mode
[  149.257435][T10552] ipvlan0: left promiscuous mode
[  149.262668][T10552] macvlan0: left promiscuous mode
[  149.318979][T10560] loop5: detected capacity change from 0 to 1024
[  149.333578][T10560] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback.
[  149.361144][ T5569] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  149.380000][T10569] FAULT_INJECTION: forcing a failure.
[  149.380000][T10569] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  149.393153][T10569] CPU: 1 UID: 0 PID: 10569 Comm: +}[@ Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  149.404542][T10569] Tainted: [W]=WARN
[  149.408378][T10569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  149.418870][T10569] Call Trace:
[  149.422139][T10569]  <TASK>
[  149.425159][T10569]  dump_stack_lvl+0xf2/0x150
[  149.429823][T10569]  dump_stack+0x15/0x1a
[  149.434090][T10569]  should_fail_ex+0x223/0x230
[  149.438839][T10569]  should_fail+0xb/0x10
[  149.443149][T10569]  should_fail_usercopy+0x1a/0x20
[  149.448168][T10569]  _copy_from_user+0x1e/0xb0
[  149.452776][T10569]  bpf_test_init+0x105/0x170
[  149.457436][T10569]  bpf_prog_test_run_xdp+0x321/0x8b0
[  149.462776][T10569]  ? __rcu_read_unlock+0x4e/0x70
[  149.467717][T10569]  ? __pfx_bpf_prog_test_run_xdp+0x10/0x10
[  149.473600][T10569]  bpf_prog_test_run+0x20f/0x3a0
[  149.478608][T10569]  __sys_bpf+0x400/0x7a0
[  149.482858][T10569]  __x64_sys_bpf+0x43/0x50
[  149.487278][T10569]  x64_sys_call+0x2914/0x2dc0
[  149.492022][T10569]  do_syscall_64+0xc9/0x1c0
[  149.496552][T10569]  ? clear_bhb_loop+0x55/0xb0
[  149.501225][T10569]  ? clear_bhb_loop+0x55/0xb0
[  149.505896][T10569]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  149.511835][T10569] RIP: 0033:0x7f2c6dcb0849
[  149.516308][T10569] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  149.536073][T10569] RSP: 002b:00007f2c6c327058 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  149.544552][T10569] RAX: ffffffffffffffda RBX: 00007f2c6de75fa0 RCX: 00007f2c6dcb0849
[  149.552525][T10569] RDX: 0000000000000050 RSI: 0000000020000600 RDI: 000000000000000a
[  149.560525][T10569] RBP: 00007f2c6c3270a0 R08: 0000000000000000 R09: 0000000000000000
[  149.568543][T10569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  149.576521][T10569] R13: 0000000000000000 R14: 00007f2c6de75fa0 R15: 00007ffc309acb48
[  149.584502][T10569]  </TASK>
[  149.616220][T10576] loop9: detected capacity change from 0 to 128
[  149.637691][T10576] FAT-fs (loop9): error, invalid access to FAT (entry 0x0fffff00)
[  149.645585][T10576] FAT-fs (loop9): Filesystem has been set read-only
[  149.750007][T10594] macvlan0: entered promiscuous mode
[  149.769706][T10594] ipvlan0: entered promiscuous mode
[  149.783941][T10594] ipvlan0: left promiscuous mode
[  149.791376][T10594] macvlan0: left promiscuous mode
[  149.875841][T10616] loop6: detected capacity change from 0 to 736
[  149.937517][T10621] lo speed is unknown, defaulting to 1000
[  149.957596][T10618] Cannot find del_set index 0 as target
[  150.003459][T10636] loop5: detected capacity change from 0 to 512
[  150.041346][T10636] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback.
[  150.054751][T10636] ext4 filesystem being mounted at /378/file0 supports timestamps until 2038-01-19 (0x7fffffff)
[  150.067614][T10636] EXT4-fs error (device loop5): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 96 vs 65376 free clusters
[  150.082612][T10636] EXT4-fs error (device loop5): ext4_acquire_dquot:6938: comm +}[@: Failed to acquire dquot type 0
[  150.124511][ T5569] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  150.180862][T10648] loop8: detected capacity change from 0 to 736
[  150.214813][T10621] loop6: detected capacity change from 0 to 256
[  150.235279][T10652] loop8: detected capacity change from 0 to 2048
[  150.239863][T10621] FAT-fs (loop6): Directory bread(block 64) failed
[  150.249613][T10621] FAT-fs (loop6): Directory bread(block 65) failed
[  150.251909][T10654] loop5: detected capacity change from 0 to 128
[  150.256292][T10621] FAT-fs (loop6): Directory bread(block 66) failed
[  150.256314][T10621] FAT-fs (loop6): Directory bread(block 67) failed
[  150.268979][T10654] FAT-fs (loop5): error, invalid access to FAT (entry 0x0fffff00)
[  150.270446][T10621] FAT-fs (loop6): Directory bread(block 68) failed
[  150.275805][T10654] FAT-fs (loop5): Filesystem has been set read-only
[  150.283404][T10621] FAT-fs (loop6): Directory bread(block 69) failed
[  150.283441][T10621] FAT-fs (loop6): Directory bread(block 70) failed
[  150.283459][T10621] FAT-fs (loop6): Directory bread(block 71) failed
[  150.283483][T10621] FAT-fs (loop6): Directory bread(block 72) failed
[  150.283524][T10621] FAT-fs (loop6): Directory bread(block 73) failed
[  150.347939][T10652] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  150.360516][T10652] ext4 filesystem being mounted at /198/file0 supports timestamps until 2038-01-19 (0x7fffffff)
[  150.392097][ T7544] EXT4-fs error (device loop8): ext4_readdir:261: inode #2: block 16: comm syz-executor: path /198/file0: bad entry in directory: rec_len is smaller than minimal - offset=108, inode=646161, rec_len=0, size=4096 fake=0
[  150.432363][ T7544] EXT4-fs error (device loop8): ext4_validate_block_bitmap:441: comm syz-executor: bg 0: block 288: padding at end of block bitmap is not set
[  150.437148][T10621] syz.6.2600: attempt to access beyond end of device
[  150.437148][T10621] loop6: rw=524288, sector=1736, nr_sectors = 32 limit=256
[  150.461443][ T7544] EXT4-fs error (device loop8) in ext4_mb_clear_bb:6550: Corrupt filesystem
[  150.471557][T10621] syz.6.2600: attempt to access beyond end of device
[  150.471557][T10621] loop6: rw=0, sector=1736, nr_sectors = 8 limit=256
[  150.493414][ T7544] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  150.534307][T10666] loop5: detected capacity change from 0 to 1024
[  150.553484][T10666] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback.
[  150.582324][ T5569] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  150.770462][T10682] loop5: detected capacity change from 0 to 512
[  150.828142][T10688] FAULT_INJECTION: forcing a failure.
[  150.828142][T10688] name failslab, interval 1, probability 0, space 0, times 0
[  150.841200][T10688] CPU: 1 UID: 0 PID: 10688 Comm: syz.9.2625 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  150.853127][T10688] Tainted: [W]=WARN
[  150.856925][T10688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  150.867022][T10688] Call Trace:
[  150.870426][T10688]  <TASK>
[  150.873352][T10688]  dump_stack_lvl+0xf2/0x150
[  150.878023][T10688]  dump_stack+0x15/0x1a
[  150.882190][T10688]  should_fail_ex+0x223/0x230
[  150.886872][T10688]  ? nf_tables_newtable+0x3a1/0xf20
[  150.892076][T10688]  should_failslab+0x8f/0xb0
[  150.896690][T10688]  __kmalloc_cache_noprof+0x4e/0x320
[  150.902048][T10688]  nf_tables_newtable+0x3a1/0xf20
[  150.907095][T10688]  nfnetlink_rcv+0xb3e/0x15d0
[  150.911777][T10688]  ? kmem_cache_free+0xdc/0x2d0
[  150.916649][T10688]  netlink_unicast+0x599/0x670
[  150.921418][T10688]  netlink_sendmsg+0x5cc/0x6e0
[  150.926184][T10688]  ? __pfx_netlink_sendmsg+0x10/0x10
[  150.931462][T10688]  __sock_sendmsg+0x140/0x180
[  150.936231][T10688]  ____sys_sendmsg+0x312/0x410
[  150.941024][T10688]  __sys_sendmsg+0x19d/0x230
[  150.945707][T10688]  __x64_sys_sendmsg+0x46/0x50
[  150.950536][T10688]  x64_sys_call+0x2734/0x2dc0
[  150.955238][T10688]  do_syscall_64+0xc9/0x1c0
[  150.959755][T10688]  ? clear_bhb_loop+0x55/0xb0
[  150.964509][T10688]  ? clear_bhb_loop+0x55/0xb0
[  150.969233][T10688]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  150.975136][T10688] RIP: 0033:0x7f2c6dcb0849
[  150.978770][T10682] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback.
[  150.979537][T10688] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  150.992582][T10682] ext4 filesystem being mounted at /388/bus supports timestamps until 2038-01-19 (0x7fffffff)
[  151.011619][T10688] RSP: 002b:00007f2c6c327058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  151.011644][T10688] RAX: ffffffffffffffda RBX: 00007f2c6de75fa0 RCX: 00007f2c6dcb0849
[  151.011657][T10688] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003
[  151.011669][T10688] RBP: 00007f2c6c3270a0 R08: 0000000000000000 R09: 0000000000000000
[  151.011682][T10688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  151.011694][T10688] R13: 0000000000000000 R14: 00007f2c6de75fa0 R15: 00007ffc309acb48
[  151.049006][T10691] __nla_validate_parse: 5 callbacks suppressed
[  151.049022][T10691] netlink: 28 bytes leftover after parsing attributes in process `syz.6.2627'.
[  151.054364][T10688]  </TASK>
[  151.081692][T10687] Cannot find set identified by id 0 to match
[  151.117849][T10690] infiniband syz2: set down
[  151.166417][T10682] EXT4-fs error (device loop5): ext4_do_update_inode:5153: inode #13: comm syz.5.2624: corrupted inode contents
[  151.189855][T10682] EXT4-fs error (device loop5): ext4_dirty_inode:6041: inode #13: comm syz.5.2624: mark_inode_dirty error
[  151.203667][T10682] EXT4-fs error (device loop5): ext4_do_update_inode:5153: inode #13: comm syz.5.2624: corrupted inode contents
[  151.218370][T10682] EXT4-fs error (device loop5): ext4_xattr_delete_inode:3006: inode #13: comm syz.5.2624: mark_inode_dirty error
[  151.231130][T10682] EXT4-fs error (device loop5): ext4_xattr_delete_inode:3009: inode #13: comm syz.5.2624: mark inode dirty (error -117)
[  151.245114][T10682] EXT4-fs warning (device loop5): ext4_evict_inode:276: xattr delete (err -117)
[  151.283815][ T5569] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  151.291399][T10704] FAULT_INJECTION: forcing a failure.
[  151.291399][T10704] name failslab, interval 1, probability 0, space 0, times 0
[  151.305883][T10704] CPU: 1 UID: 0 PID: 10704 Comm: syz.4.2632 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  151.317795][T10704] Tainted: [W]=WARN
[  151.321668][T10704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  151.331776][T10704] Call Trace:
[  151.335074][T10704]  <TASK>
[  151.338029][T10704]  dump_stack_lvl+0xf2/0x150
[  151.342648][T10704]  dump_stack+0x15/0x1a
[  151.346823][T10704]  should_fail_ex+0x223/0x230
[  151.351568][T10704]  should_failslab+0x8f/0xb0
[  151.356167][T10704]  kmem_cache_alloc_noprof+0x52/0x320
[  151.361557][T10704]  ? alloc_vfsmnt+0x2b/0x300
[  151.366165][T10704]  alloc_vfsmnt+0x2b/0x300
[  151.370604][T10704]  clone_mnt+0x45/0x7a0
[  151.374922][T10704]  copy_tree+0x2df/0x7f0
[  151.379208][T10704]  copy_mnt_ns+0x11e/0x5f0
[  151.383637][T10704]  ? kmem_cache_alloc_noprof+0x22c/0x320
[  151.389350][T10704]  ? create_new_namespaces+0x3c/0x430
[  151.394750][T10704]  create_new_namespaces+0x89/0x430
[  151.400029][T10704]  ? security_capable+0x81/0x90
[  151.404885][T10704]  unshare_nsproxy_namespaces+0xe6/0x120
[  151.410605][T10704]  ksys_unshare+0x3c9/0x6e0
[  151.415165][T10704]  __x64_sys_unshare+0x1f/0x30
[  151.419977][T10704]  x64_sys_call+0x1a3e/0x2dc0
[  151.424663][T10704]  do_syscall_64+0xc9/0x1c0
[  151.429211][T10704]  ? clear_bhb_loop+0x55/0xb0
[  151.433876][T10704]  ? clear_bhb_loop+0x55/0xb0
[  151.438711][T10704]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  151.444631][T10704] RIP: 0033:0x7f6f948f0849
[  151.449038][T10704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  151.468814][T10704] RSP: 002b:00007f6f92f67058 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
[  151.471469][T10709] Cannot find del_set index 0 as target
[  151.477209][T10704] RAX: ffffffffffffffda RBX: 00007f6f94ab5fa0 RCX: 00007f6f948f0849
[  151.490775][T10704] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000060400
[  151.498739][T10704] RBP: 00007f6f92f670a0 R08: 0000000000000000 R09: 0000000000000000
[  151.506736][T10704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  151.514712][T10704] R13: 0000000000000000 R14: 00007f6f94ab5fa0 R15: 00007fff27373718
[  151.522722][T10704]  </TASK>
[  151.531825][ T6277] ==================================================================
[  151.539946][ T6277] BUG: KCSAN: data-race in __filemap_remove_folio / nr_blockdev_pages
[  151.548119][ T6277] 
[  151.550428][ T6277] read-write to 0xffff8881004c11f0 of 8 bytes by task 5569 on cpu 0:
[  151.558471][ T6277]  __filemap_remove_folio+0x1c5/0x2c0
[  151.563849][ T6277]  __remove_mapping+0x33f/0x470
[  151.568685][ T6277]  remove_mapping+0x22/0x90
[  151.573183][ T6277]  mapping_try_invalidate+0x265/0x3f0
[  151.578541][ T6277]  invalidate_mapping_pages+0x27/0x40
[  151.583925][ T6277]  invalidate_bdev+0x58/0x70
[  151.588618][ T6277]  ext4_put_super+0x571/0x840
[  151.593295][ T6277]  generic_shutdown_super+0xe5/0x220
[  151.598612][ T6277]  kill_block_super+0x2a/0x70
[  151.603381][ T6277]  ext4_kill_sb+0x44/0x80
[  151.607720][ T6277]  deactivate_locked_super+0x7d/0x1c0
[  151.613093][ T6277]  deactivate_super+0x9f/0xb0
[  151.617765][ T6277]  cleanup_mnt+0x268/0x2e0
[  151.622176][ T6277]  __cleanup_mnt+0x19/0x20
[  151.626611][ T6277]  task_work_run+0x13a/0x1a0
[  151.631190][ T6277]  syscall_exit_to_user_mode+0xa8/0x120
[  151.636741][ T6277]  do_syscall_64+0xd6/0x1c0
[  151.641242][ T6277]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  151.647137][ T6277] 
[  151.649452][ T6277] read to 0xffff8881004c11f0 of 8 bytes by task 6277 on cpu 1:
[  151.657166][ T6277]  nr_blockdev_pages+0x7c/0xd0
[  151.661946][ T6277]  si_meminfo+0x87/0xd0
[  151.666100][ T6277]  update_defense_level+0x49/0x5b0
[  151.671200][ T6277]  defense_work_handler+0x1f/0x80
[  151.676230][ T6277]  process_scheduled_works+0x483/0x9a0
[  151.681701][ T6277]  worker_thread+0x51d/0x6f0
[  151.686305][ T6277]  kthread+0x1d1/0x210
[  151.690395][ T6277]  ret_from_fork+0x4b/0x60
[  151.694810][ T6277]  ret_from_fork_asm+0x1a/0x30
[  151.699571][ T6277] 
[  151.701886][ T6277] value changed: 0x0000000000000016 -> 0x0000000000000015
[  151.708986][ T6277] 
[  151.711296][ T6277] Reported by Kernel Concurrency Sanitizer on:
[  151.717434][ T6277] CPU: 1 UID: 0 PID: 6277 Comm: kworker/1:5 Tainted: G        W          6.12.0-syzkaller-12128-gf788b5ef1ca9 #0
[  151.729319][ T6277] Tainted: [W]=WARN
[  151.733121][ T6277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[  151.743182][ T6277] Workqueue: events_long defense_work_handler
[  151.749271][ T6277] ==================================================================
[  151.800540][T10690] veth0_to_team: left promiscuous mode
[  151.806121][T10690] veth0_to_team: left allmulticast mode
[  151.842079][T10690] netdevsim netdevsim6 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0
[  151.851356][T10690] netdevsim netdevsim6 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0
[  151.860440][T10690] netdevsim netdevsim6 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0
[  151.869513][T10690] netdevsim netdevsim6 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0
[  151.878697][T10690] geneve2: left promiscuous mode
[  151.883681][T10690] geneve2: left allmulticast mode
[  151.889953][ T3377] lo speed is unknown, defaulting to 1000
[  151.895900][ T3377] lo speed is unknown, defaulting to 1000