ecuting program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0xf8, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:45:44 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r3, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r4, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:45:44 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xf9fdffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:45:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x1}, 0x1c) 20:45:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x1}, 0x1c) [ 1630.787857][ T9395] BPF:[1] Invalid name_offset:4294967293 20:45:44 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x6}]}) 20:45:44 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x300, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:45:44 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:45:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x1}, 0x1c) 20:45:44 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfbffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1631.115520][ T9408] BPF:[1] Invalid name_offset:4294967293 20:45:44 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x7}]}) 20:45:44 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x500, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:45:45 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x8}]}) [ 1631.333813][ T9420] BPF:[1] Invalid name_offset:4294967293 [ 1632.089225][ T8079] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1632.106414][ T8079] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1632.117592][ T8079] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1632.135303][ T8079] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1632.156415][ T8079] device bridge_slave_1 left promiscuous mode [ 1632.162666][ T8079] bridge0: port 2(bridge_slave_1) entered disabled state [ 1632.216994][ T8079] device bridge_slave_0 left promiscuous mode [ 1632.243468][ T8079] bridge0: port 1(bridge_slave_0) entered disabled state [ 1632.304674][ T8079] device veth1_macvtap left promiscuous mode [ 1632.310787][ T8079] device veth0_macvtap left promiscuous mode [ 1632.320410][ T8079] device veth1_vlan left promiscuous mode [ 1632.326163][ T8079] device veth0_vlan left promiscuous mode [ 1634.066740][ T8079] device hsr_slave_0 left promiscuous mode [ 1634.106404][ T8079] device hsr_slave_1 left promiscuous mode [ 1634.165262][ T8079] team0 (unregistering): Port device team_slave_1 removed [ 1634.177409][ T8079] team0 (unregistering): Port device team_slave_0 removed [ 1634.192752][ T8079] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1634.249897][ T8079] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1634.345593][ T8079] bond0 (unregistering): Released all slaves [ 1634.444255][ T9427] IPVS: ftp: loaded support on port[0] = 21 [ 1634.526223][ T9427] chnl_net:caif_netlink_parms(): no params data found [ 1634.628087][ T9427] bridge0: port 1(bridge_slave_0) entered blocking state [ 1634.635226][ T9427] bridge0: port 1(bridge_slave_0) entered disabled state [ 1634.660324][ T9427] device bridge_slave_0 entered promiscuous mode [ 1634.687666][ T9427] bridge0: port 2(bridge_slave_1) entered blocking state [ 1634.694826][ T9427] bridge0: port 2(bridge_slave_1) entered disabled state [ 1634.703081][ T9427] device bridge_slave_1 entered promiscuous mode [ 1634.738536][ T9427] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1634.767993][ T9427] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1634.807139][ T9427] team0: Port device team_slave_0 added [ 1634.814115][ T9427] team0: Port device team_slave_1 added [ 1634.857602][ T9427] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1634.864638][ T9427] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1634.926266][ T9427] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1634.947607][ T9427] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1634.954583][ T9427] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1635.026274][ T9427] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1635.108955][ T9427] device hsr_slave_0 entered promiscuous mode [ 1635.156680][ T9427] device hsr_slave_1 entered promiscuous mode [ 1635.278197][ T9427] bridge0: port 2(bridge_slave_1) entered blocking state [ 1635.285310][ T9427] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1635.292673][ T9427] bridge0: port 1(bridge_slave_0) entered blocking state [ 1635.299724][ T9427] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1635.337705][ T9427] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1635.350608][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1635.359288][ T8683] bridge0: port 1(bridge_slave_0) entered disabled state [ 1635.368445][ T8683] bridge0: port 2(bridge_slave_1) entered disabled state [ 1635.391527][ T9427] 8021q: adding VLAN 0 to HW filter on device team0 [ 1635.404971][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1635.414330][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1635.421411][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1635.452329][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1635.461541][T30608] bridge0: port 2(bridge_slave_1) entered blocking state [ 1635.468653][T30608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1635.481425][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1635.491368][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1635.510492][ T9427] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1635.524339][ T9427] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1635.536655][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1635.548994][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1635.558968][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1635.570603][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1635.580423][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1635.608383][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1635.616458][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1635.623924][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1635.650963][ T9427] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1635.726700][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1635.735435][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1635.755509][ T9427] device veth0_vlan entered promiscuous mode [ 1635.765760][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1635.774341][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1635.791731][ T9427] device veth1_vlan entered promiscuous mode [ 1635.802775][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1635.811253][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1635.823151][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1635.845891][ T9427] device veth0_macvtap entered promiscuous mode [ 1635.854490][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1635.866757][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1635.875436][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1635.889026][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1635.907872][ T9427] device veth1_macvtap entered promiscuous mode [ 1635.932423][ T9427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1635.942916][ T9427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1635.954661][ T9427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1635.968964][ T9427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1635.979597][ T9427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1635.993211][ T9427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1636.003879][ T9427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1636.017693][ T9427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1636.029235][ T9427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1636.041663][ T9427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1636.054818][ T9427] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1636.065190][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1636.075474][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1636.088424][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1636.100414][ T9427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1636.113388][ T9427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1636.128101][ T9427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1636.140334][ T9427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1636.152100][ T9427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1636.164199][ T9427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1636.175735][ T9427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1636.192513][ T9427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1636.202454][ T9427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1636.216193][ T9427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1636.231173][ T9427] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1636.239728][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1636.251967][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1636.408736][ T9436] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:45:50 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r3, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r4, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:45:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x1}, 0x1c) 20:45:50 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x600, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:45:50 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4000080000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:45:50 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x300}]}) 20:45:50 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1636.590398][ T9443] BPF:[1] Invalid name_offset:4294967293 20:45:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x1}, 0x1c) 20:45:50 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x700, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:45:50 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x500}]}) 20:45:50 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1636.798128][ T9455] BPF:[1] Invalid name_offset:4294967293 20:45:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x1}, 0x1c) 20:45:50 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x1c00, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:45:50 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r3, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r4, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:45:50 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:45:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x1}, 0x1c) [ 1636.992810][ T9466] BPF:[1] Invalid name_offset:4294967293 20:45:50 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x600}]}) 20:45:50 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r3, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r4, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1637.079740][T10636] tipc: TX() has been purged, node left! 20:45:50 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x1e00, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:45:50 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:45:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x1}, 0x1c) 20:45:51 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x700}]}) [ 1637.317122][ T9478] BPF:[1] Invalid name_offset:4294967293 20:45:51 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x2000, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:45:51 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xff000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:45:51 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x4000}]}) 20:45:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x1}, 0x1c) 20:45:51 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1637.707687][ T9494] BPF:[1] Invalid name_offset:4294967293 20:45:51 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x4800, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:45:51 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0xff00}]}) [ 1638.052535][ T9510] BPF:[1] Invalid name_offset:4294967293 [ 1638.440122][T10636] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1638.456483][T10636] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1638.481416][T10636] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1638.499474][T10636] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1638.520187][T10636] device bridge_slave_1 left promiscuous mode [ 1638.539592][T10636] bridge0: port 2(bridge_slave_1) entered disabled state [ 1638.596901][T10636] device bridge_slave_0 left promiscuous mode [ 1638.603307][T10636] bridge0: port 1(bridge_slave_0) entered disabled state [ 1638.693446][T10636] device veth1_macvtap left promiscuous mode [ 1638.726348][T10636] device veth0_macvtap left promiscuous mode [ 1638.732422][T10636] device veth1_vlan left promiscuous mode [ 1638.766329][T10636] device veth0_vlan left promiscuous mode [ 1640.486989][T10636] device hsr_slave_0 left promiscuous mode [ 1640.526515][T10636] device hsr_slave_1 left promiscuous mode [ 1640.585083][T10636] team0 (unregistering): Port device team_slave_1 removed [ 1640.598449][T10636] team0 (unregistering): Port device team_slave_0 removed [ 1640.613564][T10636] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1640.673594][T10636] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1640.760256][T10636] bond0 (unregistering): Released all slaves [ 1640.854392][ T9514] IPVS: ftp: loaded support on port[0] = 21 [ 1640.950436][ T9514] chnl_net:caif_netlink_parms(): no params data found [ 1641.066293][ T9514] bridge0: port 1(bridge_slave_0) entered blocking state [ 1641.073670][ T9514] bridge0: port 1(bridge_slave_0) entered disabled state [ 1641.087236][ T9514] device bridge_slave_0 entered promiscuous mode [ 1641.107491][ T9514] bridge0: port 2(bridge_slave_1) entered blocking state [ 1641.114772][ T9514] bridge0: port 2(bridge_slave_1) entered disabled state [ 1641.140609][ T9514] device bridge_slave_1 entered promiscuous mode [ 1641.192424][ T9514] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1641.218021][ T9514] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1641.257633][ T9514] team0: Port device team_slave_0 added [ 1641.264821][ T9514] team0: Port device team_slave_1 added [ 1641.308158][ T9514] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1641.315331][ T9514] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1641.376297][ T9514] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1641.407639][ T9514] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1641.414949][ T9514] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1641.486313][ T9514] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1641.568604][ T9514] device hsr_slave_0 entered promiscuous mode [ 1641.606659][ T9514] device hsr_slave_1 entered promiscuous mode [ 1641.750894][ T9514] bridge0: port 2(bridge_slave_1) entered blocking state [ 1641.758118][ T9514] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1641.765621][ T9514] bridge0: port 1(bridge_slave_0) entered blocking state [ 1641.772705][ T9514] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1641.821811][ T9514] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1641.834968][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1641.847739][T30609] bridge0: port 1(bridge_slave_0) entered disabled state [ 1641.855826][T30609] bridge0: port 2(bridge_slave_1) entered disabled state [ 1641.884220][ T9514] 8021q: adding VLAN 0 to HW filter on device team0 [ 1641.900548][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1641.910973][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1641.922063][ T8063] bridge0: port 1(bridge_slave_0) entered blocking state [ 1641.929157][ T8063] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1641.950253][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1641.961469][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1641.970248][T30608] bridge0: port 2(bridge_slave_1) entered blocking state [ 1641.977309][T30608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1641.989078][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1641.999489][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1642.019665][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1642.031738][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1642.040935][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1642.053802][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1642.063430][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1642.075694][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1642.084306][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1642.096778][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1642.106771][ T9514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1642.122567][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1642.139698][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1642.148734][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1642.158246][ T9514] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1642.231087][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1642.240351][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1642.262577][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1642.276010][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1642.286669][ T9514] device veth0_vlan entered promiscuous mode [ 1642.300775][ T9514] device veth1_vlan entered promiscuous mode [ 1642.308308][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1642.319807][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1642.328026][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1642.352013][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1642.364040][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1642.373324][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1642.387312][ T9514] device veth0_macvtap entered promiscuous mode [ 1642.396071][ T9514] device veth1_macvtap entered promiscuous mode [ 1642.415781][ T9514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1642.433419][ T9514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1642.444610][ T9514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1642.458732][ T9514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1642.469792][ T9514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1642.483464][ T9514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1642.494525][ T9514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1642.510821][ T9514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1642.522019][ T9514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1642.535926][ T9514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1642.551568][ T9514] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1642.559901][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1642.572027][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1642.580491][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1642.593678][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1642.604304][ T9514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1642.618219][ T9514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1642.629772][ T9514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1642.642613][ T9514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1642.653938][ T9514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1642.667848][ T9514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1642.680222][ T9514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1642.692422][ T9514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1642.704801][ T9514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1642.717272][ T9514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1642.731342][ T9514] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1642.742313][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1642.754150][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1642.879238][ T9523] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:45:56 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:45:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x1}, 0x1c) 20:45:56 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x4c00, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:45:56 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:45:56 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:45:56 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x400000}]}) 20:45:56 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}]}) [ 1643.084217][ T9535] BPF:[1] Invalid name_offset:4294967293 20:45:56 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x6000, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:45:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x1}, 0x1c) 20:45:56 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x2000000}]}) 20:45:56 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x7400000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1643.279812][ T9545] BPF:[1] Invalid name_offset:4294967293 20:45:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x1}, 0x1c) 20:45:57 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:45:57 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x3000000}]}) 20:45:57 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xffefffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:45:57 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x6800, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:45:57 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1643.551825][T10636] tipc: TX() has been purged, node left! 20:45:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x1}, 0x1c) 20:45:57 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x4000000}]}) [ 1643.621668][ T9557] BPF:[1] Invalid name_offset:4294967293 20:45:57 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:45:57 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x6c00, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:45:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x1}, 0x1c) 20:45:57 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x5000000}]}) [ 1643.940344][ T9574] BPF:[1] Invalid name_offset:4294967293 20:45:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x1}, 0x1c) 20:45:57 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xffffefff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:45:57 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x7400, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:45:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x1}, 0x1c) 20:45:57 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x6000000}]}) [ 1644.294457][ T9589] BPF:[1] Invalid name_offset:4294967293 [ 1645.090011][T10636] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1645.100814][T10636] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1645.109009][T10636] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1645.119320][T10636] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1645.128164][T10636] device bridge_slave_1 left promiscuous mode [ 1645.134422][T10636] bridge0: port 2(bridge_slave_1) entered disabled state [ 1645.186991][T10636] device bridge_slave_0 left promiscuous mode [ 1645.193196][T10636] bridge0: port 1(bridge_slave_0) entered disabled state [ 1645.250543][T10636] device veth1_macvtap left promiscuous mode [ 1645.260034][T10636] device veth0_macvtap left promiscuous mode [ 1645.266047][T10636] device veth1_vlan left promiscuous mode [ 1645.272262][T10636] device veth0_vlan left promiscuous mode [ 1647.136837][T10636] device hsr_slave_0 left promiscuous mode [ 1647.176422][T10636] device hsr_slave_1 left promiscuous mode [ 1647.234907][T10636] team0 (unregistering): Port device team_slave_1 removed [ 1647.249639][T10636] team0 (unregistering): Port device team_slave_0 removed [ 1647.261341][T10636] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1647.320510][T10636] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1647.413293][T10636] bond0 (unregistering): Released all slaves [ 1647.505340][ T9596] IPVS: ftp: loaded support on port[0] = 21 [ 1647.669313][ T9596] chnl_net:caif_netlink_parms(): no params data found [ 1647.761137][ T9596] bridge0: port 1(bridge_slave_0) entered blocking state [ 1647.779020][ T9596] bridge0: port 1(bridge_slave_0) entered disabled state [ 1647.799701][ T9596] device bridge_slave_0 entered promiscuous mode [ 1647.820510][ T9596] bridge0: port 2(bridge_slave_1) entered blocking state [ 1647.839325][ T9596] bridge0: port 2(bridge_slave_1) entered disabled state [ 1647.860773][ T9596] device bridge_slave_1 entered promiscuous mode [ 1647.899895][ T9596] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1647.928283][ T9596] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1647.968926][ T9596] team0: Port device team_slave_0 added [ 1647.976655][ T9596] team0: Port device team_slave_1 added [ 1647.995088][ T9596] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1648.005308][ T9596] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1648.034820][ T9596] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1648.050991][ T9596] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1648.058177][ T9596] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1648.085123][ T9596] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1648.149274][ T9596] device hsr_slave_0 entered promiscuous mode [ 1648.209883][ T9596] device hsr_slave_1 entered promiscuous mode [ 1648.397819][ T9596] bridge0: port 2(bridge_slave_1) entered blocking state [ 1648.405049][ T9596] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1648.412568][ T9596] bridge0: port 1(bridge_slave_0) entered blocking state [ 1648.419627][ T9596] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1648.507381][ T9596] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1648.516135][ T8683] bridge0: port 1(bridge_slave_0) entered disabled state [ 1648.524684][ T8683] bridge0: port 2(bridge_slave_1) entered disabled state [ 1648.559477][ T9596] 8021q: adding VLAN 0 to HW filter on device team0 [ 1648.567121][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1648.580186][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1648.607709][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1648.617098][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1648.625875][T30608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1648.633124][T30608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1648.642055][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1648.651572][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1648.660917][T30608] bridge0: port 2(bridge_slave_1) entered blocking state [ 1648.668024][T30608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1648.677075][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1648.686923][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1648.696162][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1648.705728][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1648.723138][ T9596] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1648.734836][ T9596] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1648.747647][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1648.756999][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1648.766086][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1648.775452][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1648.785070][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1648.794357][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1648.803729][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1648.822636][ T9596] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1648.830276][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1648.839371][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1648.847433][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1648.911147][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1648.923824][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1648.941102][ T9596] device veth0_vlan entered promiscuous mode [ 1648.949808][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1648.961947][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1648.975715][ T9596] device veth1_vlan entered promiscuous mode [ 1648.984254][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1648.992592][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1649.001410][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1649.022987][ T9596] device veth0_macvtap entered promiscuous mode [ 1649.031046][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1649.040313][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1649.049991][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1649.061219][ T9596] device veth1_macvtap entered promiscuous mode [ 1649.069268][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1649.078479][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1649.093151][ T9596] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1649.104492][ T9596] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1649.115287][ T9596] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1649.126548][ T9596] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1649.137038][ T9596] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1649.148520][ T9596] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1649.158899][ T9596] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1649.169716][ T9596] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1649.180345][ T9596] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1649.191326][ T9596] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1649.203235][ T9596] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1649.213591][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1649.223980][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1649.235450][ T9596] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1649.247208][ T9596] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1649.257884][ T9596] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1649.268927][ T9596] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1649.280087][ T9596] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1649.290914][ T9596] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1649.301280][ T9596] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1649.312566][ T9596] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1649.322924][ T9596] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1649.333830][ T9596] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1649.346020][ T9596] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1649.355217][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1649.365139][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1649.499487][ T9605] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:46:03 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:03 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, 0x1}, 0x1c) 20:46:03 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x7a00, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:03 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x7000000}]}) 20:46:03 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfffffdf9, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1649.643314][ T9610] BPF:[1] Invalid name_offset:4294967293 20:46:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) 20:46:03 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0xf800, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:03 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x8000000}]}) 20:46:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x1}, 0x1c) 20:46:03 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1649.905979][ T9625] BPF:[1] Invalid name_offset:4294967293 20:46:03 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0xff000000}]}) 20:46:03 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:03 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfffffdfc, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:03 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x1}, 0x1c) 20:46:03 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x40000000000000}]}) [ 1650.335458][ T9644] BPF:[1] Invalid name_offset:4294967293 20:46:04 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1650.376337][T10636] tipc: TX() has been purged, node left! 20:46:04 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x100000000000000}]}) 20:46:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x1}, 0x1c) 20:46:04 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x940f000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:04 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x2, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1650.707048][ T9656] BPF:[1] Invalid name_offset:4294967293 20:46:04 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:04 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x200000000000000}]}) 20:46:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x1}, 0x1c) 20:46:04 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x3, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1650.979762][ T9670] BPF:[1] Invalid name_offset:4294967293 20:46:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x1}, 0x1c) 20:46:04 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x300000000000000}]}) 20:46:04 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x97ffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1652.003944][T10636] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1652.026422][T10636] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1652.041593][T10636] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1652.060008][T10636] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1652.080808][T10636] device bridge_slave_1 left promiscuous mode [ 1652.106508][T10636] bridge0: port 2(bridge_slave_1) entered disabled state [ 1652.147095][T10636] device bridge_slave_0 left promiscuous mode [ 1652.153416][T10636] bridge0: port 1(bridge_slave_0) entered disabled state [ 1652.224579][T10636] device veth1_macvtap left promiscuous mode [ 1652.230735][T10636] device veth0_macvtap left promiscuous mode [ 1652.240215][T10636] device veth1_vlan left promiscuous mode [ 1652.246059][T10636] device veth0_vlan left promiscuous mode [ 1653.960056][T10636] device hsr_slave_0 left promiscuous mode [ 1653.999839][T10636] device hsr_slave_1 left promiscuous mode [ 1654.070876][T10636] team0 (unregistering): Port device team_slave_1 removed [ 1654.082512][T10636] team0 (unregistering): Port device team_slave_0 removed [ 1654.093311][T10636] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1654.150282][T10636] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1654.235958][T10636] bond0 (unregistering): Released all slaves [ 1654.334687][ T9684] IPVS: ftp: loaded support on port[0] = 21 [ 1654.497136][ T9684] chnl_net:caif_netlink_parms(): no params data found [ 1654.576864][ T9684] bridge0: port 1(bridge_slave_0) entered blocking state [ 1654.584021][ T9684] bridge0: port 1(bridge_slave_0) entered disabled state [ 1654.609822][ T9684] device bridge_slave_0 entered promiscuous mode [ 1654.617739][ T9684] bridge0: port 2(bridge_slave_1) entered blocking state [ 1654.624821][ T9684] bridge0: port 2(bridge_slave_1) entered disabled state [ 1654.636063][ T9684] device bridge_slave_1 entered promiscuous mode [ 1654.658083][ T9684] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1654.672683][ T9684] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1654.696516][ T9684] team0: Port device team_slave_0 added [ 1654.703556][ T9684] team0: Port device team_slave_1 added [ 1654.723209][ T9684] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1654.733432][ T9684] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1654.763276][ T9684] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1654.775395][ T9684] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1654.786093][ T9684] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1654.816396][ T9684] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1654.908774][ T9684] device hsr_slave_0 entered promiscuous mode [ 1654.946618][ T9684] device hsr_slave_1 entered promiscuous mode [ 1655.122743][ T9684] bridge0: port 2(bridge_slave_1) entered blocking state [ 1655.129865][ T9684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1655.137169][ T9684] bridge0: port 1(bridge_slave_0) entered blocking state [ 1655.144390][ T9684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1655.235738][ T9684] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1655.253506][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1655.262395][T30609] bridge0: port 1(bridge_slave_0) entered disabled state [ 1655.273776][T30609] bridge0: port 2(bridge_slave_1) entered disabled state [ 1655.305838][ T9684] 8021q: adding VLAN 0 to HW filter on device team0 [ 1655.330516][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1655.339308][T30609] bridge0: port 1(bridge_slave_0) entered blocking state [ 1655.346382][T30609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1655.376826][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1655.385604][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1655.420393][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1655.427507][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1655.436139][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1655.448246][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1655.459760][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1655.470194][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1655.488950][ T9684] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1655.500106][ T9684] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1655.512109][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1655.520580][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1655.529775][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1655.539313][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1655.548407][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1655.557478][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1655.566054][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1655.575219][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1655.591616][ T9684] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1655.617679][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1655.625465][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1655.727526][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1655.739715][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1655.760498][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1655.769436][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1655.783364][ T9684] device veth0_vlan entered promiscuous mode [ 1655.792066][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1655.802981][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1655.814498][ T9684] device veth1_vlan entered promiscuous mode [ 1655.835766][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1655.848524][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1655.858789][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1655.870360][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1655.883252][ T9684] device veth0_macvtap entered promiscuous mode [ 1655.892985][ T9684] device veth1_macvtap entered promiscuous mode [ 1655.906958][ T9684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1655.918260][ T9684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1655.928210][ T9684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1655.938893][ T9684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1655.949136][ T9684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1655.959890][ T9684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1655.969961][ T9684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1655.981071][ T9684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1655.991380][ T9684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1656.002078][ T9684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1656.013778][ T9684] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1656.022501][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1656.031484][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1656.040362][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1656.049448][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1656.060289][ T9684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1656.071887][ T9684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1656.082203][ T9684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1656.093065][ T9684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1656.103387][ T9684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1656.114441][ T9684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1656.124750][ T9684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1656.135543][ T9684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1656.145563][ T9684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1656.156425][ T9684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1656.167759][ T9684] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1656.176471][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1656.185244][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1656.320134][ T9694] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:46:10 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') socket$kcm(0xa, 0x5, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r3, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r4, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:10 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x4, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x1}, 0x1c) 20:46:10 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x400000000000000}]}) 20:46:10 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:10 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xf5ffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1656.487876][ T9702] BPF:[1] Invalid name_offset:4294967293 20:46:10 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x5, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:10 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x500000000000000}]}) 20:46:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x1}, 0x1c) 20:46:10 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfffffff5, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1656.652961][ T9711] BPF:[1] Invalid name_offset:4294967293 20:46:10 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x6, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:10 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x600000000000000}]}) 20:46:10 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') socket$kcm(0xa, 0x5, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r3, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r4, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x1}, 0x1c) 20:46:10 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x7, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1656.819925][ T9724] BPF:[1] Invalid name_offset:4294967293 20:46:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x1}, 0x1c) [ 1656.935192][ T9732] BPF:[1] Invalid name_offset:4294967293 20:46:10 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x8, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:10 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1657.036305][T10636] tipc: TX() has been purged, node left! 20:46:10 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x700000000000000}]}) 20:46:10 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') socket$kcm(0xa, 0x5, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r3, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r4, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x1}, 0x1c) [ 1657.093733][ T9739] BPF:[1] Invalid name_offset:4294967293 20:46:10 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:10 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x1c, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x1}, 0x1c) [ 1657.353100][ T9751] BPF:[1] Invalid name_offset:4294967293 20:46:11 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x1e, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:11 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x800000000000000}]}) [ 1657.506632][ T9760] BPF:[1] Invalid name_offset:4294967293 20:46:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x1}, 0x1c) 20:46:11 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0xff00000000000000}]}) 20:46:11 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xf9fdffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:11 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x48, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:11 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfffffffb, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1657.881630][ T9774] BPF:[1] Invalid name_offset:4294967293 [ 1658.683115][T10636] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1658.690648][T10636] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1658.709175][T10636] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1658.720292][T10636] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1658.728703][T10636] device bridge_slave_1 left promiscuous mode [ 1658.734995][T10636] bridge0: port 2(bridge_slave_1) entered disabled state [ 1658.777003][T10636] device bridge_slave_0 left promiscuous mode [ 1658.783485][T10636] bridge0: port 1(bridge_slave_0) entered disabled state [ 1658.841167][T10636] device veth1_macvtap left promiscuous mode [ 1658.850552][T10636] device veth0_macvtap left promiscuous mode [ 1658.857094][T10636] device veth1_vlan left promiscuous mode [ 1658.862849][T10636] device veth0_vlan left promiscuous mode [ 1660.677116][T10636] device hsr_slave_0 left promiscuous mode [ 1660.716352][T10636] device hsr_slave_1 left promiscuous mode [ 1660.774126][T10636] team0 (unregistering): Port device team_slave_1 removed [ 1660.785714][T10636] team0 (unregistering): Port device team_slave_0 removed [ 1660.800416][T10636] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1660.853459][T10636] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1660.942578][T10636] bond0 (unregistering): Released all slaves [ 1661.034450][ T9783] IPVS: ftp: loaded support on port[0] = 21 [ 1661.132330][ T9783] chnl_net:caif_netlink_parms(): no params data found [ 1661.241573][ T9783] bridge0: port 1(bridge_slave_0) entered blocking state [ 1661.269357][ T9783] bridge0: port 1(bridge_slave_0) entered disabled state [ 1661.290210][ T9783] device bridge_slave_0 entered promiscuous mode [ 1661.298376][ T9783] bridge0: port 2(bridge_slave_1) entered blocking state [ 1661.306593][ T9783] bridge0: port 2(bridge_slave_1) entered disabled state [ 1661.326354][ T9783] device bridge_slave_1 entered promiscuous mode [ 1661.378770][ T9783] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1661.398191][ T9783] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1661.438009][ T9783] team0: Port device team_slave_0 added [ 1661.445015][ T9783] team0: Port device team_slave_1 added [ 1661.486733][ T9783] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1661.493733][ T9783] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1661.556289][ T9783] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1661.587534][ T9783] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1661.594647][ T9783] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1661.659652][ T9783] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1661.752096][ T9783] device hsr_slave_0 entered promiscuous mode [ 1661.806570][ T9783] device hsr_slave_1 entered promiscuous mode [ 1661.942066][ T9783] bridge0: port 2(bridge_slave_1) entered blocking state [ 1661.949182][ T9783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1661.956507][ T9783] bridge0: port 1(bridge_slave_0) entered blocking state [ 1661.963537][ T9783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1662.026554][ T9783] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1662.047146][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1662.055827][ T8063] bridge0: port 1(bridge_slave_0) entered disabled state [ 1662.077139][ T8063] bridge0: port 2(bridge_slave_1) entered disabled state [ 1662.101523][ T9783] 8021q: adding VLAN 0 to HW filter on device team0 [ 1662.116829][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1662.125461][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1662.134522][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1662.141572][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1662.158796][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1662.167522][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1662.175909][ T8063] bridge0: port 2(bridge_slave_1) entered blocking state [ 1662.182967][ T8063] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1662.192187][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1662.201563][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1662.221291][ T9783] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1662.232160][ T9783] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1662.244994][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1662.254679][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1662.264620][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1662.274699][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1662.284098][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1662.292929][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1662.301982][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1662.310849][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1662.336580][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1662.344831][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1662.367398][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1662.375019][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1662.394623][ T9783] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1662.472924][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1662.482361][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1662.498995][ T9783] device veth0_vlan entered promiscuous mode [ 1662.510740][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1662.519790][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1662.535261][ T9783] device veth1_vlan entered promiscuous mode [ 1662.543746][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1662.555072][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1662.563506][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1662.586621][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1662.595313][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1662.608374][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1662.621097][ T9783] device veth0_macvtap entered promiscuous mode [ 1662.633882][ T9783] device veth1_macvtap entered promiscuous mode [ 1662.652336][ T9783] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1662.665745][ T9783] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1662.677885][ T9783] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1662.690923][ T9783] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1662.702245][ T9783] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1662.716061][ T9783] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1662.729604][ T9783] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1662.740731][ T9783] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1662.754737][ T9783] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1662.765832][ T9783] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1662.781252][ T9783] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1662.790098][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1662.802098][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1662.811015][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1662.823965][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1662.834772][ T9783] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1662.846102][ T9783] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1662.856686][ T9783] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1662.867634][ T9783] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1662.877983][ T9783] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1662.889349][ T9783] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1662.899569][ T9783] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1662.910603][ T9783] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1662.920982][ T9783] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1662.931822][ T9783] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1662.943435][ T9783] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1662.953199][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1662.962642][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1663.099210][ T9792] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:46:16 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r3, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r4, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:16 executing program 4: alarm(0x5e2ce16b) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {r0, 0x0, 0x1000000, 0x1000000000000}]}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000080)={0x7, 0xe09, 0x400}) 20:46:16 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x4c, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x1}, 0x1c) 20:46:16 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfbffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:16 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x1000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1663.282994][ T9801] BPF:[1] Invalid name_offset:4294967293 20:46:17 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r3, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r3, @ANYBLOB="00000000000000f0ffffffff0000000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000000000000001000000"]) 20:46:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x1}, 0x1c) 20:46:17 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x60, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:17 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xedc000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:17 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f00000000c0)={0x3, 0xe, 0x37, "f478fed0ce48f4ece17e4046865837f8a30ba718982b0ced4eac16b48909af43882d32abacae02bc62ec06ace743e74e14271b3fcf956934dbde39ef", 0xd, "bdd7f23c20182b31df51218952c0e55fc30d16438f461f00bc5f529cacb2af42be4cdb428510d26e2c53484e42134d5544f681553742f1366733cff9", 0x40}) r1 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRESOCT=r1, @ANYBLOB="00000000000000e73cc57d350b25b43513adfd63"]) 20:46:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x1}, 0x1c) [ 1663.598769][ T9818] BPF:[1] Invalid name_offset:4294967293 20:46:17 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r3, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r4, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:17 executing program 4: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x40) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x111040, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{r2, 0x0, 0x0, 0x8000}, {}]}) 20:46:17 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x68, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:17 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfcfdffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1663.789015][T30874] tipc: TX() has been purged, node left! 20:46:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x1}, 0x1c) 20:46:17 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r3, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r4, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1663.937737][ T9833] BPF:[1] Invalid name_offset:4294967293 20:46:17 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:17 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000040)={0x70d78ad1, 0x6, 0x4, 0x8, 0xc72, {0x77359400}, {0x5, 0x8, 0x8, 0x23, 0xff, 0xb8, "7300bc37"}, 0x6c, 0x4, @fd, 0x4, 0x0, r0}) ioctl$SNDRV_PCM_IOCTL_STATUS64(r2, 0x80984120, &(0x7f00000000c0)) 20:46:17 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x6c, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:18 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, 0x1}, 0x1c) [ 1664.399877][ T9849] BPF:[1] Invalid name_offset:4294967293 20:46:18 executing program 4: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x2, [{}, {}]}) 20:46:18 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x74, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) 20:46:18 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:18 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfdffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1664.829626][ T9864] BPF:[1] Invalid name_offset:4294967293 20:46:18 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) r2 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890c, &(0x7f0000000000)) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f00000000c0)=ANY=[@ANYBLOB="087000000000000000005082d13c7d1605f4634e9b138d1eedacbd74086fe7667deec757e8dc62c37925250aca733ce6de430b2c788b22cb95952e15f1b4", @ANYRES32, @ANYBLOB="00000000000070f915b2787e71f88c17000000000000000000000000080000", @ANYRES32, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRES64, @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRES16=r0, @ANYRES16=r1, @ANYRESDEC=r0, @ANYBLOB="ece88b9a834e8dae36512ed8fd95a222b2488486050082de457d6d2a99e2b82d9760cff100f2f0e28e7eef202340ea486a382e6b05f63b8657b30864924df25dc8f298074ba71f30bbd1a9a6e685ecb0b07211c789b5fba1d364c6ec006ab959fc", @ANYPTR, @ANYPTR, @ANYPTR64, @ANYBLOB="9de7a1f2d7a24021b7905c6cc3684b0a203c9f25cc0366cb02e09c00ee33419e55837831c1ad33a8b8cbf039a8fa5a0d2184e2e356ff5f6df928a03b9413b7a75358e535f0a8e87bb2c1532655eb483423c0f945ee9e2455c0878b12be3006d0c2e6efa5fc72efc9d6298181f151a9cac305e4220bcb5aeceeb57963fa856dc30c9736ab272da32821829f8916723e31356087e648957a951d0627a8df3aa46335b175be794c7269c08c0386f65814cec1721627d99c42d238"], @ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES64=0x0], @ANYRES16=r2, @ANYRESOCT, @ANYRES32=0x0]]) [ 1665.629603][T30874] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1665.640521][T30874] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1665.649093][T30874] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1665.660279][T30874] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1665.668731][T30874] device bridge_slave_1 left promiscuous mode [ 1665.675046][T30874] bridge0: port 2(bridge_slave_1) entered disabled state [ 1665.736979][T30874] device bridge_slave_0 left promiscuous mode [ 1665.743239][T30874] bridge0: port 1(bridge_slave_0) entered disabled state [ 1665.800882][T30874] device veth1_macvtap left promiscuous mode [ 1665.809859][T30874] device veth0_macvtap left promiscuous mode [ 1665.815951][T30874] device veth1_vlan left promiscuous mode [ 1665.822205][T30874] device veth0_vlan left promiscuous mode [ 1667.756791][T30874] device hsr_slave_0 left promiscuous mode [ 1667.796380][T30874] device hsr_slave_1 left promiscuous mode [ 1667.854150][T30874] team0 (unregistering): Port device team_slave_1 removed [ 1667.865436][T30874] team0 (unregistering): Port device team_slave_0 removed [ 1667.880412][T30874] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1667.934337][T30874] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1668.020030][T30874] bond0 (unregistering): Released all slaves [ 1668.133830][ T9881] IPVS: ftp: loaded support on port[0] = 21 [ 1668.291463][ T9881] chnl_net:caif_netlink_parms(): no params data found [ 1668.381156][ T9881] bridge0: port 1(bridge_slave_0) entered blocking state [ 1668.399654][ T9881] bridge0: port 1(bridge_slave_0) entered disabled state [ 1668.420229][ T9881] device bridge_slave_0 entered promiscuous mode [ 1668.440614][ T9881] bridge0: port 2(bridge_slave_1) entered blocking state [ 1668.459657][ T9881] bridge0: port 2(bridge_slave_1) entered disabled state [ 1668.487166][ T9881] device bridge_slave_1 entered promiscuous mode [ 1668.506193][ T9881] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1668.538223][ T9881] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1668.577611][ T9881] team0: Port device team_slave_0 added [ 1668.584601][ T9881] team0: Port device team_slave_1 added [ 1668.617470][ T9881] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1668.624478][ T9881] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1668.651121][ T9881] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1668.663058][ T9881] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1668.670450][ T9881] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1668.696933][ T9881] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1668.779586][ T9881] device hsr_slave_0 entered promiscuous mode [ 1668.819722][ T9881] device hsr_slave_1 entered promiscuous mode [ 1668.992269][ T9881] bridge0: port 2(bridge_slave_1) entered blocking state [ 1668.999527][ T9881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1669.006984][ T9881] bridge0: port 1(bridge_slave_0) entered blocking state [ 1669.014024][ T9881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1669.109921][ T9881] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1669.133218][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1669.142182][T30609] bridge0: port 1(bridge_slave_0) entered disabled state [ 1669.159443][T30609] bridge0: port 2(bridge_slave_1) entered disabled state [ 1669.174157][ T9881] 8021q: adding VLAN 0 to HW filter on device team0 [ 1669.185036][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1669.194326][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1669.203293][T30609] bridge0: port 1(bridge_slave_0) entered blocking state [ 1669.210361][T30609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1669.227995][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1669.237243][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1669.245698][T30609] bridge0: port 2(bridge_slave_1) entered blocking state [ 1669.252819][T30609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1669.261528][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1669.270841][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1669.280310][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1669.289317][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1669.298345][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1669.314935][ T9881] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1669.325902][ T9881] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1669.347489][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1669.356199][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1669.377640][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1669.386196][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1669.397714][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1669.406146][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1669.426043][ T9881] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1669.434393][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1669.442572][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1669.450728][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1669.523730][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1669.533778][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1669.548823][ T9881] device veth0_vlan entered promiscuous mode [ 1669.561337][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1669.570026][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1669.583888][ T9881] device veth1_vlan entered promiscuous mode [ 1669.591546][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1669.603078][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1669.611107][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1669.632618][ T9881] device veth0_macvtap entered promiscuous mode [ 1669.643898][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1669.652342][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1669.663575][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1669.674262][ T9881] device veth1_macvtap entered promiscuous mode [ 1669.685292][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1669.693671][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1669.710437][ T9881] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1669.726600][ T9881] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1669.739980][ T9881] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1669.750714][ T9881] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1669.763618][ T9881] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1669.774292][ T9881] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1669.788238][ T9881] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1669.801018][ T9881] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1669.812131][ T9881] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1669.824966][ T9881] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1669.839591][ T9881] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1669.849768][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1669.861327][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1669.873018][ T9881] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1669.885761][ T9881] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1669.899444][ T9881] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1669.910307][ T9881] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1669.923803][ T9881] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1669.934511][ T9881] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1669.947550][ T9881] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1669.960988][ T9881] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1669.972674][ T9881] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1669.984958][ T9881] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1669.999611][ T9881] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1670.008847][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1670.020048][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1670.174060][ T9891] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:46:23 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:23 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x7a, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:23 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x1}, 0x1c) 20:46:23 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{0xffffffffffffffff, 0x0, 0x4000}, {}]}) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x5, 0x101002) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000080)) fstatfs(r1, &(0x7f00000000c0)=""/196) 20:46:23 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xff00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1670.320469][ T9898] BPF:[1] Invalid name_offset:4294967293 20:46:24 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x40085112, &(0x7f0000000200)={{0xffffff92}, {0xc0}}) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="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", @ANYRES32, @ANYBLOB='\x00'/20]) 20:46:24 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0xf8, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x1}, 0x1c) 20:46:24 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1670.585580][ T9913] BPF:[1] Invalid name_offset:4294967293 20:46:24 executing program 4: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000140)=0xffffffffffffff96) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000040)) prctl$PR_MCE_KILL_GET(0x22) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{0xffffffffffffffff, 0x0, 0x800000000ffef800}, {}]}) 20:46:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x1}, 0x1c) 20:46:24 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:24 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0x2, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:24 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x40000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:24 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x10) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="f96c8ca082295cf7caad42e0d50000000000", @ANYRES32, @ANYBLOB='\x00'/20]) 20:46:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x1}, 0x1c) [ 1670.807391][ T9927] BPF:[1] Invalid name_offset:4294967293 20:46:24 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:24 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0x3, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1670.920078][T10636] tipc: TX() has been purged, node left! 20:46:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x1}, 0x1c) 20:46:24 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x20400, 0x0) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000100)={0x8, "4381296a33a84459a76118ecaa12f522f08569f001e4641fd5d9e8d5bce23a6c", 0x2, 0x3, 0x157, 0x1, 0x2}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x100, 0x0) setsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f00000001c0), 0x4) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="060000000000000000e50000000500000073ac0976c6974243c30fdee10283397dbbf25cbd30d58da866c70b88fb7012ce6d4bd40982a716b64c154929bc33bbb6738b2ec24a422d69c6aa51a3a3"]) 20:46:24 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xffefffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1671.165174][ T9940] BPF:[1] Invalid name_offset:4294967293 20:46:25 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0x4, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x1}, 0x1c) 20:46:25 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:25 executing program 4: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{0xffffffffffffffff, 0x0, 0x2000}, {}]}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) [ 1671.478602][ T9952] BPF:[1] Invalid name_offset:4294967293 20:46:25 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0x5, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1671.675623][ T9965] BPF:[1] Invalid name_offset:4294967293 20:46:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x1}, 0x1c) 20:46:25 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1672.549817][T10636] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1672.566345][T10636] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1672.590881][T10636] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1672.619861][T10636] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1672.628752][T10636] device bridge_slave_1 left promiscuous mode [ 1672.635050][T10636] bridge0: port 2(bridge_slave_1) entered disabled state [ 1672.707133][T10636] device bridge_slave_0 left promiscuous mode [ 1672.713544][T10636] bridge0: port 1(bridge_slave_0) entered disabled state [ 1672.774361][T10636] device veth1_macvtap left promiscuous mode [ 1672.780461][T10636] device veth0_macvtap left promiscuous mode [ 1672.790293][T10636] device veth1_vlan left promiscuous mode [ 1672.796065][T10636] device veth0_vlan left promiscuous mode [ 1674.649487][T10636] device hsr_slave_0 left promiscuous mode [ 1674.686891][T10636] device hsr_slave_1 left promiscuous mode [ 1674.744566][T10636] team0 (unregistering): Port device team_slave_1 removed [ 1674.761727][T10636] team0 (unregistering): Port device team_slave_0 removed [ 1674.773233][T10636] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1674.830229][T10636] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1674.923095][T10636] bond0 (unregistering): Released all slaves [ 1675.035527][ T9978] IPVS: ftp: loaded support on port[0] = 21 [ 1675.180870][ T9978] chnl_net:caif_netlink_parms(): no params data found [ 1675.249489][ T9978] bridge0: port 1(bridge_slave_0) entered blocking state [ 1675.266300][ T9978] bridge0: port 1(bridge_slave_0) entered disabled state [ 1675.274104][ T9978] device bridge_slave_0 entered promiscuous mode [ 1675.297523][ T9978] bridge0: port 2(bridge_slave_1) entered blocking state [ 1675.304612][ T9978] bridge0: port 2(bridge_slave_1) entered disabled state [ 1675.327272][ T9978] device bridge_slave_1 entered promiscuous mode [ 1675.357807][ T9978] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1675.377967][ T9978] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1675.419106][ T9978] team0: Port device team_slave_0 added [ 1675.426220][ T9978] team0: Port device team_slave_1 added [ 1675.463496][ T9978] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1675.486286][ T9978] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1675.546349][ T9978] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1675.567405][ T9978] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1675.574368][ T9978] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1675.636318][ T9978] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1675.718663][ T9978] device hsr_slave_0 entered promiscuous mode [ 1675.756540][ T9978] device hsr_slave_1 entered promiscuous mode [ 1675.923071][ T9978] bridge0: port 2(bridge_slave_1) entered blocking state [ 1675.930188][ T9978] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1675.937570][ T9978] bridge0: port 1(bridge_slave_0) entered blocking state [ 1675.944621][ T9978] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1676.015128][ T9978] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1676.028963][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1676.038255][ T8683] bridge0: port 1(bridge_slave_0) entered disabled state [ 1676.046085][ T8683] bridge0: port 2(bridge_slave_1) entered disabled state [ 1676.061086][ T9978] 8021q: adding VLAN 0 to HW filter on device team0 [ 1676.070988][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1676.080323][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1676.088954][T23966] bridge0: port 1(bridge_slave_0) entered blocking state [ 1676.095982][T23966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1676.116856][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1676.125405][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1676.134392][T23966] bridge0: port 2(bridge_slave_1) entered blocking state [ 1676.141479][T23966] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1676.150125][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1676.159206][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1676.168558][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1676.177534][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1676.186594][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1676.195458][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1676.209404][ T9978] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1676.220142][ T9978] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1676.232565][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1676.241425][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1676.250178][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1676.259845][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1676.268581][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1676.290056][ T9978] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1676.299089][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1676.307501][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1676.314934][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1676.379840][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1676.389099][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1676.401846][ T9978] device veth0_vlan entered promiscuous mode [ 1676.409308][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1676.421373][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1676.433933][ T9978] device veth1_vlan entered promiscuous mode [ 1676.445020][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1676.453138][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1676.464322][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1676.485976][ T9978] device veth0_macvtap entered promiscuous mode [ 1676.494341][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1676.503436][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1676.512556][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1676.523361][ T9978] device veth1_macvtap entered promiscuous mode [ 1676.531437][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1676.540021][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1676.553667][ T9978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1676.564681][ T9978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1676.575032][ T9978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1676.585747][ T9978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1676.596670][ T9978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1676.607465][ T9978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1676.617640][ T9978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1676.628379][ T9978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1676.638473][ T9978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1676.649304][ T9978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1676.661141][ T9978] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1676.670560][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1676.679932][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1676.691029][ T9978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1676.703340][ T9978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1676.713767][ T9978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1676.724745][ T9978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1676.734948][ T9978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1676.745763][ T9978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1676.756091][ T9978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1676.766892][ T9978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1676.777059][ T9978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1676.788035][ T9978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1676.799792][ T9978] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1676.809062][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1676.818637][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1676.962552][ T9987] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:46:30 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:30 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0x6, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:30 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x148000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x1}, 0x1c) 20:46:30 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f00000001c0)={0x0, 0x4, 0x8aaf, [], &(0x7f0000000180)=0x4}) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="1e000000020c38e6", @ANYRES32, @ANYBLOB="0000000000000000000080000000000000000000", @ANYRES32, @ANYBLOB='\x00'/20]) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) r3 = getpid() tkill(r3, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f00000003c0)={{0xa, 0x3, 0x8, 0x7, 'syz1\x00', 0x1}, 0x6, 0x100, 0x6, r3, 0x2, 0x4, 'syz0\x00', &(0x7f0000000200)=['\x00', 'syz0\x00'], 0x6, [], [0x1, 0x4, 0x3, 0xfff]}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000080)={r6}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000040)={r6, @in={{0x2, 0x4e24, @loopback}}, [0x3f, 0x5, 0x1000, 0x2, 0x5, 0x100000000, 0x8, 0x0, 0xb7, 0x40, 0x3, 0xc2e6, 0x8, 0x8, 0x3]}, &(0x7f0000000140)=0x100) 20:46:30 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xffffffffffff0700, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1677.096009][ T9992] BPF:[1] Invalid name_offset:4294967293 20:46:30 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0x7, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:31 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x3, [{0xffffffffffffffff, 0x0, 0x0, 0x4000}, {}, {r1, 0x0, 0xb93bb401dfc02f98, 0x4000}]}) r2 = getpid() tkill(r2, 0x9) sched_getattr(r2, &(0x7f00000000c0)={0x38}, 0x38, 0x0) 20:46:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x1}, 0x1c) 20:46:31 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xffffffffffffff7f, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1677.390870][T10006] BPF:[1] Invalid name_offset:4294967293 20:46:31 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:31 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/bsg\x00', 0x8202, 0x0) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x80, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f00000002c0)={0x9a0000, 0x3a8, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={0x9b0971, 0x7fff, [], @p_u32=&(0x7f0000000240)=0x4}}) pause() ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000100)=0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000140)={0x0, 0x3, [{0xffffffffffffffff, 0x0, 0x10000}, {0xffffffffffffffff, 0x0, 0x1000000, 0xfffeffff0ffff000}, {r3, 0x0, 0x1000000000000, 0x100000000}]}) 20:46:31 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0x8, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:31 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:31 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x1}, 0x1c) [ 1677.683161][T10020] BPF:[1] Invalid name_offset:4294967293 [ 1677.779280][T30874] tipc: TX() has been purged, node left! 20:46:31 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0x9, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x1}, 0x1c) 20:46:31 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1677.945296][T10030] BPF:[1] Invalid name_offset:4294967293 20:46:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x1}, 0x1c) 20:46:31 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xa, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:31 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1678.272242][T10043] BPF:[1] Invalid name_offset:4294967293 20:46:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x1}, 0x1c) 20:46:32 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xb, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:32 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {r1}]}) [ 1678.573143][T10056] BPF:[1] Invalid name_offset:4294967293 [ 1679.269863][T30874] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1679.286363][T30874] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1679.307640][T30874] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1679.315133][T30874] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1679.337161][T30874] device bridge_slave_1 left promiscuous mode [ 1679.343552][T30874] bridge0: port 2(bridge_slave_1) entered disabled state [ 1679.387066][T30874] device bridge_slave_0 left promiscuous mode [ 1679.393265][T30874] bridge0: port 1(bridge_slave_0) entered disabled state [ 1679.464552][T30874] device veth1_macvtap left promiscuous mode [ 1679.471248][T30874] device veth0_macvtap left promiscuous mode [ 1679.480895][T30874] device veth1_vlan left promiscuous mode [ 1679.486725][T30874] device veth0_vlan left promiscuous mode [ 1681.166685][T30874] device hsr_slave_0 left promiscuous mode [ 1681.206411][T30874] device hsr_slave_1 left promiscuous mode [ 1681.264927][T30874] team0 (unregistering): Port device team_slave_1 removed [ 1681.277145][T30874] team0 (unregistering): Port device team_slave_0 removed [ 1681.292549][T30874] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1681.353622][T30874] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1681.439040][T30874] bond0 (unregistering): Released all slaves [ 1681.534224][T10063] IPVS: ftp: loaded support on port[0] = 21 [ 1681.692938][T10063] chnl_net:caif_netlink_parms(): no params data found [ 1681.776663][T10063] bridge0: port 1(bridge_slave_0) entered blocking state [ 1681.784013][T10063] bridge0: port 1(bridge_slave_0) entered disabled state [ 1681.807271][T10063] device bridge_slave_0 entered promiscuous mode [ 1681.815052][T10063] bridge0: port 2(bridge_slave_1) entered blocking state [ 1681.826458][T10063] bridge0: port 2(bridge_slave_1) entered disabled state [ 1681.834502][T10063] device bridge_slave_1 entered promiscuous mode [ 1681.858173][T10063] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1681.873458][T10063] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1681.897609][T10063] team0: Port device team_slave_0 added [ 1681.904574][T10063] team0: Port device team_slave_1 added [ 1681.925535][T10063] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1681.936189][T10063] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1681.969924][T10063] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1681.982213][T10063] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1681.992688][T10063] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1682.027633][T10063] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1682.132958][T10063] device hsr_slave_0 entered promiscuous mode [ 1682.189511][T10063] device hsr_slave_1 entered promiscuous mode [ 1682.350199][T10063] bridge0: port 2(bridge_slave_1) entered blocking state [ 1682.357365][T10063] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1682.364669][T10063] bridge0: port 1(bridge_slave_0) entered blocking state [ 1682.371755][T10063] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1682.456453][T10063] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1682.472953][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1682.481559][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1682.493005][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1682.513185][T10063] 8021q: adding VLAN 0 to HW filter on device team0 [ 1682.541218][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1682.553749][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1682.562531][T30608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1682.569584][T30608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1682.590811][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1682.603030][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1682.611968][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1682.619027][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1682.631108][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1682.640342][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1682.661555][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1682.673377][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1682.682654][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1682.695392][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1682.704481][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1682.716334][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1682.724854][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1682.736608][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1682.746616][T10063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1682.762719][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1682.780131][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1682.788794][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1682.822457][T10063] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1682.889831][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1682.899103][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1682.916736][T10063] device veth0_vlan entered promiscuous mode [ 1682.923476][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1682.935920][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1682.948740][T10063] device veth1_vlan entered promiscuous mode [ 1682.956149][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1682.967997][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1682.976138][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1683.004396][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1683.013651][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1683.025750][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1683.037117][T10063] device veth0_macvtap entered promiscuous mode [ 1683.046152][T10063] device veth1_macvtap entered promiscuous mode [ 1683.064969][T10063] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1683.080544][T10063] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1683.092290][T10063] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1683.106443][T10063] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1683.120097][T10063] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1683.131034][T10063] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1683.144970][T10063] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1683.155758][T10063] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1683.169316][T10063] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1683.180118][T10063] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1683.194604][T10063] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1683.203783][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1683.216427][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1683.224488][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1683.237682][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1683.251342][T10063] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1683.262403][T10063] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1683.272883][T10063] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1683.283605][T10063] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1683.293704][T10063] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1683.304422][T10063] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1683.314634][T10063] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1683.325451][T10063] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1683.335522][T10063] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1683.346267][T10063] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1683.357794][T10063] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1683.366542][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1683.375185][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1683.489534][T10072] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:46:37 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:37 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:37 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xc, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:37 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000040)={0xe, 0x7, 0x4, 0x400, 0xe3a4, {}, {0x1, 0xc, 0x0, 0x3, 0x7f, 0x0, "426c863f"}, 0x401, 0x1, @userptr=0x4, 0x2, 0x0, r0}) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000100)={0x8, &(0x7f00000000c0)=[{0xff, 0x80, 0x7, 0x2}, {0x1f, 0x5, 0x2, 0x401}, {0x9, 0x8, 0x20, 0x3}, {0xc622, 0x0, 0x93, 0x2}, {0x1000, 0x4, 0x90, 0x8}, {0x1000, 0xfb, 0xff, 0x2}, {0x200, 0x5, 0x43, 0x51ca}, {0x401, 0x1, 0x20, 0x5}]}) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) 20:46:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x1}, 0x1c) 20:46:37 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:37 executing program 4: ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000100)={0x0, 0x1, 0x4, 0x0, 0x401, {}, {0x7, 0x0, 0x0, 0x3, 0x40, 0x6, 'UA`J'}, 0x0, 0x2, @fd, 0x201, 0x0, 0xffffffffffffffff}) prctl$PR_SVE_GET_VL(0x33, 0xd2a3) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f00000000c0)=0xffffff61) r1 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) [ 1683.630035][T10080] BPF:[1] Invalid name_offset:4294967293 20:46:37 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xd, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x1}, 0x1c) [ 1683.798469][T10093] BPF:[1] Invalid name_offset:4294967293 20:46:37 executing program 4: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) fremovexattr(r0, &(0x7f0000000140)=@random={'trusted.', 'posix_acl_accesssecurity!\\vmnet1self+\x00'}) r1 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) syz_extract_tcp_res(&(0x7f0000000040), 0x0, 0xa8) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000003007c7cd05163670000"]) 20:46:37 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xe, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:37 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:37 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x1}, 0x1c) 20:46:37 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1684.008941][T10104] BPF:[1] Invalid name_offset:4294967293 20:46:37 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0x10, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, 0x1}, 0x1c) 20:46:37 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:37 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) r2 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890c, &(0x7f0000000000)) r3 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890c, &(0x7f0000000000)) r4 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x890c, &(0x7f0000000000)) r5 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x890c, &(0x7f0000000000)) r6 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x890c, &(0x7f0000000000)) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000240)=ANY=[@ANYBLOB="003ec26f50020f8964004d8aeb5e4707e96c50ae418a7fadb64dae10141ace7462aa3cf58fabcadbdbb68ebcbafcdca23010c0090f1e", @ANYRES32, @ANYPTR64=&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES64=r1, @ANYRES64=0x0], @ANYPTR=&(0x7f0000000300)=ANY=[@ANYPTR64, @ANYRESHEX], @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYPTR, @ANYRESHEX, @ANYRESHEX, @ANYRESHEX, @ANYRES32=r2, @ANYRESOCT=r3, @ANYRES32=r0, @ANYBLOB="9c38e7d90c3ae736cfb36857bebc856397a17dcec5fd3a021ab0c7918a909917c0d0262cce6af2840bd4fdcabc2db85d322c6f49a8bcea0f456c436cd354abc3bde00ad055c27516c9802b20455f22ab9704c70ae7f1870d08c486b81ffbda025e20b09a7b7f6b7599faaa29daa1d43840056ad98b1df8de9fc575b5beb075c919fc902b9e545a422d04221667193aa67fba8d44ba95ff16f3684c2850c3c6f8d10c2bd91666c8adc17634ee35b7772c7f6611c16ff7e2716265cd96718101828103e33573c1a97c782752093c119c263f5059"], @ANYRES16=r4, @ANYRES32=r5, @ANYPTR=&(0x7f0000000500)=ANY=[@ANYRESOCT=0x0, @ANYRESDEC, @ANYRESHEX, @ANYRESOCT=r6]], @ANYRES32, @ANYBLOB='\x00'/20]) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x2, 0x400200) ioctl$VIDIOC_CROPCAP(r8, 0xc02c563a, &(0x7f0000000180)={0x4, {0xc5a, 0x6, 0xe649, 0x9}, {0x3, 0x6, 0x8, 0x1}, {0x2, 0x9}}) mkdirat$cgroup(r7, &(0x7f0000000380)='syz0\x00', 0x1ff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r9, &(0x7f0000000380)='syz0\x00', 0x1ff) sendto$isdn(r9, &(0x7f00000001c0)={0xff, 0x0, "820fcc7509fa4d78149d6abb6747998ac08a42e5548b7ace24f914a710997449d6af2e0bb89de709c32333aeb043d049e7d33898dc07bf"}, 0x3f, 0x4091, &(0x7f0000000200)={0x22, 0x4, 0x0, 0x4, 0x1}, 0x6) ioctl$VIDIOC_SUBDEV_S_EDID(r7, 0xc0285629, &(0x7f0000000080)={0x0, 0x8, 0x2, [], &(0x7f0000000040)=0x40}) [ 1684.166361][ T8079] tipc: TX() has been purged, node left! [ 1684.276817][T10120] BPF:[1] Invalid name_offset:4294967293 20:46:38 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) 20:46:38 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0x11, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:38 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1684.603135][T10138] BPF:[1] Invalid name_offset:4294967293 20:46:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x1}, 0x1c) 20:46:38 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0x12, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:38 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000002200000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/20]) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000c, 0x3, 0x4000000) 20:46:38 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1684.906031][T10149] BPF:[1] Invalid name_offset:4294967293 20:46:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x1}, 0x1c) 20:46:38 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0x3e, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1685.200059][T10163] BPF:[1] Invalid name_offset:4294967293 [ 1685.759545][ T8079] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1685.770504][ T8079] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1685.778822][ T8079] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1685.786219][ T8079] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1685.794249][ T8079] device bridge_slave_1 left promiscuous mode [ 1685.800492][ T8079] bridge0: port 2(bridge_slave_1) entered disabled state [ 1685.859828][ T8079] device bridge_slave_0 left promiscuous mode [ 1685.866053][ T8079] bridge0: port 1(bridge_slave_0) entered disabled state [ 1685.923769][ T8079] device veth1_macvtap left promiscuous mode [ 1685.929861][ T8079] device veth0_macvtap left promiscuous mode [ 1685.935947][ T8079] device veth1_vlan left promiscuous mode [ 1685.944686][ T8079] device veth0_vlan left promiscuous mode [ 1687.686740][ T8079] device hsr_slave_0 left promiscuous mode [ 1687.726418][ T8079] device hsr_slave_1 left promiscuous mode [ 1687.783533][ T8079] team0 (unregistering): Port device team_slave_1 removed [ 1687.794798][ T8079] team0 (unregistering): Port device team_slave_0 removed [ 1687.808410][ T8079] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1687.863692][ T8079] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1687.950015][ T8079] bond0 (unregistering): Released all slaves [ 1688.064095][T10169] IPVS: ftp: loaded support on port[0] = 21 [ 1688.151540][T10169] chnl_net:caif_netlink_parms(): no params data found [ 1688.272312][T10169] bridge0: port 1(bridge_slave_0) entered blocking state [ 1688.296275][T10169] bridge0: port 1(bridge_slave_0) entered disabled state [ 1688.304269][T10169] device bridge_slave_0 entered promiscuous mode [ 1688.327813][T10169] bridge0: port 2(bridge_slave_1) entered blocking state [ 1688.334900][T10169] bridge0: port 2(bridge_slave_1) entered disabled state [ 1688.357351][T10169] device bridge_slave_1 entered promiscuous mode [ 1688.397991][T10169] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1688.428267][T10169] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1688.452695][T10169] team0: Port device team_slave_0 added [ 1688.462641][T10169] team0: Port device team_slave_1 added [ 1688.482347][T10169] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1688.489454][T10169] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1688.518900][T10169] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1688.531285][T10169] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1688.541073][T10169] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1688.567533][T10169] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1688.638977][T10169] device hsr_slave_0 entered promiscuous mode [ 1688.676717][T10169] device hsr_slave_1 entered promiscuous mode [ 1688.833757][T10169] bridge0: port 2(bridge_slave_1) entered blocking state [ 1688.840925][T10169] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1688.848257][T10169] bridge0: port 1(bridge_slave_0) entered blocking state [ 1688.855290][T10169] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1688.904082][T10169] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1688.933843][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1688.943195][ T8083] bridge0: port 1(bridge_slave_0) entered disabled state [ 1688.967429][ T8083] bridge0: port 2(bridge_slave_1) entered disabled state [ 1688.990513][T10169] 8021q: adding VLAN 0 to HW filter on device team0 [ 1689.011770][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1689.026883][T23966] bridge0: port 1(bridge_slave_0) entered blocking state [ 1689.034060][T23966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1689.059042][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1689.068292][ T8083] bridge0: port 2(bridge_slave_1) entered blocking state [ 1689.075401][ T8083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1689.085359][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1689.095137][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1689.108839][T10169] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1689.120100][T10169] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1689.132550][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1689.141572][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1689.150266][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1689.159586][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1689.168118][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1689.185141][T10169] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1689.193610][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1689.201998][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1689.209800][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1689.303095][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1689.314576][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1689.330637][T10169] device veth0_vlan entered promiscuous mode [ 1689.341237][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1689.350392][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1689.366881][T10169] device veth1_vlan entered promiscuous mode [ 1689.374178][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1689.386205][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1689.394748][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1689.420093][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1689.429041][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1689.441687][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1689.452167][T10169] device veth0_macvtap entered promiscuous mode [ 1689.466336][T10169] device veth1_macvtap entered promiscuous mode [ 1689.484196][T10169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1689.495590][T10169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1689.509082][T10169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1689.519965][T10169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1689.533789][T10169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1689.544414][T10169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1689.558571][T10169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1689.570509][T10169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1689.582426][T10169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1689.594816][T10169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1689.610555][T10169] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1689.619995][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1689.630872][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1689.640125][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1689.651728][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1689.663452][T10169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1689.677999][T10169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1689.690737][T10169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1689.703366][T10169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1689.715204][T10169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1689.730077][T10169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1689.740219][T10169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1689.754276][T10169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1689.764512][T10169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1689.778405][T10169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1689.791127][T10169] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1689.802443][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1689.812890][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1689.948951][T10179] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:46:43 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:43 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:43 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:43 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="a502ffff01000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/20]) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)={0xffffffffffffffff}) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r2, 0x28, 0x6, &(0x7f00000004c0)={r3, r4/1000+10000}, 0x10) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDSKBMETA(r5, 0x4b63, &(0x7f0000000280)=0x4) r6 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x890c, &(0x7f0000000000)) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r8, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@newlink={0x68, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x21025}, [@IFLA_LINKINFO={0x34, 0x12, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x24, 0x2, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x9, 0xa}}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x14]}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x68}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', r9}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000240)={'batadv_slave_1\x00', r10}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r11, &(0x7f0000000380)='syz0\x00', 0x1ff) r12 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r13, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$UI_BEGIN_FF_UPLOAD(r13, 0xc06855c8, &(0x7f0000000040)={0x2, 0x9, {0x55, 0x404, 0x0, {0x1f}, {0x0, 0x7}, @period={0x59, 0x81, 0xfff, 0x6, 0x4002, {0x3, 0xffff, 0x9, 0x1}, 0x6, &(0x7f0000000100)=[0x6, 0x0, 0x1ff, 0x3, 0x1000, 0xb4b]}}, {0x53, 0x4, 0x42b, {0x400, 0x8}, {0x8, 0x2b6}, @ramp={0xc04, 0x343, {0x9, 0x400, 0xff, 0x1}}}}) openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x8000, 0x0) getsockname$netrom(r7, &(0x7f00000005c0)={{0x3, @default}, [@bcast, @default, @rose, @null, @netrom, @remote, @bcast, @null]}, &(0x7f0000000640)=0xa1) 20:46:43 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x1}, 0x1c) [ 1690.057568][T10182] BPF:[1] Invalid name_offset:4294967293 20:46:43 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x4, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1690.109354][T10189] netlink: 'syz-executor.4': attribute type 5 has an invalid length. 20:46:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x1}, 0x1c) 20:46:43 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x8, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1690.261092][T10198] BPF:[1] Invalid name_offset:4294967293 20:46:44 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x5, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x1}, 0x1c) 20:46:44 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1690.481194][T10210] BPF:[1] Invalid name_offset:4294967293 20:46:44 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:44 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x6, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x1}, 0x1c) [ 1690.649883][T10220] BPF:[1] Invalid name_offset:4294967293 [ 1690.676846][T10196] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 1690.716453][ T8086] tipc: TX() has been purged, node left! 20:46:44 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="000000000000001000010000a6172e7500000000d60abf541735d2986e48e4185b0f905f496cd98883"]) 20:46:44 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:44 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x7, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:44 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x9, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x1}, 0x1c) 20:46:44 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1691.030558][T10229] BPF:[1] Invalid name_offset:4294967293 20:46:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x1}, 0x1c) 20:46:44 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:44 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3e, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:44 executing program 4: statfs(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/146) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000040)={0x6, 0x0, 0x0, 'queue1\x00', 0x2}) 20:46:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x1}, 0x1c) [ 1691.352465][T10253] BPF:[1] Invalid name_offset:4294967293 20:46:45 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:45 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xa00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1691.595885][T10264] BPF:[1] Invalid name_offset:4294967293 [ 1692.333144][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1692.346387][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1692.384847][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1692.398831][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1692.407372][ T8086] device bridge_slave_1 left promiscuous mode [ 1692.413708][ T8086] bridge0: port 2(bridge_slave_1) entered disabled state [ 1692.470480][ T8086] device bridge_slave_0 left promiscuous mode [ 1692.476870][ T8086] bridge0: port 1(bridge_slave_0) entered disabled state [ 1692.541202][ T8086] device veth1_macvtap left promiscuous mode [ 1692.550022][ T8086] device veth0_macvtap left promiscuous mode [ 1692.556037][ T8086] device veth1_vlan left promiscuous mode [ 1692.562420][ T8086] device veth0_vlan left promiscuous mode [ 1694.266838][ T8086] device hsr_slave_0 left promiscuous mode [ 1694.309567][ T8086] device hsr_slave_1 left promiscuous mode [ 1694.365887][ T8086] team0 (unregistering): Port device team_slave_1 removed [ 1694.380568][ T8086] team0 (unregistering): Port device team_slave_0 removed [ 1694.392355][ T8086] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1694.451119][ T8086] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1694.543719][ T8086] bond0 (unregistering): Released all slaves [ 1694.644960][T10272] IPVS: ftp: loaded support on port[0] = 21 [ 1694.739793][T10272] chnl_net:caif_netlink_parms(): no params data found [ 1694.839587][T10272] bridge0: port 1(bridge_slave_0) entered blocking state [ 1694.856333][T10272] bridge0: port 1(bridge_slave_0) entered disabled state [ 1694.864383][T10272] device bridge_slave_0 entered promiscuous mode [ 1694.887641][T10272] bridge0: port 2(bridge_slave_1) entered blocking state [ 1694.894715][T10272] bridge0: port 2(bridge_slave_1) entered disabled state [ 1694.907202][T10272] device bridge_slave_1 entered promiscuous mode [ 1694.948388][T10272] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1694.971210][T10272] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1695.029990][T10272] team0: Port device team_slave_0 added [ 1695.037467][T10272] team0: Port device team_slave_1 added [ 1695.065545][T10272] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1695.086323][T10272] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1695.136265][T10272] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1695.167462][T10272] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1695.174459][T10272] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1695.204573][T10272] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1695.281389][T10272] device hsr_slave_0 entered promiscuous mode [ 1695.336582][T10272] device hsr_slave_1 entered promiscuous mode [ 1695.463491][T10272] bridge0: port 2(bridge_slave_1) entered blocking state [ 1695.470666][T10272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1695.478080][T10272] bridge0: port 1(bridge_slave_0) entered blocking state [ 1695.485114][T10272] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1695.522600][T10272] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1695.535202][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1695.544164][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1695.552573][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1695.565611][T10272] 8021q: adding VLAN 0 to HW filter on device team0 [ 1695.577800][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1695.586949][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1695.593995][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1695.618715][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1695.631366][ T8063] bridge0: port 2(bridge_slave_1) entered blocking state [ 1695.638465][ T8063] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1695.652419][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1695.673085][T10272] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1695.684328][T10272] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1695.703126][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1695.713514][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1695.725081][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1695.735439][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1695.747123][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1695.764988][T10272] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1695.775939][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1695.784284][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1695.861989][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1695.871635][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1695.888224][T10272] device veth0_vlan entered promiscuous mode [ 1695.895274][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1695.907340][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1695.923471][T10272] device veth1_vlan entered promiscuous mode [ 1695.930977][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1695.942978][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1695.951110][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1695.974259][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1695.985779][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1695.994742][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1696.008512][T10272] device veth0_macvtap entered promiscuous mode [ 1696.021276][T10272] device veth1_macvtap entered promiscuous mode [ 1696.035310][T10272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1696.049447][T10272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1696.059564][T10272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1696.073413][T10272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1696.083588][T10272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1696.097559][T10272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1696.109498][T10272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1696.121424][T10272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1696.133412][T10272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1696.145272][T10272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1696.159503][T10272] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1696.169034][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1696.180892][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1696.189873][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1696.202863][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1696.214378][T10272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1696.225358][T10272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1696.235800][T10272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1696.246862][T10272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1696.257038][T10272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1696.267762][T10272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1696.277745][T10272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1696.288296][T10272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1696.298402][T10272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1696.308930][T10272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1696.320184][T10272] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1696.328500][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1696.337830][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1696.466034][T10282] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:46:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x1}, 0x1c) 20:46:50 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000001000000", @ANYRES32, @ANYBLOB="00000000000000f0ffffffff00000000200000002802e06f626d8aaaab9999f66dc4207dd885878d11ed9fa1c399781f63a537501b037cf155234ac46e6be58c8e11e1286e4563462c735a28ae6fe3f96fa1db1cbda58ec9549c5fac22f18ee0a2ad8ee503dd21e99d4d759a298f46740e9ba2f3b7178d3c47538cc845ef9e7a6a47c05e8435f72a56c21ec86d805e1c3c78911a886a939163b5a7479ff6a6c39791fa95a3586e1696afcd9caf22ff1f0740edfefe500bec495c8bbcd3e0fcf75952eb139d998ed9c0c3bb213020000000000000000000"]) write$capi20(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0xfff, 0x88, 0x83, 0xff80, 0x2}, 0x10) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000080)=""/3) 20:46:50 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xb, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:50 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x2}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1696.521303][T10281] fuse: Bad value for 'fd' 20:46:50 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r3, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r4, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:50 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1696.637572][T10292] BPF:Invalid string section 20:46:50 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{0xffffffffffffffff, 0x0, 0x0, 0x10000}, {}]}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$caif(r1, &(0x7f0000000040)=@util={0x25, "24f99e9c8497d32a36f09ffdf50e4e92"}, 0x18) 20:46:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x1}, 0x1c) 20:46:50 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x3}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:50 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xf, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:50 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r3, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r4, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x1}, 0x1c) [ 1696.861760][T10310] BPF:Invalid string section 20:46:50 executing program 4: io_setup(0xe8, &(0x7f0000000040)) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="00400000000000000000e7ffffff000000000000"]) 20:46:50 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x4}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:50 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x1000000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1697.044972][T10323] BPF:Invalid string section 20:46:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x1}, 0x1c) 20:46:50 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x5}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:50 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000d6aadd7f7a5f913275690df1fd8050995fde3fa6ea"]) 20:46:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x1}, 0x1c) 20:46:50 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r3, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r4, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1697.254175][T10336] BPF:Invalid string section 20:46:51 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x10, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:51 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000040)=""/32, &(0x7f0000000080)=0x20) 20:46:51 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:51 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x6}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1697.397244][ T8086] tipc: TX() has been purged, node left! 20:46:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x1}, 0x1c) 20:46:51 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x1400000100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1697.597569][T10352] BPF:Invalid string section [ 1697.610511][T10356] IPVS: length: 32 != 24 20:46:51 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x7}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x1}, 0x1c) 20:46:51 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x14, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:51 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000080)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) [ 1697.893349][T10366] BPF:Invalid string section 20:46:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, 0x1}, 0x1c) 20:46:51 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x1f00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:51 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x8}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) [ 1698.200797][T10379] BPF:Invalid string section [ 1698.949781][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1698.986403][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1698.997157][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1699.004773][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1699.049902][ T8086] device bridge_slave_1 left promiscuous mode [ 1699.069868][ T8086] bridge0: port 2(bridge_slave_1) entered disabled state [ 1699.130039][ T8086] device bridge_slave_0 left promiscuous mode [ 1699.149024][ T8086] bridge0: port 1(bridge_slave_0) entered disabled state [ 1699.214299][ T8086] device veth1_macvtap left promiscuous mode [ 1699.228845][ T8086] device veth0_macvtap left promiscuous mode [ 1699.234883][ T8086] device veth1_vlan left promiscuous mode [ 1699.249277][ T8086] device veth0_vlan left promiscuous mode [ 1701.156747][ T8086] device hsr_slave_0 left promiscuous mode [ 1701.196402][ T8086] device hsr_slave_1 left promiscuous mode [ 1701.250423][ T8086] team0 (unregistering): Port device team_slave_1 removed [ 1701.265042][ T8086] team0 (unregistering): Port device team_slave_0 removed [ 1701.276042][ T8086] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1701.353558][ T8086] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1701.442162][ T8086] bond0 (unregistering): Released all slaves [ 1701.544744][T10392] IPVS: ftp: loaded support on port[0] = 21 [ 1701.695598][T10392] chnl_net:caif_netlink_parms(): no params data found [ 1701.773635][T10392] bridge0: port 1(bridge_slave_0) entered blocking state [ 1701.796328][T10392] bridge0: port 1(bridge_slave_0) entered disabled state [ 1701.816376][T10392] device bridge_slave_0 entered promiscuous mode [ 1701.837298][T10392] bridge0: port 2(bridge_slave_1) entered blocking state [ 1701.846617][T10392] bridge0: port 2(bridge_slave_1) entered disabled state [ 1701.854610][T10392] device bridge_slave_1 entered promiscuous mode [ 1701.907718][T10392] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1701.928390][T10392] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1701.967667][T10392] team0: Port device team_slave_0 added [ 1701.974703][T10392] team0: Port device team_slave_1 added [ 1702.017567][T10392] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1702.024577][T10392] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1702.086368][T10392] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1702.107805][T10392] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1702.114802][T10392] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1702.176321][T10392] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1702.258664][T10392] device hsr_slave_0 entered promiscuous mode [ 1702.297631][T10392] device hsr_slave_1 entered promiscuous mode [ 1702.442075][T10392] bridge0: port 2(bridge_slave_1) entered blocking state [ 1702.449280][T10392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1702.456581][T10392] bridge0: port 1(bridge_slave_0) entered blocking state [ 1702.463641][T10392] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1702.556645][T10392] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1702.578034][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1702.586799][T30608] bridge0: port 1(bridge_slave_0) entered disabled state [ 1702.594929][T30608] bridge0: port 2(bridge_slave_1) entered disabled state [ 1702.610583][T10392] 8021q: adding VLAN 0 to HW filter on device team0 [ 1702.620923][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1702.630019][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1702.639041][T30608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1702.646089][T30608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1702.667446][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1702.680168][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1702.688844][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1702.695872][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1702.708898][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1702.720220][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1702.731120][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1702.742309][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1702.752904][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1702.770450][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1702.784954][T10392] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1702.806279][T10392] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1702.821184][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1702.830830][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1702.839765][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1702.849862][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1702.859015][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1702.876448][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1702.884390][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1702.892575][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1702.903157][T10392] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1702.984333][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1702.993775][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1703.011124][T10392] device veth0_vlan entered promiscuous mode [ 1703.022303][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1703.031519][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1703.048472][T10392] device veth1_vlan entered promiscuous mode [ 1703.056963][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1703.065113][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1703.074030][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1703.094481][T10392] device veth0_macvtap entered promiscuous mode [ 1703.102128][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1703.111407][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1703.121208][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1703.132310][T10392] device veth1_macvtap entered promiscuous mode [ 1703.140269][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1703.149247][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1703.165070][T10392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1703.176620][T10392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1703.187040][T10392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1703.197830][T10392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1703.208095][T10392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1703.219335][T10392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1703.229572][T10392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1703.240354][T10392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1703.250542][T10392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1703.261360][T10392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1703.272936][T10392] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1703.281985][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1703.291379][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1703.302089][T10392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1703.313899][T10392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1703.324286][T10392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1703.335089][T10392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1703.345223][T10392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1703.356617][T10392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1703.366926][T10392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1703.377819][T10392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1703.388100][T10392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1703.399152][T10392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1703.410827][T10392] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1703.420518][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1703.429976][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1703.593140][T10402] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:46:57 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x1}, 0x1c) 20:46:57 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) sendmsg$xdp(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="a13236d00e418dddb02affd3fc1995908abc39d52713aec22961ecafdbdea3ae244c812607718eb4648ec9e132f9ede29ad03446a0e060244f6fe5292e366b79faf1b75d98083664dfe68a074800d260faf810b733d29415155ccd9c3d101070dd1c0ec2f76b4991b62f54479d407591c6e9858f5897f3", 0x77}, {&(0x7f0000000100)="1faf8dbe136570a3e6c818f3cb2867ad6597e6e98e7ed8e2856904e082be", 0x1e}, {&(0x7f0000000140)="bd73eec189743c7d34b0ca86db16172b29bd2d24144c964a78fe37e662016f90ea46012ba20c4d989ad97dc1314c6d6c44ebb8ac1e2c058a57b0cdf0240b8b8fd748f2cb5d500c5fbd1095028e", 0x4d}, {&(0x7f00000001c0)="40e4a6898ef792ed0719fdfc5908c3f3ed3711fa6572fdb7a7ffd28064978249503a0a52a0a517f971eb8360dac1f7930ed66bae5aa75b683bafc1c560515c4fdadaf2b79c", 0x45}, {&(0x7f0000000240)="83caa47e31b5e575eac2f17616bd2443016153ff65c208aefbbb893c3ae72bbab2856c2cbabe1af2db7f2fcb2c2c06c37a62ccbdefa7141b1e4699b8c1838bcbd73f0210ad53b5db4cccb78bb7642ab669af260675ab3fa39d908e9df1269c3921e2783f2273dae4de78a0", 0x6b}, {&(0x7f00000002c0)="97e6c37b1b0f3ec7ac0e28ce665a7837876a233399fb9c52eeb2494de2018d64006537132c848a6e99e2ecedd9514048ba556e1e98", 0x35}, {&(0x7f00000003c0)="dbd3e8c2980f4739e68f32ecf9f88f9956faabfed698cf8851a0f8944785b5d43c75997b33dcf309f3388005ff1a6f48253364af9a933f3dc707f8f82163dacd1f198e82d513693511", 0x49}, {&(0x7f0000000300)="f8fdd124abbdea60b349aff4ce5413a75386a4af1c985d298720b1a2dada63f815896e40c81f7e4d89d878195f", 0x2d}, {&(0x7f0000000440)}], 0x9, 0x0, 0x0, 0x10}, 0x90) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="2cb026388e01d23f0000000000000000000000005193c3f6fdea48dd0d04b2d348cdb6753c1d960d45b999261053715749104b56e49068d2d3fc0797e2ddf9d22919dc1e09fee22cde4b00484c39ded737954649628e", @ANYRES16, @ANYBLOB='\x00'/20]) 20:46:57 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x1c}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:57 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3a, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:57 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1703.712806][T10405] BPF:Invalid string section 20:46:57 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="6faa003ec1e32f83", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/20]) 20:46:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x1}, 0x1c) 20:46:57 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x1e}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:57 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x500, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:57 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x4000, 0x0) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x600000, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) setsockopt$inet_udp_int(r2, 0x11, 0x1, &(0x7f00000000c0)=0x2, 0x4) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r3, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000080)={0x0, 0x1, [{r3, 0x0, 0x1000000, 0x2000}]}) [ 1703.980100][T10426] BPF:Invalid string section 20:46:57 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0x11, &(0x7f00000000c0)=0x9, 0x4) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000040)={r3, 0x1, 0x4000, 0x10000}) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0xbee562129be6dd38}]}) 20:46:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x1}, 0x1c) 20:46:57 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:57 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x48}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1704.239223][T10444] BPF:Invalid string section 20:46:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x1}, 0x1c) 20:46:58 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x2010000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:58 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x401000, 0x0) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x6c, r2, 0x200, 0x3ff, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xaf9afe86f58ce58d}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1f}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x44, 0x2, 0x3b}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x800) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000002000000", @ANYRES32, @ANYBLOB="961900008020", @ANYRES32, @ANYBLOB='\x00'/20]) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r3, &(0x7f0000000380)='syz0\x00', 0x1ff) getsockopt$llc_int(r3, 0x10c, 0x3, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x20800, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r4, 0x8982, &(0x7f0000000300)={0x1, 'veth1_to_bridge\x00'}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r5, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f00000003c0)) [ 1704.279683][ T8079] tipc: TX() has been purged, node left! 20:46:58 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:46:58 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x7300, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:46:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x1}, 0x1c) 20:46:58 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x4c}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:58 executing program 4: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x2, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000080)={0x0, 0x3, [{}, {}, {r0, 0x0, 0x100000000, 0x8000}]}) 20:46:58 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x2300000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1704.639769][T10462] BPF:Invalid string section 20:46:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x1}, 0x1c) 20:46:58 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x60}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:58 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/udmabuf\x00', 0x2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$int_out(r0, 0x5464, &(0x7f0000000200)) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000002000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000f0ffffffff", @ANYRES32, @ANYBLOB="0850aa161b9f59b57164cb22ece9a3c72e540440097992aa1519b30347b48f68ed071eb0c9cd073a4c2af3b68c05dd84d53d283582d98a053e2f060c1854849eac55c1366ae4a67934070c49f88f5610f9a939f42453bde209dbacfa7254cf7b37e93b16a231cecf431e58debe33266db9950b9009d5eec7faefd97ae06f3075db5e99a8b62b69dc351c5f8bf46cde0da37ae133870107580e55ed6589c116a7a9f52a5f124f5d8d07ac9a8e2310a76295affaf2e4d1082b87577bb5d966159281e62603fd61fed83d91902320d4c75506a57900d73b0125804bd9aecbe5990da6e763e12316c3dde1baea82868400"/254]) 20:46:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x1}, 0x1c) [ 1704.942011][T10473] BPF:Invalid string section 20:46:58 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x68}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:46:58 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1705.254796][T10482] BPF:Invalid string section [ 1705.949842][ T8079] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1705.966448][ T8079] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1705.987217][ T8079] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1705.994711][ T8079] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1706.017282][ T8079] device bridge_slave_1 left promiscuous mode [ 1706.023506][ T8079] bridge0: port 2(bridge_slave_1) entered disabled state [ 1706.117017][ T8079] device bridge_slave_0 left promiscuous mode [ 1706.123215][ T8079] bridge0: port 1(bridge_slave_0) entered disabled state [ 1706.183837][ T8079] device veth1_macvtap left promiscuous mode [ 1706.190240][ T8079] device veth0_macvtap left promiscuous mode [ 1706.200192][ T8079] device veth1_vlan left promiscuous mode [ 1706.205985][ T8079] device veth0_vlan left promiscuous mode [ 1708.046771][ T8079] device hsr_slave_0 left promiscuous mode [ 1708.116416][ T8079] device hsr_slave_1 left promiscuous mode [ 1708.174577][ T8079] team0 (unregistering): Port device team_slave_1 removed [ 1708.185747][ T8079] team0 (unregistering): Port device team_slave_0 removed [ 1708.201216][ T8079] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1708.260971][ T8079] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1708.344745][ T8079] bond0 (unregistering): Released all slaves [ 1708.454390][T10492] IPVS: ftp: loaded support on port[0] = 21 [ 1708.613239][T10492] chnl_net:caif_netlink_parms(): no params data found [ 1708.708105][T10492] bridge0: port 1(bridge_slave_0) entered blocking state [ 1708.715210][T10492] bridge0: port 1(bridge_slave_0) entered disabled state [ 1708.723594][T10492] device bridge_slave_0 entered promiscuous mode [ 1708.750883][T10492] bridge0: port 2(bridge_slave_1) entered blocking state [ 1708.769705][T10492] bridge0: port 2(bridge_slave_1) entered disabled state [ 1708.787276][T10492] device bridge_slave_1 entered promiscuous mode [ 1708.815987][T10492] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1708.838330][T10492] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1708.888076][T10492] team0: Port device team_slave_0 added [ 1708.895054][T10492] team0: Port device team_slave_1 added [ 1708.926081][T10492] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1708.946366][T10492] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1708.996304][T10492] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1709.027484][T10492] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1709.034493][T10492] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1709.106321][T10492] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1709.202031][T10492] device hsr_slave_0 entered promiscuous mode [ 1709.249910][T10492] device hsr_slave_1 entered promiscuous mode [ 1709.421740][T10492] bridge0: port 2(bridge_slave_1) entered blocking state [ 1709.428839][T10492] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1709.436391][T10492] bridge0: port 1(bridge_slave_0) entered blocking state [ 1709.443429][T10492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1709.490100][ T8083] bridge0: port 1(bridge_slave_0) entered disabled state [ 1709.510975][ T8083] bridge0: port 2(bridge_slave_1) entered disabled state [ 1709.554404][T10492] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1709.570165][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1709.582173][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1709.592457][T10492] 8021q: adding VLAN 0 to HW filter on device team0 [ 1709.607213][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1709.619381][T23966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1709.628109][T23966] bridge0: port 1(bridge_slave_0) entered blocking state [ 1709.635158][T23966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1709.667049][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1709.687067][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1709.707034][ T8683] bridge0: port 2(bridge_slave_1) entered blocking state [ 1709.714214][ T8683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1709.736682][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1709.745824][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1709.758868][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1709.769856][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1709.780388][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1709.791119][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1709.807870][T10492] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1709.821957][T10492] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1709.834126][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1709.846342][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1709.854826][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1709.868359][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1709.880556][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1709.897478][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1709.905407][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1709.916352][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1709.926924][T10492] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1710.010388][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1710.019667][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1710.032610][T10492] device veth0_vlan entered promiscuous mode [ 1710.040200][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1710.052184][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1710.064805][T10492] device veth1_vlan entered promiscuous mode [ 1710.075383][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1710.083764][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1710.095796][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1710.115393][T10492] device veth0_macvtap entered promiscuous mode [ 1710.130176][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1710.140179][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1710.151228][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1710.163825][T10492] device veth1_macvtap entered promiscuous mode [ 1710.174435][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1710.184788][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1710.203384][T10492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1710.217757][T10492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1710.230377][T10492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1710.241865][T10492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1710.253607][T10492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1710.265452][T10492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1710.275396][T10492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1710.286028][T10492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1710.296082][T10492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1710.307049][T10492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1710.318666][T10492] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1710.327569][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1710.337019][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1710.346847][T10492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1710.358606][T10492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1710.369015][T10492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1710.380016][T10492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1710.390198][T10492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1710.401329][T10492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1710.411797][T10492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1710.422735][T10492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1710.433202][T10492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1710.444215][T10492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1710.456026][T10492] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1710.464738][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1710.474182][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1710.618401][T10502] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:47:04 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:04 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00000000000000a47278982fd64d36709a6858a7", @ANYRES32, @ANYBLOB='\x00'/20]) 20:47:04 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x6c}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x1}, 0x1c) 20:47:04 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd200, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:04 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1710.786936][T10512] BPF:Invalid string section 20:47:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x1}, 0x1c) 20:47:04 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x74}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:04 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40, 0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)=ANY=[@ANYRES32=r1, @ANYBLOB="7600000097f2ad97d215be226c713d26e306f349c007397997d55327ef2d8236dca2a4fd0420957067d7cb3c5508a1b67686b0524ee54fe2a12d65f9ad0bca37343379963f7a819b5ff514aeea5c0b81641e69681328c3559482eea9e57b06ce35c8daee686f759abf77d4c25b5c9941d261ffebfd062299ef8eff975b448f407c5128370dffddd25182"], &(0x7f0000000180)=0x7e) r2 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) 20:47:04 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4000080000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1711.128355][T10521] BPF:Invalid string section 20:47:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x1}, 0x1c) 20:47:04 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x7a}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1711.317032][T10532] BPF:Invalid string section 20:47:05 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x1}, 0x1c) 20:47:05 executing program 4: socket$inet_smc(0x2b, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000040)={0x7, 0xa, 0x4, 0x10, 0xbca5, {0x77359400}, {0x1, 0x1, 0x0, 0x7, 0x37, 0x1, '7ur\r'}, 0xeea, 0x1, @userptr=0x200, 0x7ff, 0x0, r1}) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000000c0)) r3 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r3, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00000000bacb00"/20, @ANYRES32, @ANYBLOB='\x00'/20]) 20:47:05 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1711.516275][ T8086] tipc: TX() has been purged, node left! 20:47:05 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xff00, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:05 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0xf8}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:05 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:05 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="0b48c05ad6b0db16b7f416dd8b3f8b3d7a4f018da35d1954034622ac83cd4a50868136d412d3e531c2b73d65d75d8613f5e29014c156840651292b64d565e5478540127143ba7964f3516ede6552a629bdf1852a88d5801a4a6cb9cb21e769ff395f8001207ab62dc2cde625245eb4a6f64f56b5b29ad87d7ff7ef1120b375bf299df4136c2b367152a790d4c7405f052909e67723cdfef48563b4476d825175bc4e18384cf8a04bc9a40000000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000075c988dba0288d20e44e8195452ab6df5320d0fae762465ed8c7d1606b3625f93f9a7fbbe608330377801d6aff8c973f18cc8d1527b688cdf5e9f7ae303e9ead1e8991803a2cd0accef93407e4f603fc215845986cac768ba257a55ce308101aff00c47256f122"]) 20:47:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x1}, 0x1c) [ 1711.753471][T10550] BPF:Invalid string section 20:47:05 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:05 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x1}, 0x1c) 20:47:05 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) sendto$netrom(r0, &(0x7f0000000240)="6fbb662ea54225de7864674cf7c17ec6a3d4fd48110ab0b993570889236e930091b9b9ae59278f690545f428e103cc916d270fad0d59896333df3b3807459ed7f502b874cd833197945b42b2f7c5c1265373906e798f1dce6938e0df9d8e23e09ead618ac561d00891407e2e92f3df4cddfac89c9c8ad54df7a5ab60d678fbba89b37af4d476463dbf719b3f83af5bd0f194", 0x92, 0x20000000, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}, 0x48) r1 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r2 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890c, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000140)={0x9c0000, 0x80, 0x400, r2, 0x0, &(0x7f0000000100)={0x9a0908, 0x6, [], @value=0x6}}) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f00000003c0)) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f0000000180)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000200)) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$TIOCOUTQ(r4, 0x5411, &(0x7f00000001c0)) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f00000000c0)={r5, 0x0, 0xfffefffff001b000, 0x1000000000000}) r6 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x402041, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r7, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)={0x0, 0x0}) rt_tgsigqueueinfo(r8, r9, 0x2f, &(0x7f0000000480)={0x6, 0x80000000, 0x40}) ioctl$LOOP_SET_CAPACITY(r6, 0x4c07) [ 1712.065319][T10565] BPF:[1] Invalid name_offset:4294967293 20:47:05 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:05 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="020100000000000400"/20]) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x4, &(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x2}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$sock_ax25_SIOCADDRT(r2, 0x890b, &(0x7f00000000c0)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}) 20:47:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x1}, 0x1c) 20:47:06 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:06 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) [ 1712.889911][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1712.927824][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1712.967238][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1712.974770][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1713.013485][ T8086] device bridge_slave_1 left promiscuous mode [ 1713.024338][ T8086] bridge0: port 2(bridge_slave_1) entered disabled state [ 1713.086926][ T8086] device bridge_slave_0 left promiscuous mode [ 1713.094464][ T8086] bridge0: port 1(bridge_slave_0) entered disabled state [ 1713.161545][ T8086] device veth1_macvtap left promiscuous mode [ 1713.189699][ T8086] device veth0_macvtap left promiscuous mode [ 1713.195764][ T8086] device veth1_vlan left promiscuous mode [ 1713.226379][ T8086] device veth0_vlan left promiscuous mode [ 1715.339828][ T8086] device hsr_slave_0 left promiscuous mode [ 1715.379484][ T8086] device hsr_slave_1 left promiscuous mode [ 1715.434786][ T8086] team0 (unregistering): Port device team_slave_1 removed [ 1715.446105][ T8086] team0 (unregistering): Port device team_slave_0 removed [ 1715.461345][ T8086] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1715.510407][ T8086] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1715.602952][ T8086] bond0 (unregistering): Released all slaves [ 1715.704913][T10582] IPVS: ftp: loaded support on port[0] = 21 [ 1715.796151][T10582] chnl_net:caif_netlink_parms(): no params data found [ 1715.935389][T10582] bridge0: port 1(bridge_slave_0) entered blocking state [ 1715.942573][T10582] bridge0: port 1(bridge_slave_0) entered disabled state [ 1715.967324][T10582] device bridge_slave_0 entered promiscuous mode [ 1715.986634][T10582] bridge0: port 2(bridge_slave_1) entered blocking state [ 1715.993721][T10582] bridge0: port 2(bridge_slave_1) entered disabled state [ 1716.027492][T10582] device bridge_slave_1 entered promiscuous mode [ 1716.046153][T10582] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1716.078068][T10582] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1716.117779][T10582] team0: Port device team_slave_0 added [ 1716.124747][T10582] team0: Port device team_slave_1 added [ 1716.167276][T10582] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1716.174264][T10582] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1716.249350][T10582] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1716.276405][T10582] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1716.283460][T10582] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1716.356363][T10582] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1716.421955][T10582] device hsr_slave_0 entered promiscuous mode [ 1716.476664][T10582] device hsr_slave_1 entered promiscuous mode [ 1716.646140][T10582] bridge0: port 2(bridge_slave_1) entered blocking state [ 1716.653326][T10582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1716.660618][T10582] bridge0: port 1(bridge_slave_0) entered blocking state [ 1716.667670][T10582] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1716.707784][T10582] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1716.722371][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1716.731359][ T8063] bridge0: port 1(bridge_slave_0) entered disabled state [ 1716.741605][ T8063] bridge0: port 2(bridge_slave_1) entered disabled state [ 1716.756679][T10582] 8021q: adding VLAN 0 to HW filter on device team0 [ 1716.770022][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1716.781515][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1716.791479][ T8063] bridge0: port 1(bridge_slave_0) entered blocking state [ 1716.798535][ T8063] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1716.818606][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1716.830454][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1716.839398][T30608] bridge0: port 2(bridge_slave_1) entered blocking state [ 1716.846464][T30608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1716.858362][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1716.868675][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1716.879909][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1716.890518][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1716.911487][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1716.921493][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1716.931709][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1716.942796][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1716.953718][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1716.963844][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1716.973747][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1716.984756][T10582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1717.000639][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1717.008372][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1717.020660][T10582] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1717.100676][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1717.110144][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1717.132321][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1717.144942][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1717.155508][T10582] device veth0_vlan entered promiscuous mode [ 1717.167180][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1717.175645][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1717.191122][T10582] device veth1_vlan entered promiscuous mode [ 1717.212661][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1717.223779][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1717.233045][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1717.247481][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1717.261590][T10582] device veth0_macvtap entered promiscuous mode [ 1717.272131][T10582] device veth1_macvtap entered promiscuous mode [ 1717.289046][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1717.303097][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1717.313549][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1717.330937][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1717.340829][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1717.354452][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1717.364440][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1717.378355][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1717.389139][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1717.404290][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1717.418754][T10582] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1717.426867][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1717.435080][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1717.446688][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1717.455700][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1717.469731][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1717.482692][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1717.493799][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1717.508137][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1717.519881][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1717.532447][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1717.543877][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1717.558728][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1717.569899][T10582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1717.582754][T10582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1717.595010][T10582] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1717.607040][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1717.615899][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1717.738386][T10591] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:47:11 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:11 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [], 0x2}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x1}, 0x1c) 20:47:11 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:11 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00F\b\x00\x00\x00\x00']) 20:47:11 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xffff88812161ad98, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1717.896029][T10600] BPF:Invalid string section 20:47:11 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [], 0x3}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x1}, 0x1c) 20:47:11 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)=ANY=[@ANYBLOB="000086f302a670500000f1ff0008", @ANYRES32=r1, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/20]) [ 1718.100153][T10611] BPF:Invalid string section 20:47:11 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x7400000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:11 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [], 0x4}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, 0x1}, 0x1c) [ 1718.246884][T10618] BPF:Invalid string section 20:47:12 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:12 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [], 0x5}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) [ 1718.469091][T10627] BPF:Invalid string section [ 1718.495026][T10627] BPF:Invalid string section 20:47:12 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:12 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1718.576289][ T8086] tipc: TX() has been purged, node left! 20:47:12 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xffff88812161af98, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) 20:47:12 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [], 0x6}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1718.890709][T10639] BPF:Invalid string section 20:47:12 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [], 0x7}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) 20:47:12 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) r2 = getpid() tkill(r2, 0x9) r3 = gettid() r4 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x890c, &(0x7f0000000000)) r5 = getpid() tkill(r5, 0x9) r6 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x890c, &(0x7f0000000000)) r7 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x890c, &(0x7f0000000000)) r8 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x890c, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f0000000200)=0x0) r10 = getpid() tkill(r10, 0x9) r11 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x890c, &(0x7f0000000000)) socket$rxrpc(0x21, 0x2, 0x2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) r12 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r12, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r12, 0x890c, &(0x7f0000000000)) r13 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r13, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r13, 0x890c, &(0x7f0000000000)) r14 = getpid() tkill(r14, 0x9) getresuid(&(0x7f0000003700)=0x0, &(0x7f0000003740), &(0x7f0000003780)) r16 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r16, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r16, 0x890c, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(r16, 0x8904, &(0x7f0000003bc0)=0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r18, &(0x7f0000000380)='syz0\x00', 0x1ff) r19 = gettid() r20 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r21 = socket$kcm(0x2, 0x3, 0x2) perf_event_open$cgroup(0x0, r20, 0x6, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, r20, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r21, 0x1, 0x3e, &(0x7f00000002c0)=r20, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x5}, 0x0, 0x0, &(0x7f0000000300)={0x3, 0xc, 0x2, 0x10000}, &(0x7f0000000340)=0x4f, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x948}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r19, r20, 0x0, 0x3e, &(0x7f0000000140)='!proc/{@*)posix_acl_access/-selinuxmd5sum!*\'wlan1selinuxwlan1\x00', r22}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003f00)={0xffffffffffffffff, r18, 0x0, 0x14, &(0x7f0000003ec0)='.}[]ppp1bdevem1self\x00', r22}, 0x30) lstat(&(0x7f0000003f40)='./file0\x00', &(0x7f0000003f80)={0x0, 0x0, 0x0, 0x0, 0x0}) r25 = getgid() r26 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r26, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r26, 0x890c, &(0x7f0000000000)) r27 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r27, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r27, 0x890c, &(0x7f0000000000)) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000040c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r29 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r29, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r29, 0x890c, &(0x7f0000000000)) r30 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r30, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r30, 0x890c, &(0x7f0000000000)) r31 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r31, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r31, 0x890c, &(0x7f0000000000)) r32 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r32, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r32, 0x890c, &(0x7f0000000000)) r33 = getpid() tkill(r33, 0x9) r34 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r34, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r35, 0x0) getresgid(&(0x7f0000004100)=0x0, &(0x7f0000004140), &(0x7f0000004180)) sendmsg$netlink(r1, &(0x7f0000004280)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000003e00)=[{&(0x7f0000000380)={0x5cc, 0x34, 0x100, 0x70bd2d, 0x25dfdbfd, "", [@nested={0x391, 0x51, 0x0, 0x1, [@typed={0x69, 0x82, 0x0, 0x0, @binary="2e37c262c294e15f650493a55ffec3b7724089ca450cd106f167faf4d7d779ffdff75a799167687ee229b30b58aeb88d78b92dd42286feb8505696d4865d00101ff7d7e003d29494a466c2de11c66b1e0be7997785034498f94c02c5b1b3ad9a3ea98a13af"}, @generic="762b322c925ed490c8de404745690f42a00831d829f1910d66c74748572f869fabd3292de6d15192b36bedccaeccf0c6a66161c9f42f35f80264310ecffe99548f1a7653070adcc88f4d10e3765c5971191d4735cb196b50e49a76d148d337549e1aa5eb70687cc4bce36a44421fb596f466df0a28151f04a1a666b21f1ca0e6853a81a1117753a8b53d396a33f1c258049dbfbba38cc969279127fbfaa5ffbfb49543be34aa4b5076ad4ca0ea84ac744856e592e6f5f79e9d03470674637e75fb75b7ccd207ed9fd130c4e32dd4d5d841af2b72caa0396ab031f0819a98eefee9e0e51a275fb23232dcaaf71e86530f", @generic="77705e7ff9a4f14fd1afe5437da4188ae26e0674539cdaed3eb8d6b5e80669f75a560f0f34309599d76b0576b925c9613a6d815b611478969b9281299425953cd09caf4c13d9736a1f8e5ef825971d5c2ecc13061127dd61ece9f4ac5e546e4216509b2a8175a967ac658747def17639f690eb06dc8575f9427ac1b21cd4d746e2d6bbb34556d0eed2c445b06e2e49b5bbee75364189e7b292434c4149f79f48cb987db7ee644ba12a96fd87fecc30f6335c19471083dd5a0dbcdae02d37953baa3fcf40a1acd501a4839dafa189e80973b13110bd141417ae1fcfc126d70788c2902c7baa9337d1", @typed={0x14, 0x36, 0x0, 0x0, @ipv6=@mcast1}, @typed={0x8, 0x7f, 0x0, 0x0, @fd=r0}, @generic="c6be0a5d221af96fd0ee9fe9b1e7493eb1c355c217df37547b9189c26660eee504426c21e289c040b52185d2103de456b7945227c29c4a4083c9715a64583c65e60c2b40f94308a6ec005bdb8349c399ddb80319da61bed64bcbf66c769d1ac1733f25a466e52289879bd475252bf360b6f0ac1675c9e8e7224e63e721f86da4cdbe507201615ef0fd052db4274d66b0449d9c9fb50b57cf8f12aaea246e39a6bbf58291dca0d1636ef24fd67446473c752e1787f06fa11b1466c14cc86a2cabfaafa2e0f32f7f48dc81ac13bb93fd84171943c33833a30768f23189d135b1647ac737cbc0b6476158a89a39e3d431e7cca205b167", @typed={0x8, 0x11, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @typed={0x14, 0x46, 0x0, 0x0, @ipv6=@ipv4}, @typed={0x8, 0x5e, 0x0, 0x0, @ipv4=@broadcast}, @typed={0x14, 0x14, 0x0, 0x0, @ipv6=@loopback}]}, @nested={0xc9, 0x20, 0x0, 0x1, [@generic="ea16c0852b259df1d10d978a1910de2bb1930815338f6371b95b7deeb5e9af67e95c5705d6612d3afce0c93af5afb1", @generic="4feb8c81e1f1e385595c89fa8d5cb28d2eeeb2495dbce443830de63a6951d19b9586f32dcda2dd013b26da1b642bfb98daa3752cbedebdf136951708a7df773e3af540a58442eb01f6bbf0a322949ececf6017550af6ad53a4ef", @generic="2964931003578ebf5767c700eace73e9de8874a762ecbd24e0a7c013bf98170d0a830d0aade6a9244118f1d2387c88f7380239651efd955f988d20d0"]}, @generic="2887e43490a3c65036365c6ec3e6e9463dab204b59c81305a59f64996534d7077a6864e236ced88f0c59996af0698b6909f7284a41b81d0242d18e7297e8941cd4d5764d7871e74ff3228c51d71a3c4ecb8d78e6212e", @nested={0xb8, 0x1c, 0x0, 0x1, [@generic="8168eaefa05dcfae3e371bd2db851a90a0ad07b4012069af141d4cb51f4fd86e717cbbb7213d80e8f3f365a94a14a43c73f488a92526c5d503921f7d065d56b1ee40222a555b0cf708562e4c465c61c47cdb7afa6717f55671e150380967b7b78366b8f218a6c149bc60f4ae2ac5f200015cbc747fb42db12f6c0f899393cc77f2ff670f0515fab97b8e9a9fe624de6e1bd8f9fab55e380eaeaba07e2972da81326457ac60f84d7bfcd0532a", @typed={0x8, 0x13, 0x0, 0x0, @ipv4=@remote}]}, @generic="8a51e53b5704df619cff97bdc2cabc8bd007bc643d41650cf61af2bad5965486b491dd828527caf21330eec9722a6fd4f9667cff8ce4ceb780a846e52e", @typed={0x8, 0x8e, 0x0, 0x0, @pid=r2}, @typed={0x8, 0x56, 0x0, 0x0, @pid=r3}]}, 0x5cc}, {&(0x7f0000000980)={0x10bc, 0x25, 0x2, 0x70bd29, 0x25dfdbfc, "", [@nested={0x10a9, 0x64, 0x0, 0x1, [@typed={0xc, 0x79, 0x0, 0x0, @u64=0x3}, @generic="f9b5d0dac5fc8ec56f1ac4dbb2aec9540e80c2dd62df04ea08e7d69480f91d2e2a44d6dfe91b92c4d7207d88a9", @generic="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", @generic="2a5b785e8b80e4e76b957bb99405134a1ff400fea7909e8c5a70bf15ea129616ff53d6595bbefbb84d436fd1569770", @typed={0x8, 0x80, 0x0, 0x0, @fd=r4}, @generic="58fccf9712fcec5bfcb71889ccbce9046f749337902f3b7a4fa6e1eebc20c74a85", @typed={0x11, 0xa, 0x0, 0x0, @str='/dev/udmabuf\x00'}]}]}, 0x10bc}, {&(0x7f0000001a40)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="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"], 0x3}, {&(0x7f0000000080)={0x15c, 0x32, 0x800, 0x70bd2d, 0x25dfdbfe, "", [@nested={0x14b, 0x49, 0x0, 0x1, [@generic="6e05be767a79e0a0a2b8d3825bef0bb2932fc49079dc0a968594556e45bf1e2ced7568e28a469cea877648ec60436baa85317e77af95a8a9e0fe250319e207136baddc13641c7882f4218d5ce48b2ab2046e9266f622e8518baa7a170deef4418652945ab6ac6053ea056e5b932d17abbc024c3dbcb3d16d3b658b803f5e55534df7f7b81c75da3b4181e68390154d3b8a8fa3fa6f0bf33b3e84b08afab1b42a880e15f10aa1a2709cf9a80d42eed96c17af51fa96e73f46984c47e302428c603d8aac61f40d5632010982d3f33e7987", @generic="1a575b61a81513acf76eec3b347b398f16a18b", @typed={0x64, 0x5, 0x0, 0x0, @binary="b1be2ad4f58cfe39c504df748cf5e2593d2abc8f220245e062ddf59e6e994a91083a68c72958b4ceb9d57f9d9d9b126e464b08a231e94974677e00f722e7d85ecfdbb677ee7872dba447ff256d146806ef164429bf57b9bc98a33560c7769fd1"}]}]}, 0x15c}, {&(0x7f0000002f00)={0x1c0, 0x1c, 0x200, 0x70bd2b, 0x25dfdbfd, "", [@nested={0x19d, 0x23, 0x0, 0x1, [@generic="e344332522f3c9bb3e9fc408ff0833f7a4be1dbb04bdd8375f4e20215599538df855103098ddc7d03bf8cc70ca90f5bbd9091721d331cd996b1b72f6e60ae562ef459bc0dea7c1c6f87ef8c6b5f39e7df8e88602424d990bf5f33dd2490e3c5e1e4453beb125c17ab1066cfea54c88fe3d60b3c709fa58a5cb5cfa13b5e96cdebd06a942ff22f7b9dc86a32190ce7783f518741ec8eb2fa24f5c485caf47210ebcad59f03aa8a405da2a295eee5f61ca52e6d20ae29a6321da7ec2dc908344db4cd892d4", @typed={0x8, 0x68, 0x0, 0x0, @fd=r6}, @typed={0x8, 0x52, 0x0, 0x0, @fd=r7}, @generic="be7aae8dd09059e4e168c8ac707c5c2a00a0ab1f348f429645ab936a5bd7b6ce262e32c736ef0da2813d984c75dcaa470b36fb75f72125d5c1e3685e25188186bd3119ca57c721d90a1c32875d09d8a37096d3dd52ccaa83d135f4d8dad25215ef7777efdbf19bec82692d0e81381167e1952bfc298631d63a947efe18fbbd095fca11c22f09ceeea5cc7c16aeaa74f4239e7e2dae219e67019453f86363b3161b6c7e4c1ac8675df8df5dd32c7205efabeb0bb79ecfc7183e40d745810bf9f8ab3da2a036"]}, @typed={0x8, 0x2a, 0x0, 0x0, @ipv4=@rand_addr=0x3}, @typed={0x8, 0x4f, 0x0, 0x0, @pid=r9}]}, 0x1c0}, {&(0x7f00000030c0)={0x504, 0x3c, 0x100, 0x70bd25, 0x25dfdbfd, "", [@nested={0x101, 0x23, 0x0, 0x1, [@generic="295dd9cb8df17052d34d0c1784cb5a1b592db1ae8621d249ec37da00a34f812769e1ef4114dee1c794121c048e3bf10ba2bd8e6689c2f1f91a028817b2324fb7eff5716504df2d51d6fd9f463b81bfdf692448fbb29f85e49c2ffea09e76929e583e16ebda95eb940a1fc130e0750bb5d7b4e5c6d884a7798e01784265dee981257672eb0bcf02682f0cb586277f272f87b0eb88207ea3aa097c13c26e1f135cf15da0323c8605139097d74d3547a38ce2f6f64ab5bf3c8be8e8d60d007f9e483b7ca01d6b03bcae6cb4926921df1758980341b4b2997ed94d41a9cdda18801313401a62bee2", @generic="34cbbb", @typed={0x14, 0x54, 0x0, 0x0, @ipv6=@ipv4={[], [], @remote}}]}, @nested={0x24a, 0x7a, 0x0, 0x1, [@generic="e0b5ef8fe1312aeecc00e64b06d7e303f4afe0f015f24b7a2e4895a6bba0498fe2d45a90bdf64a0b0daaa738ce010d8f451ecd7839230ee79e6676e21589f71ea23fd8d7359415bbefc3e6ad0f1c043e58b572595295f8e152dbb7ff7aecddfb77a2ae7b10e60b54a1bcbc71402d52653621e905b08dcd94ada9c4de3bf17bc29814b0b9d7bad1cce6b72ca288cb01aaed8e6d99543364d14cf9969f87ec8ac899440b6f6a3f29732b136b1703c083c3fbf066f1db49f23ab95cb4361d53f874ba8dc67505bd929c8ef2388fe5339ebc116395fb9fd9248459bc94bfcc368f42bfe858a3b2f00aa198b01e8f36", @generic="2aec542cad50bb536be838c8691013fd75389293bd1fe8ec49548b6fcb7037586a6e75f12650249df54741f91cefe3a0a1ffd33971fd54f2525212b03c3ca2c629c3ec783ec274216898a9130c01bc878615a4b9ab98e22bf590898813c4dccd66fb2601340f60a3ac5f16bafa1c33880ab2d0cc8603437f032525a43655ec804bf9ca185d00", @generic="828450845c32e0a1272c8bc23ff356569ea2dee1c4082df5e7cc9faf4920d6ac140803a027113c2cac6ed7bd9d2e1671d2dd33", @generic="283e2be264ad802b030916a87636c4f1633807a53da5c010cabf60d6423895965e52a30fecec78a89e6c915b689c9ab9c53c38931dac8b624503fc669e3be0f9fd61d3454a01522246289dc4af260e5cfdcece783723a49b7012a77421b1401e147d1480cd0f5e3c53f00603f8235dda593881c70df56704d73773218f3bc6bdbeb92212e6798c5f13d4dc45", @typed={0x14, 0x87, 0x0, 0x0, @ipv6=@remote}]}, @typed={0x8, 0x3e, 0x0, 0x0, @pid=r10}, @generic="c1c0f0d54550f8fe52e2d248eab2cf91c115a846ff730f92762614df81546a7228f36f84b44fbe4913d360170a5e3c683b1815ff054aa4b3bc07e6565b7a12ec6eff8d13eb9127ad8bd522130e99ad17b24ecb33ac048ea599c13dd3d9a11768298ed7514f42b5fde954882f2e6f9cc8f7c7060b8e0d8d", @generic="f49dd8fa8d51e7a2", @generic="df0f757089cd0e3ede90e6308a2a7e7261b01f35be81c8075e4e1951eac883b1616b5c5dccb62e312d71631ac2148ff33bf51e30dd76a4dac2871259fe9b378935354591946d32bd45b7555fc56fb4acedfc1afb6e76bbfef01abe51a08fae4ac732022694b1916f265a2ae6f33ce40c6ecbefe745cc59f9ce3ba41c9763b1dc460a3555146dbd8180780b1650392744eb787f682eca9e868bfcbe479aec39896ca9c602982b140a5fdd7b2568df7d92d4f15df0e5c2aee12d2571a1b90f055ad4c68bb8274480b6980249423183e5", @nested={0x42, 0x78, 0x0, 0x1, [@generic="62aae803f634", @typed={0x11, 0x6b, 0x0, 0x0, @str='/dev/udmabuf\x00'}, @typed={0x8, 0x92, 0x0, 0x0, @fd=r13}, @generic="e28f6af4f199846e5e7021c1e9265ee428f957c78a5583962a31064c"]}, @typed={0x5, 0x71, 0x0, 0x0, @str='\x00'}]}, 0x504}, {&(0x7f0000000300)={0x30, 0x2e, 0x300, 0x70bd2b, 0x25dfdbfd, "", [@generic="13b428c93982", @nested={0x18, 0x5e, 0x0, 0x1, [@typed={0x8, 0xf, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x4, 0x8c}, @typed={0x8, 0x76, 0x0, 0x0, @ipv4=@local}]}]}, 0x30}, {&(0x7f00000037c0)={0x3f8, 0x20, 0x300, 0x70bd28, 0x25dfdbfe, "", [@generic="1d78d061745fdd31db810c11e5d0498319bb8a82bf0b0de26698aae2ea40a7dc34d978b00cc30bc05539f471d54b82064d9ac53350bc19cd", @nested={0xdf, 0x58, 0x0, 0x1, [@generic="4ecc54ef5a694937a945af7018a98b6dd73dc9365054d894ffa1dfa492dcf66e81b7994dc3d56b9f665c7e1dccabcf5366c3fca2ae8008e200bd298ec6c8ad7fe05fe812f7e469a3813078389a309e0d3b509d771ef79620322d38d2bcf39c3dc69d8293807441f7a07b1f43bcd81955c9f367e10eeed58053dd93d330fc7f4feef7dc73825f0d5412a76deeda5551ee2a682c4698de6d94722441162597673e74c8a01f7224addef9452eb0ce409244e4270b448a7565fab536901410b18e677eca2622e073fd0901615a4ec92aae77ee0df1ef82417305136864"]}, @nested={0x1c, 0x4c, 0x0, 0x1, [@typed={0x8, 0x2a, 0x0, 0x0, @ipv4=@broadcast}, @typed={0x8, 0x30, 0x0, 0x0, @pid=r14}, @typed={0x8, 0x4a, 0x0, 0x0, @ipv4=@local}, @generic]}, @nested={0xeb, 0x80, 0x0, 0x1, [@generic="f54dfca89d6b7fe40cb856ea5d03478300fc3ac9bc82258a2d1cc68451cde6e719b27e43bdb9c1e1dd8f895788eb70a59a099a538c1e618885e7c0f15823861befe2017b5585867b99f765a755db39b921be132e8342d89db3445843caf755d297e03c2666d18d7f3dc0b27adb56dd0160840c1817ff46da23dc1e0926800e2c06948e8cf49dda5e9692633ba7d3966ac988daa26a7a68758d59c213ddf794d80af73b4aee92d569032e5739d8e6c729e79d2801f439973ff0f99a4a3bf43150b3df613328ac4e4f523c69c1f27faa242adf18a4be7fc57a650392cf86e78f76f6fa5ffd3fe8a5"]}, @generic="b15d2fd5e48bb28f24e5d4ebdc87fa11f4302050ddc04afe29de5d27cd1958d9f0dbd97a845faeb47c40fac266248c0039694f1cba54291d1158b22732c4e363dab55c90b18679ce63e18729ac7367d1de1bbf8dc86392b577ab463f142735741d7e89916053e4e75e086f52b12a874f042e6eadc1687bede243c5279607305fe805e89bef9bb085ee4063ca7e70a85ca9251512cf47ef40c0ecdaab36b89a8bd9f0987f481df96ec6d78036e2d837d2fee435f873e64bb579ea80dfca30140b8d511718167e260575389b87d9548b3df16be8e8ba708a", @nested={0xda, 0x68, 0x0, 0x1, [@generic="e50b2fe7285cf277af741dee2978e83396fe9b71c3d93b361ae8cd0c5a955d80752f6b4b968da402387f8953081f159fc08c31df149cdc8ceb", @typed={0xc, 0x3f, 0x0, 0x0, @u64=0x9}, @typed={0xc, 0x53, 0x0, 0x0, @u64=0x4}, @typed={0x8, 0x36, 0x0, 0x0, @uid=r15}, @typed={0x4, 0x83}, @generic="f785a10b90aa4fdbc90473d78d09f14f67431427a99c878b97872e6ae78b24fd136d70e2ee1a59fd45d01e9a1a32596946d01ef254d6f893cd4fc01fad23d30ea14871c16b2711bd12f4e07a80c3737ef54170779b8a2e120cb705f40ca2698e8e179e", @generic="fa0b605fe8f8553ce5f892f4755b", @typed={0x8, 0x42, 0x0, 0x0, @ipv4=@multicast2}]}, @typed={0x14, 0x81, 0x0, 0x0, @ipv6=@remote}]}, 0x3f8}, {&(0x7f0000003c00)={0xec, 0x33, 0x2, 0x70bd2c, 0x25dfdbfe, "", [@typed={0x8, 0x56, 0x0, 0x0, @pid=r17}, @generic="36f906b84f7f5313337e30c2483b4f14e6760a70608f2352e6971a6870b6c6d8c17812cbd55d69b65cbe7eb147ec59661241116d6b4aa705912c2a1ec0c12386a022a19c05aecb460942d90851d31f2ea596105526ab91a6775b71866cec7cafda3255c76900d7db7e684c7c83897a5ab973948e6f17502854957530551be1d62450896807ce33a0972fe43c742adda6918475fe0f3b48b1cbe015916fe62ed0e033df550bed1d2156321f4fa809423ade669030b6825dfcb66b2c72c454df75a3adcce374077a1ecb3027b196eb3a72c6f1"]}, 0xec}, {&(0x7f0000003d00)={0xec, 0x1ff, 0x0, 0x70bd25, 0x25dfdbff, "", [@typed={0xda, 0x4f, 0x0, 0x0, @binary="8782512bfd4b4d17089f06ebecd00e1d4c93c79cd760bce590430a544c19d925f7b80088e1d2bf19bbdf1c3c52659f19cacd51226c88d4a431c3bc68660c6d987918dee2a5cb49e6a25b6963420386ef4a9e530214657fa96f67bac88116ca25c7341df0922d6ec0e38bd7ceb2086900c1534b42f4e099d5bacd529cefe3c981130a3bde2dc1301d15004b0a47f71a8078cee87a90753b07abef7de8bc7a95c60d4021660db0eaa7d810a60c1cc9117bf645118a070c0bfd42030eb698fe9c4c191e395f5cd42d5d95a2f8f41c7b0b3f2c5958c8bdc5"}]}, 0xec}], 0xa, &(0x7f00000041c0)=[@cred={{0x1c, 0x1, 0x2, {r23, r24, r25}}}, @rights={{0x1c, 0x1, 0x1, [r26, 0xffffffffffffffff, r0]}}, @rights={{0x2c, 0x1, 0x1, [r27, r0, r28, r29, r30, r31, r32]}}, @cred={{0x1c, 0x1, 0x2, {r33, r35, r36}}}], 0x90, 0x20000000}, 0x4000004) [ 1719.111319][T10650] BPF:Invalid string section 20:47:12 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) 20:47:12 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="00000000000000000000efffffff000051000000"]) 20:47:12 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [], 0x8}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1719.371105][T10661] BPF:Invalid string section 20:47:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) [ 1720.143223][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1720.159346][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1720.180324][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1720.200177][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1720.220704][ T8086] device bridge_slave_1 left promiscuous mode [ 1720.239740][ T8086] bridge0: port 2(bridge_slave_1) entered disabled state [ 1720.300307][ T8086] device bridge_slave_0 left promiscuous mode [ 1720.312475][ T8086] bridge0: port 1(bridge_slave_0) entered disabled state [ 1720.380652][ T8086] device veth1_macvtap left promiscuous mode [ 1720.389453][ T8086] device veth0_macvtap left promiscuous mode [ 1720.395586][ T8086] device veth1_vlan left promiscuous mode [ 1720.401774][ T8086] device veth0_vlan left promiscuous mode [ 1722.076730][ T8086] device hsr_slave_0 left promiscuous mode [ 1722.116415][ T8086] device hsr_slave_1 left promiscuous mode [ 1722.173877][ T8086] team0 (unregistering): Port device team_slave_1 removed [ 1722.184452][ T8086] team0 (unregistering): Port device team_slave_0 removed [ 1722.198478][ T8086] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1722.260598][ T8086] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1722.351671][ T8086] bond0 (unregistering): Released all slaves [ 1722.444556][T10668] IPVS: ftp: loaded support on port[0] = 21 [ 1722.589753][T10668] chnl_net:caif_netlink_parms(): no params data found [ 1722.676437][T10668] bridge0: port 1(bridge_slave_0) entered blocking state [ 1722.683546][T10668] bridge0: port 1(bridge_slave_0) entered disabled state [ 1722.709827][T10668] device bridge_slave_0 entered promiscuous mode [ 1722.718079][T10668] bridge0: port 2(bridge_slave_1) entered blocking state [ 1722.725172][T10668] bridge0: port 2(bridge_slave_1) entered disabled state [ 1722.747283][T10668] device bridge_slave_1 entered promiscuous mode [ 1722.779146][T10668] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1722.811173][T10668] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1722.855638][T10668] team0: Port device team_slave_0 added [ 1722.877161][T10668] team0: Port device team_slave_1 added [ 1722.921197][T10668] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1722.936362][T10668] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1722.986313][T10668] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1723.007400][T10668] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1723.014471][T10668] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1723.076374][T10668] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1723.158625][T10668] device hsr_slave_0 entered promiscuous mode [ 1723.196688][T10668] device hsr_slave_1 entered promiscuous mode [ 1723.339988][T10668] bridge0: port 2(bridge_slave_1) entered blocking state [ 1723.347116][T10668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1723.354437][T10668] bridge0: port 1(bridge_slave_0) entered blocking state [ 1723.361597][T10668] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1723.410162][T10668] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1723.423981][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1723.437031][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1723.445285][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1723.462874][T10668] 8021q: adding VLAN 0 to HW filter on device team0 [ 1723.480823][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1723.493546][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1723.503681][T30608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1723.510797][T30608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1723.541799][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1723.553254][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1723.564715][ T8063] bridge0: port 2(bridge_slave_1) entered blocking state [ 1723.571915][ T8063] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1723.584974][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1723.594141][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1723.607214][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1723.616115][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1723.632200][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1723.643667][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1723.654639][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1723.665486][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1723.675908][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1723.688277][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1723.700642][T10668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1723.711010][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1723.734451][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1723.744214][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1723.755743][T10668] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1723.816577][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1723.825514][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1723.845656][T10668] device veth0_vlan entered promiscuous mode [ 1723.853380][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1723.862362][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1723.874347][T10668] device veth1_vlan entered promiscuous mode [ 1723.881898][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1723.890506][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1723.898625][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1723.917296][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1723.925661][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1723.934924][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1723.945525][T10668] device veth0_macvtap entered promiscuous mode [ 1723.956906][T10668] device veth1_macvtap entered promiscuous mode [ 1723.971529][T10668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1723.983194][T10668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1723.993120][T10668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1724.003840][T10668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1724.013804][T10668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1724.024383][T10668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1724.034360][T10668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1724.044924][T10668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1724.055100][T10668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1724.066073][T10668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1724.078002][T10668] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1724.086348][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1724.094867][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1724.104109][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1724.113526][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1724.124169][T10668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1724.139062][T10668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1724.150599][T10668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1724.163718][T10668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1724.175063][T10668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1724.190811][T10668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1724.201078][T10668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1724.214665][T10668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1724.224986][T10668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1724.238960][T10668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1724.250928][T10668] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1724.263343][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1724.273171][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 20:47:18 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:18 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) 20:47:18 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:18 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [], 0x1c}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) 20:47:18 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1724.358031][T10677] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:47:18 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4, 0x103000) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{0xffffffffffffffff, 0x0, 0x0, 0xfffff000}, {r1}]}) [ 1724.511526][T10689] BPF:Invalid string section 20:47:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) 20:47:18 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f00000000c0)={0x980000, 0x40, 0xfffff332, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0xa0099c, 0x1, [], @p_u8=&(0x7f0000000040)}}) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000100)={0x5, 0xc964, 0x4, 0x6}, 0x10) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, &(0x7f00000003c0)=""/4096) 20:47:18 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [], 0x1e}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:18 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x940f000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1724.800118][T10705] BPF:Invalid string section 20:47:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) 20:47:18 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:18 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [], 0x48}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:18 executing program 4: ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000040)=0x8e) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x4e20, @loopback}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f000031aff8)={r1, r2}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000100)=0x54) 20:47:18 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1725.015505][T10714] BPF:Invalid string section 20:47:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0xa}, 0x1c) [ 1725.036430][ T8086] tipc: TX() has been purged, node left! [ 1725.163383][T10718] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 20:47:19 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43a3ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:19 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xf5ffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:19 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [], 0x4c}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0xb}, 0x1c) 20:47:19 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x2, [{0xffffffffffffffff, 0x0, 0x0, 0x1000}, {}]}) [ 1725.558631][T10728] BPF:Invalid string section 20:47:19 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [], 0x60}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:19 executing program 4: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000080)={0xbe5, 0x0, 0x4, 0x8, 0x5, {0x77359400}, {0x3, 0x2, 0x34, 0x9, 0x81, 0x20, "7fc0b08b"}, 0x1, 0x1, @planes=&(0x7f0000000040)={0x9026, 0x1f82, @mem_offset=0x9, 0x3}, 0x5, 0x0, r1}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r3, &(0x7f0000000380)='syz0\x00', 0x1ff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r4, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$UDMABUF_CREATE_LIST(r3, 0x40087543, &(0x7f0000000340)={0x0, 0xaaaaaaaaaaaa78b, [{r4, 0x0, 0x0, 0x4000}, {r2}]}) 20:47:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0xc}, 0x1c) 20:47:19 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:19 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r1 = getpid() tkill(r1, 0x9) sched_getparam(r1, &(0x7f0000000040)) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f00000000c0)=0x1) [ 1725.837791][T10743] BPF:Invalid string section [ 1726.564017][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1726.587654][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1726.601173][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1726.619027][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1726.640892][ T8086] device bridge_slave_1 left promiscuous mode [ 1726.659528][ T8086] bridge0: port 2(bridge_slave_1) entered disabled state [ 1726.730059][ T8086] device bridge_slave_0 left promiscuous mode [ 1726.752072][ T8086] bridge0: port 1(bridge_slave_0) entered disabled state [ 1726.810964][ T8086] device veth1_macvtap left promiscuous mode [ 1726.827641][ T8086] device veth0_macvtap left promiscuous mode [ 1726.833721][ T8086] device veth1_vlan left promiscuous mode [ 1726.859862][ T8086] device veth0_vlan left promiscuous mode [ 1728.776791][ T8086] device hsr_slave_0 left promiscuous mode [ 1728.826483][ T8086] device hsr_slave_1 left promiscuous mode [ 1728.883892][ T8086] team0 (unregistering): Port device team_slave_1 removed [ 1728.896934][ T8086] team0 (unregistering): Port device team_slave_0 removed [ 1728.913442][ T8086] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1728.973439][ T8086] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1729.062719][ T8086] bond0 (unregistering): Released all slaves [ 1729.174864][T10753] IPVS: ftp: loaded support on port[0] = 21 [ 1729.309314][T10753] chnl_net:caif_netlink_parms(): no params data found [ 1729.390985][T10753] bridge0: port 1(bridge_slave_0) entered blocking state [ 1729.406447][T10753] bridge0: port 1(bridge_slave_0) entered disabled state [ 1729.416636][T10753] device bridge_slave_0 entered promiscuous mode [ 1729.439993][T10753] bridge0: port 2(bridge_slave_1) entered blocking state [ 1729.459001][T10753] bridge0: port 2(bridge_slave_1) entered disabled state [ 1729.479231][T10753] device bridge_slave_1 entered promiscuous mode [ 1729.521312][T10753] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1729.558093][T10753] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1729.596947][T10753] team0: Port device team_slave_0 added [ 1729.604150][T10753] team0: Port device team_slave_1 added [ 1729.637472][T10753] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1729.644609][T10753] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1729.706286][T10753] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1729.727744][T10753] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1729.734711][T10753] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1729.760679][T10753] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1729.838630][T10753] device hsr_slave_0 entered promiscuous mode [ 1729.876533][T10753] device hsr_slave_1 entered promiscuous mode [ 1730.002582][T10753] bridge0: port 2(bridge_slave_1) entered blocking state [ 1730.009730][T10753] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1730.016995][T10753] bridge0: port 1(bridge_slave_0) entered blocking state [ 1730.024104][T10753] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1730.086430][T10753] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1730.101956][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1730.117361][ T8683] bridge0: port 1(bridge_slave_0) entered disabled state [ 1730.136498][ T8683] bridge0: port 2(bridge_slave_1) entered disabled state [ 1730.159032][T10753] 8021q: adding VLAN 0 to HW filter on device team0 [ 1730.171178][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1730.179771][ T8683] bridge0: port 1(bridge_slave_0) entered blocking state [ 1730.186949][ T8683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1730.207796][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1730.217180][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1730.225622][T10494] bridge0: port 2(bridge_slave_1) entered blocking state [ 1730.232706][T10494] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1730.241896][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1730.251217][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1730.260623][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1730.269724][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1730.278946][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1730.287975][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1730.296981][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1730.305457][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1730.317898][T10753] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1730.329433][T10753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1730.337589][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1730.345748][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1730.354957][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1730.373308][T10753] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1730.382034][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1730.390086][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1730.470715][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1730.479677][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1730.492662][T10753] device veth0_vlan entered promiscuous mode [ 1730.500447][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1730.509334][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1730.521672][T10753] device veth1_vlan entered promiscuous mode [ 1730.529537][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1730.537598][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1730.545360][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1730.564770][T10753] device veth0_macvtap entered promiscuous mode [ 1730.573423][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1730.582574][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1730.591498][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1730.602391][T10753] device veth1_macvtap entered promiscuous mode [ 1730.610138][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1730.618653][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1730.632422][T10753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1730.643108][T10753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1730.653585][T10753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1730.664461][T10753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1730.674644][T10753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1730.685458][T10753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1730.695743][T10753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1730.706593][T10753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1730.716713][T10753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1730.727413][T10753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1730.739063][T10753] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1730.748325][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1730.757718][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1730.768214][T10753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1730.779535][T10753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1730.790157][T10753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1730.801062][T10753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1730.811655][T10753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1730.822529][T10753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1730.832994][T10753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1730.843787][T10753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1730.854173][T10753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1730.865002][T10753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1730.877158][T10753] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1730.885296][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1730.894732][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1731.047337][T10763] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1731.115211][T10762] fuse: Bad value for 'fd' 20:47:24 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0xd}, 0x1c) 20:47:24 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [], 0x68}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:24 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43602c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:24 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xf9fdffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:24 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x3, 0x7, [0x7, 0x1, 0x7, 0x3, 0x20, 0x0, 0x4]}, &(0x7f0000000100)=0x16) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r1, 0x4, 0x30}, 0xc) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000480)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x80, r3, 0x0, 0x70bd28, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:cgroup_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8}]}, 0x80}, 0x1, 0x0, 0x0, 0x792b1d17588cbf5b}, 0x4004) sendmsg$NLBL_UNLABEL_C_LIST(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x70, r3, 0x2, 0x70bd27, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:system_map_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0xf8}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'xfrm0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x70}, 0x1, 0x0, 0x0, 0x80}, 0x20040004) r4 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x8000}, &(0x7f00000001c0)=0x20) ioctl$UDMABUF_CREATE_LIST(r4, 0x40087543, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000029b4b095dcf21700a7a1bf", @ANYRES32, @ANYBLOB='\x00'/20]) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r5, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$PPPIOCGDEBUG(r5, 0x80047441, &(0x7f00000003c0)) 20:47:24 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RCLUNK(r1, &(0x7f0000000080)={0x7, 0x79, 0x1}, 0x7) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00\x00?\x00'/20]) prctl$PR_GET_SECCOMP(0x15) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x400, 0x0) ioctl$TIOCGPKT(r2, 0x80045438, &(0x7f0000000100)) [ 1731.240868][T10775] BPF:Invalid string section 20:47:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0xf}, 0x1c) 20:47:25 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [], 0x6c}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1731.293922][T10781] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1731.371559][T10785] fuse: Bad value for 'fd' 20:47:25 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfbffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1731.429076][T10790] BPF:Invalid string section 20:47:25 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x10}, 0x1c) 20:47:25 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [], 0x74}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:25 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000100)=""/45) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x28000) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x730491cdb207fc52}]}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x80000, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000080)) [ 1731.615806][T10801] BPF:Invalid string section [ 1731.646489][T10804] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:47:25 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43603c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:25 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [], 0x7a}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x11}, 0x1c) 20:47:25 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="007433726e1b5e4a", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/20]) [ 1731.805130][T10804] fuse: Bad value for 'fd' [ 1731.872232][T10817] BPF:Invalid string section 20:47:25 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfcfdffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:25 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [], 0xf8}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:25 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x12}, 0x1c) 20:47:25 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) r2 = getpid() tkill(r2, 0x9) sendmsg$nl_netfilter(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000380)={0x11f0, 0x3, 0x9, 0x5, 0x70bd25, 0x25dfdbfc, {0x8}, [@typed={0x8, 0x4f, 0x0, 0x0, @ipv4=@multicast1}, @generic="8cc2b5036d92b1d302d80647bb3df94c3daf99698d5c14261264599baf265ac4f3c3923b31bb3f1d77c136b516334dab763bbb91beb9669eb08503ba75961b442ad4a7b5e1a0c8", @typed={0x11, 0x7a, 0x0, 0x0, @str='/dev/udmabuf\x00'}, @nested={0x1169, 0x41, 0x0, 0x1, [@generic="8a1a9ec406411fde8acd7c59c1", @typed={0x8, 0x36, 0x0, 0x0, @u32=0x101}, @generic="5294c6db7e08b182ce0aa18f47ce8df514940a7873cd057290d5a38785e7f186a8eb9b1cb9c2e8b21ab235a91f77210efbd331e638e93a93ed1f2381babd930d14ad88b891f2a0441274a8f56ecd4751db1fdeac439d1daa7490511cf9b0b013ef8cec1ea0944eba550de490c9007d63f8125bfb70d578baafbc3c70b1559d6caab5de05b88972cc9f8377e4be22a33c04f36e26e200bd77e8b5e10a7f4b7b39436e68623736fb369cb193502ceca0bda2b0289b598999b85d21e792dc5edbecec03632fe6609850c23e70608d5675b789", @typed={0x4, 0x25}, @generic="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", @typed={0x4, 0x8b}, @typed={0x14, 0x36, 0x0, 0x0, @ipv6=@loopback}, @typed={0x4, 0x15}, @generic="b3adbb7c3e82b02499296b157b2dcc27aca1404c206a27c74ea70cf493310ebaeef3a0be23c354e327e27bb055bcffe89ae3af7c19c92860e53ceac60624ba584949e947b9617eb7bcf93e01357dd75c5f66ee64d9244ce65535049a66db11"]}, @nested={0xc, 0x89, 0x0, 0x1, [@typed={0x8, 0x12, 0x0, 0x0, @pid=r2}]}]}, 0x11f0}}, 0x80) [ 1732.077540][T10826] BPF:Invalid string section 20:47:25 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43604c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:25 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x7, 0xf9, 0x8}, 0x20) [ 1732.145483][T10834] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:47:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x14}, 0x1c) [ 1732.262216][T10840] BPF:hdr_len not found 20:47:26 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000080)) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000040)) 20:47:26 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:26 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0xa, 0xf9, 0x8}, 0x20) 20:47:26 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x17}, 0x1c) [ 1732.464485][T10853] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1732.489114][T10856] BPF:btf_header not found 20:47:26 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000000000004", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/20]) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x0, 0xfeff, 0x7, 0x1, 0x9, 0xf702}) 20:47:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x18}, 0x1c) 20:47:26 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43605c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:26 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x18, 0xf9, 0x8}, 0x20) 20:47:26 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:26 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xff00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:26 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) fchmod(r1, 0x44) [ 1732.792356][T10875] BPF:No data 20:47:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1a}, 0x1c) [ 1732.827344][T10877] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:47:26 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x23, 0xf9, 0x8}, 0x20) 20:47:26 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$cgroup(r1, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) [ 1732.965510][T10887] BPF:Total section length too long 20:47:26 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43606c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:26 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:26 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x2b, 0xf9, 0x8}, 0x20) 20:47:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1c}, 0x1c) 20:47:26 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)=ANY=[@ANYBLOB="06000000000000001326ca35a89df4afb4b9e45240371e0d6142491dfd5fadc0bd4a9fd74800d67883501d77d55eb86f54f68e21840bfbe23930a3bcee5dbe50cf91bc903cb32432c23862ed03c66fd9396e749519104b5e4f40b2608d1190a879fcbfd8416ac0f284d241a8319b61ee7deb10d8fc9f16f165774a", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/20]) 20:47:26 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1733.208727][T10902] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1733.227869][T10903] BPF:Total section length too long 20:47:27 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x2d, 0xf9, 0x8}, 0x20) 20:47:27 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:27 executing program 4: pipe2$9p(&(0x7f0000000040), 0x80800) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) 20:47:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1e}, 0x1c) [ 1733.485870][T10919] BPF:Total section length too long 20:47:27 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x30, 0xf9, 0x8}, 0x20) 20:47:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x22}, 0x1c) [ 1733.675223][T10929] BPF:Total section length too long 20:47:27 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43607c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:27 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)=ANY=[@ANYBLOB="20480c505c000000d82b71e9d8d1def9", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYRES64]) r1 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) r2 = socket(0x25, 0x5, 0x0) sendmsg$kcm(r2, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0xc1) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000000)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r4, 0x6, 0xb, &(0x7f00000003c0)=""/184, &(0x7f0000000480)=0xb8) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r4, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c) getpid() ptrace(0xffffffffffffffff, 0x0) getpgid(0x0) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000002c0)='#', 0x1, 0x40001, &(0x7f0000000240)={0xa, 0x4e22, 0x6, @loopback, 0x3}, 0x1c) poll(&(0x7f0000000040)=[{r4}], 0x1, 0xef) close(r4) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r5, &(0x7f0000000380)='syz0\x00', 0x1ff) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x63, &(0x7f0000000080)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 20:47:27 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x3e, 0xf9, 0x8}, 0x20) 20:47:27 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x24}, 0x1c) [ 1733.844629][T10936] BPF:Unsupported section found 20:47:27 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xffefffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:27 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1733.926594][ T8086] tipc: TX() has been purged, node left! 20:47:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x26}, 0x1c) 20:47:27 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x1000000, 0xf9, 0x8}, 0x20) 20:47:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x27}, 0x1c) 20:47:28 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43608c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x28}, 0x1c) 20:47:28 executing program 4: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x1ff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000040)={0x0, 0x2, [{r1}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}]}) 20:47:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x29}, 0x1c) 20:47:28 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) syslog(0x4, &(0x7f0000000040)=""/191, 0xbf) 20:47:28 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x20000236, 0xf9, 0x8}, 0x20) 20:47:28 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:28 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x2}, 0x20) [ 1735.259467][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1735.286352][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1735.317591][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1735.325093][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1735.347230][ T8086] device bridge_slave_1 left promiscuous mode [ 1735.353517][ T8086] bridge0: port 2(bridge_slave_1) entered disabled state [ 1735.420175][ T8086] device bridge_slave_0 left promiscuous mode [ 1735.439898][ T8086] bridge0: port 1(bridge_slave_0) entered disabled state [ 1735.521134][ T8086] device veth1_macvtap left promiscuous mode [ 1735.536591][ T8086] device veth0_macvtap left promiscuous mode [ 1735.542783][ T8086] device veth1_vlan left promiscuous mode [ 1735.569508][ T8086] device veth0_vlan left promiscuous mode [ 1737.786968][ T8086] device hsr_slave_0 left promiscuous mode [ 1737.826363][ T8086] device hsr_slave_1 left promiscuous mode [ 1737.884012][ T8086] team0 (unregistering): Port device team_slave_1 removed [ 1737.895492][ T8086] team0 (unregistering): Port device team_slave_0 removed [ 1737.910600][ T8086] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1737.970630][ T8086] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1738.064162][ T8086] bond0 (unregistering): Released all slaves [ 1738.164864][T10990] IPVS: ftp: loaded support on port[0] = 21 [ 1738.337570][T10990] chnl_net:caif_netlink_parms(): no params data found [ 1738.415376][T10990] bridge0: port 1(bridge_slave_0) entered blocking state [ 1738.436344][T10990] bridge0: port 1(bridge_slave_0) entered disabled state [ 1738.466414][T10990] device bridge_slave_0 entered promiscuous mode [ 1738.474307][T10990] bridge0: port 2(bridge_slave_1) entered blocking state [ 1738.494315][T10990] bridge0: port 2(bridge_slave_1) entered disabled state [ 1738.502939][T10990] device bridge_slave_1 entered promiscuous mode [ 1738.550247][T10990] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1738.568295][T10990] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1738.608092][T10990] team0: Port device team_slave_0 added [ 1738.614882][T10990] team0: Port device team_slave_1 added [ 1738.658178][T10990] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1738.665234][T10990] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1738.726283][T10990] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1738.747476][T10990] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1738.754486][T10990] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1738.816287][T10990] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1738.901607][T10990] device hsr_slave_0 entered promiscuous mode [ 1738.956640][T10990] device hsr_slave_1 entered promiscuous mode [ 1739.086076][T10990] bridge0: port 2(bridge_slave_1) entered blocking state [ 1739.093202][T10990] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1739.100521][T10990] bridge0: port 1(bridge_slave_0) entered blocking state [ 1739.107598][T10990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1739.161380][T10990] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1739.191080][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1739.199925][T10494] bridge0: port 1(bridge_slave_0) entered disabled state [ 1739.211675][T10494] bridge0: port 2(bridge_slave_1) entered disabled state [ 1739.225783][T10990] 8021q: adding VLAN 0 to HW filter on device team0 [ 1739.242319][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1739.252865][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1739.264105][T10494] bridge0: port 1(bridge_slave_0) entered blocking state [ 1739.271271][T10494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1739.291679][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1739.303252][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1739.313051][ T8683] bridge0: port 2(bridge_slave_1) entered blocking state [ 1739.320173][ T8683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1739.332109][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1739.341402][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1739.363867][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1739.375899][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1739.385204][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1739.398231][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1739.407188][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1739.415836][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1739.427294][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1739.436087][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1739.449684][T10990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1739.458153][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1739.477859][T10990] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1739.487054][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1739.494591][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1739.559815][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1739.571348][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1739.590184][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1739.602314][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1739.612928][T10990] device veth0_vlan entered promiscuous mode [ 1739.624194][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1739.632709][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1739.647439][T10990] device veth1_vlan entered promiscuous mode [ 1739.668374][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1739.680414][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1739.688588][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1739.700782][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1739.711171][T10990] device veth0_macvtap entered promiscuous mode [ 1739.724739][T10990] device veth1_macvtap entered promiscuous mode [ 1739.748921][T10990] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1739.769384][T10990] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1739.779537][T10990] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1739.794252][T10990] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1739.804354][T10990] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1739.818045][T10990] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1739.829162][T10990] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1739.842272][T10990] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1739.853192][T10990] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1739.867690][T10990] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1739.881148][T10990] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1739.891476][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1739.902325][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1739.912075][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1739.923161][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1739.934886][T10990] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1739.949583][T10990] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1739.960407][T10990] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1739.973788][T10990] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1739.984533][T10990] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1739.998173][T10990] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1740.009559][T10990] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1740.022543][T10990] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1740.033876][T10990] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1740.046890][T10990] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1740.060877][T10990] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1740.071209][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1740.083549][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1740.223111][T11000] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:47:34 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2a}, 0x1c) 20:47:34 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x4}, 0x20) 20:47:34 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43609c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:34 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xffffffffffff0700, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:34 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0xfe) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0xc4000, 0x0) accept4$tipc(r2, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10, 0x80000) r3 = inotify_init() r4 = inotify_add_watch(r3, &(0x7f0000000000)='.\x00', 0x80000000) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x2001, 0x0) ioctl$PPPIOCGMRU(r5, 0x80047453, &(0x7f0000000100)) inotify_rm_watch(r1, r4) inotify_rm_watch(0xffffffffffffffff, r4) syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) 20:47:34 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x10}, 0x20) 20:47:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2c}, 0x1c) 20:47:34 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000092e4", @ANYRES32, @ANYBLOB='\x00'/20]) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000080)="88c7c960ad1a5c396660b599a9f4e8f0a864e5f3594d872e193202146f0576f46a9acd09c76d4044721c596194fe9d6ffa303d1b18898f41097eb9f5ac6f2b9d0aab470fd644ccf2e3c6bbc5ac364833cdd325f0c0569e25f91ba8e989b64226501b891f966a936dbf2bc33fd3788e2539097a2aa52deb1f01a349eb14c4b129cb0669d288392f4166953c0d6732b82bdc014caf84a768f4d8b822e0648ad74c32bb0d4e", 0xa4) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) 20:47:34 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x2f}, 0x20) 20:47:34 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xffffffffffffff7f, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2e}, 0x1c) 20:47:34 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:34 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000009a97a02e24a235eed05296354b561331b1669a936239c602cdef032aa73c559dcc30935f436f5786955ce6c5324bc0b1a07bc62e48b7f3c14ba49b0416ce64fc1f1250fec5ef9d7b003f017205e4d1bc35e852609aa90bb44a11497debf19ae79788df9b9241858b44f12ef9ad8be4d8df71d251a1c41e684f0cbb63c51ad0a6e7f73d3877f3e5cee94026f9630f5a8971fd60862f05bef611db53949f027e12c4387f81d9919cf7f1230926c9d6040ae3e1"]) 20:47:34 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x3e}, 0x20) 20:47:34 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4360ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2f}, 0x1c) 20:47:34 executing program 1: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1740.836290][ T8086] tipc: TX() has been purged, node left! 20:47:34 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x101200, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="000000010000000000b32c00000000", @ANYRES32=r1, @ANYBLOB="0000000000800000000000000040010100000000"]) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) write$sndseq(r2, &(0x7f00000000c0)=[{0x0, 0x1f, 0x1c, 0x0, @tick=0x5, {0x7, 0x7}, {0x3, 0x4d}, @queue={0x6, {0x8, 0x200}}}, {0x40, 0x42, 0xf9, 0x6, @tick=0x800, {0x9, 0xfe}, {0xe1, 0x20}, @result={0xccb, 0x1}}], 0x38) 20:47:34 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0xa) 20:47:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x30}, 0x1c) 20:47:34 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:34 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x25) 20:47:35 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4360bc0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x32}, 0x1c) [ 1741.390120][T11061] BPF:[1] Invalid name_offset:4294967293 20:47:35 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x2f) 20:47:35 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x33}, 0x1c) 20:47:35 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000080)={r4}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)={r4, 0x3}, &(0x7f0000000080)=0x8) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) [ 1741.700198][T11073] BPF:[1] Invalid name_offset:4294967293 [ 1742.283183][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1742.306964][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1742.320414][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1742.338913][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1742.366696][ T8086] device bridge_slave_1 left promiscuous mode [ 1742.373001][ T8086] bridge0: port 2(bridge_slave_1) entered disabled state [ 1742.436887][ T8086] device bridge_slave_0 left promiscuous mode [ 1742.443188][ T8086] bridge0: port 1(bridge_slave_0) entered disabled state [ 1742.520288][ T8086] device veth1_macvtap left promiscuous mode [ 1742.536583][ T8086] device veth0_macvtap left promiscuous mode [ 1742.542692][ T8086] device veth1_vlan left promiscuous mode [ 1742.559766][ T8086] device veth0_vlan left promiscuous mode [ 1744.276764][ T8086] device hsr_slave_0 left promiscuous mode [ 1744.316328][ T8086] device hsr_slave_1 left promiscuous mode [ 1744.376179][ T8086] team0 (unregistering): Port device team_slave_1 removed [ 1744.390204][ T8086] team0 (unregistering): Port device team_slave_0 removed [ 1744.401553][ T8086] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1744.453765][ T8086] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1744.540923][ T8086] bond0 (unregistering): Released all slaves [ 1744.634377][T11086] IPVS: ftp: loaded support on port[0] = 21 [ 1744.795296][T11086] chnl_net:caif_netlink_parms(): no params data found [ 1744.888402][T11086] bridge0: port 1(bridge_slave_0) entered blocking state [ 1744.895538][T11086] bridge0: port 1(bridge_slave_0) entered disabled state [ 1744.909948][T11086] device bridge_slave_0 entered promiscuous mode [ 1744.930773][T11086] bridge0: port 2(bridge_slave_1) entered blocking state [ 1744.949199][T11086] bridge0: port 2(bridge_slave_1) entered disabled state [ 1744.969837][T11086] device bridge_slave_1 entered promiscuous mode [ 1745.011090][T11086] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1745.038372][T11086] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1745.078534][T11086] team0: Port device team_slave_0 added [ 1745.085753][T11086] team0: Port device team_slave_1 added [ 1745.128487][T11086] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1745.135506][T11086] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1745.206262][T11086] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1745.218723][T11086] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1745.225690][T11086] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1745.252027][T11086] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1745.318574][T11086] device hsr_slave_0 entered promiscuous mode [ 1745.356592][T11086] device hsr_slave_1 entered promiscuous mode [ 1745.460593][T11086] bridge0: port 2(bridge_slave_1) entered blocking state [ 1745.467758][T11086] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1745.475108][T11086] bridge0: port 1(bridge_slave_0) entered blocking state [ 1745.482223][T11086] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1745.532444][T11086] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1745.546006][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1745.559881][ T8063] bridge0: port 1(bridge_slave_0) entered disabled state [ 1745.570144][ T8063] bridge0: port 2(bridge_slave_1) entered disabled state [ 1745.587289][T11086] 8021q: adding VLAN 0 to HW filter on device team0 [ 1745.602503][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1745.611507][ T8063] bridge0: port 1(bridge_slave_0) entered blocking state [ 1745.618578][ T8063] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1745.640190][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1745.648990][T30608] bridge0: port 2(bridge_slave_1) entered blocking state [ 1745.656155][T30608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1745.669063][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1745.685291][T11086] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1745.699615][T11086] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1745.712464][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1745.724402][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1745.733888][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1745.747383][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1745.755797][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1745.768312][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1745.779663][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1745.799165][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1745.808447][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1745.815925][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1745.829004][T11086] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1745.901280][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1745.910774][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1745.927623][T11086] device veth0_vlan entered promiscuous mode [ 1745.934901][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1745.947075][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1745.963313][T11086] device veth1_vlan entered promiscuous mode [ 1745.971047][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1745.979543][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1745.987596][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1746.005457][T11086] device veth0_macvtap entered promiscuous mode [ 1746.013808][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1746.022423][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1746.034847][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1746.045608][T11086] device veth1_macvtap entered promiscuous mode [ 1746.057357][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1746.065914][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1746.082177][T11086] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1746.093270][T11086] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1746.103244][T11086] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1746.113702][T11086] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1746.123638][T11086] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1746.134492][T11086] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1746.147925][T11086] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1746.160085][T11086] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1746.171378][T11086] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1746.183807][T11086] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1746.198943][T11086] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1746.210105][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1746.220807][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1746.232910][T11086] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1746.245648][T11086] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1746.259107][T11086] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1746.272166][T11086] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1746.284515][T11086] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1746.295474][T11086] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1746.309142][T11086] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1746.320549][T11086] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1746.332886][T11086] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1746.343904][T11086] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1746.359825][T11086] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1746.368551][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1746.380292][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1746.509586][T11095] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:47:40 executing program 1: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:40 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4360cc0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:40 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="0000000000000000000000200000000010000000cf0b68327441070dd951c199e5b4bcd3c98b4b164bcce89696c747"]) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000140)) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f00000000c0)={0x4, 0x40, 0x80, r0, 0x0, &(0x7f0000000080)={0x9909d7, 0x6, [], @p_u8=&(0x7f0000000040)=0x7f}}) ioctl$USBDEVFS_DISCARDURB(r3, 0x550b, &(0x7f0000000100)) 20:47:40 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x3e) 20:47:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x34}, 0x1c) 20:47:40 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1746.687904][T11103] BPF:[1] Invalid name_offset:4294967293 20:47:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000040)=0x4, 0x2) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) 20:47:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x35}, 0x1c) 20:47:40 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x60) 20:47:40 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1746.960884][T11119] BPF:[1] Invalid name_offset:4294967293 20:47:40 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4360dc0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x36}, 0x1c) 20:47:40 executing program 1: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:40 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) r1 = accept4$x25(r0, &(0x7f0000001e00), &(0x7f0000001e40)=0x12, 0x80000) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f0000001e80)={'nr0\x00', 0x0, 0x100}) r2 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000452a2326f57d0896e132f06cbdd3715ca24463c34a0b7feed870843def66043ab1c1b5417056416c474315339d6869f769b4d4bc34d5bc6e4517372e502d9100"]) 20:47:40 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x78) 20:47:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x37}, 0x1c) [ 1747.187882][T11132] BPF:[1] Invalid name_offset:4294967293 20:47:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:41 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x200001a0) [ 1747.276340][T30874] tipc: TX() has been purged, node left! 20:47:41 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3a}, 0x1c) 20:47:41 executing program 4: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f0000000080)={0x0, 0x5, [{0xffffffffffffffff, 0x0, 0x1f1019000}, {}, {0xffffffffffffffff, 0x0, 0xfffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}, {r0, 0x0, 0xfffffffffffff000, 0xfffff000}]}) 20:47:41 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000100)=0xe8) sendto$packet(r0, &(0x7f0000000080)="a5113ed8161cbdba30c9838bc99b16ee3a4a29450cf7ec5ff797548867258bf7a8b2efd0660b1f7b4399c4607c75581f73cfaf57a1cafa2114c61eac5f871f601d6c6fd4272cca47a4204e263e78318697c9855caa4abe82dac2a64be8d2e96e368a5cf160c1e0b1cecb0d71", 0x6c, 0x43420b1cf910addc, &(0x7f0000000140)={0x11, 0x1, r2, 0x1, 0x20, 0x6, @dev={[], 0x3a}}, 0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000fdffffff0000000401000000f3000000030000000f030000007794b9000023f930fdc39e746aca5270164e"], &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:41 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4360ec0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1747.734502][T11161] BPF:[1] Invalid name_offset:4294967293 20:47:41 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x4e20, @loopback}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f000031aff8)={r1, r2}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x8000, {{0x2, 0x4e20, @multicast2}}}, 0x88) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) 20:47:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3b}, 0x1c) 20:47:41 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3c}, 0x1c) 20:47:41 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4360fc0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1748.859785][T30874] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1748.879396][T30874] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1748.907469][T30874] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1748.914959][T30874] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1748.940797][T30874] device bridge_slave_1 left promiscuous mode [ 1748.966426][T30874] bridge0: port 2(bridge_slave_1) entered disabled state [ 1749.006970][T30874] device bridge_slave_0 left promiscuous mode [ 1749.013222][T30874] bridge0: port 1(bridge_slave_0) entered disabled state [ 1749.104566][T30874] device veth1_macvtap left promiscuous mode [ 1749.114369][T30874] device veth0_macvtap left promiscuous mode [ 1749.124382][T30874] device veth1_vlan left promiscuous mode [ 1749.140101][T30874] device veth0_vlan left promiscuous mode [ 1750.966877][T30874] device hsr_slave_0 left promiscuous mode [ 1751.016343][T30874] device hsr_slave_1 left promiscuous mode [ 1751.069760][T30874] team0 (unregistering): Port device team_slave_1 removed [ 1751.080625][T30874] team0 (unregistering): Port device team_slave_0 removed [ 1751.091609][T30874] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1751.143620][T30874] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1751.239326][T30874] bond0 (unregistering): Released all slaves [ 1751.363698][T11285] IPVS: ftp: loaded support on port[0] = 21 [ 1751.514768][T11285] chnl_net:caif_netlink_parms(): no params data found [ 1751.595991][T11285] bridge0: port 1(bridge_slave_0) entered blocking state [ 1751.619302][T11285] bridge0: port 1(bridge_slave_0) entered disabled state [ 1751.629788][T11285] device bridge_slave_0 entered promiscuous mode [ 1751.647504][T11285] bridge0: port 2(bridge_slave_1) entered blocking state [ 1751.654660][T11285] bridge0: port 2(bridge_slave_1) entered disabled state [ 1751.677025][T11285] device bridge_slave_1 entered promiscuous mode [ 1751.719176][T11285] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1751.732978][T11285] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1751.753691][T11285] team0: Port device team_slave_0 added [ 1751.760771][T11285] team0: Port device team_slave_1 added [ 1751.776495][T11285] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1751.783463][T11285] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1751.810096][T11285] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1751.822031][T11285] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1751.836282][T11285] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1751.886267][T11285] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1751.968614][T11285] device hsr_slave_0 entered promiscuous mode [ 1752.006632][T11285] device hsr_slave_1 entered promiscuous mode [ 1752.128904][T11285] bridge0: port 2(bridge_slave_1) entered blocking state [ 1752.136051][T11285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1752.143343][T11285] bridge0: port 1(bridge_slave_0) entered blocking state [ 1752.150491][T11285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1752.213072][T11285] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1752.238035][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1752.246801][T10494] bridge0: port 1(bridge_slave_0) entered disabled state [ 1752.266725][T10494] bridge0: port 2(bridge_slave_1) entered disabled state [ 1752.287813][T11285] 8021q: adding VLAN 0 to HW filter on device team0 [ 1752.308266][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1752.326719][T30608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1752.333776][T30608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1752.358637][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1752.367181][T30608] bridge0: port 2(bridge_slave_1) entered blocking state [ 1752.374275][T30608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1752.393187][T11285] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1752.407975][T11285] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1752.422594][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1752.432291][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1752.441578][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1752.451195][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1752.460339][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1752.469017][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1752.478588][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1752.487179][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1752.496594][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1752.504692][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1752.536596][T11285] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1752.545128][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1752.570406][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1752.646530][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1752.655331][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1752.686130][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1752.698424][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1752.710695][T11285] device veth0_vlan entered promiscuous mode [ 1752.719636][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1752.730234][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1752.741699][T11285] device veth1_vlan entered promiscuous mode [ 1752.761039][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1752.769539][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1752.778326][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1752.787479][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1752.797590][T11285] device veth0_macvtap entered promiscuous mode [ 1752.810639][T11285] device veth1_macvtap entered promiscuous mode [ 1752.824413][T11285] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1752.840292][T11285] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1752.851114][T11285] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1752.864716][T11285] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1752.874694][T11285] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1752.888306][T11285] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1752.898712][T11285] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1752.912029][T11285] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1752.922943][T11285] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1752.937141][T11285] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1752.950850][T11285] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1752.960677][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1752.972008][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1752.981416][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1752.992474][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1753.004577][T11285] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1753.026253][T11285] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1753.036089][T11285] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1753.046548][T11285] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1753.056434][T11285] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1753.067179][T11285] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1753.077249][T11285] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1753.088011][T11285] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1753.098497][T11285] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1753.109281][T11285] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1753.120815][T11285] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1753.128607][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1753.137833][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1753.268700][T11294] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:47:47 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:47 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x1be) r2 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890c, &(0x7f0000000000)) r3 = dup3(r2, r0, 0x80000) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{r3}, {r1, 0x0, 0x1000000000000}]}) 20:47:47 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x8, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:47 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000140)={0x0, 0xffffffffffffffba, &(0x7f0000000100)={&(0x7f0000000040)={0x3c, r3, 0xc0d58860b4c77945, 0x0, 0x0, {{0x1, 0x0, 0xd31d}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'bridge0\x00'}}}}}, 0x3c}}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r3, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004040}, 0x40000) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0x3ff, 0x9009, 0x8006, 0x8aac, 0x9, 0x6f7, 0x200, 0x8}, &(0x7f0000000080)=0x20) r4 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r4, 0x0, 0x12, &(0x7f0000000000)=""/27) semctl$SEM_STAT(r4, 0x2, 0x12, &(0x7f0000000480)=""/250) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x61]}}, &(0x7f0000000380)=""/249, 0x37, 0xf9, 0x8}, 0x20) 20:47:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3d}, 0x1c) 20:47:47 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43610c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1753.465660][T11307] tipc: Started in network mode 20:47:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3e}, 0x1c) 20:47:47 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1753.497605][T11307] tipc: Own node identity aaaaaaaaaa0c, cluster identity 4711 [ 1753.528757][T11307] tipc: Enabled bearer , priority 0 20:47:47 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xffff, 0x40) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f00000000c0)={0x1, 0x51}, 0x2) openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x4200, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) 20:47:47 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43611c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x78}, 0x1c) 20:47:47 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x1d, 0x2a, 0x16, 0x3, 0x2, 0xfff, 0x5, 0xfb, 0x1}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) sendto$x25(r1, &(0x7f0000000040), 0x0, 0x800, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:47 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1753.840513][T11425] BPF:[1] Invalid name_offset:4294967293 20:47:47 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x246d4fb9fb8874b3, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{r1, 0x0, 0x0, 0x4000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}]}) 20:47:47 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'gre0\x00', {0x2, 0x4e23, @empty}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SOUND_MIXER_READ_RECSRC(r1, 0x80044dff, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000fdffffff0000000401000000f3060000000000000f030000007794b9d087"], &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x300}, 0x1c) 20:47:47 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xb, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:47 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1754.037650][T30874] tipc: TX() has been purged, node left! 20:47:47 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43612c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:48 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/20]) 20:47:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0xff00}, 0x1c) 20:47:48 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x9, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "d3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x2e, 0x61, 0x7f, 0x5f, 0x2e, 0x0, 0x61]}}, &(0x7f0000000040)=""/249, 0x7e, 0xf9, 0x8}, 0x20) 20:47:48 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xf, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1754.648478][ T12] tipc: 32-bit node address hash set to aaaaa600 20:47:48 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43613c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x17) 20:47:48 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x101012000}]}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2e}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {r3, 0x7}}, 0x10) [ 1754.749119][T11658] BPF:Unsupported section found 20:47:48 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x10, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:48 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000fdffffff0000000401000000f3000000000000000f030000007794b9000093db0d92b1072a687ae8069cfc1e5303c32d52d6cdaf79c149830415bd19"], &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1b) [ 1755.120782][T11777] BPF:[1] Invalid name_offset:4294967293 [ 1755.809297][T30874] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1755.816905][T30874] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1755.824988][T30874] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1755.832745][T30874] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1755.841154][T30874] device bridge_slave_1 left promiscuous mode [ 1755.847684][T30874] bridge0: port 2(bridge_slave_1) entered disabled state [ 1755.886942][T30874] device bridge_slave_0 left promiscuous mode [ 1755.893235][T30874] bridge0: port 1(bridge_slave_0) entered disabled state [ 1755.960614][T30874] device veth1_macvtap left promiscuous mode [ 1755.969791][T30874] device veth0_macvtap left promiscuous mode [ 1755.975842][T30874] device veth1_vlan left promiscuous mode [ 1755.981938][T30874] device veth0_vlan left promiscuous mode [ 1757.791249][T30874] device hsr_slave_0 left promiscuous mode [ 1757.846311][T30874] device hsr_slave_1 left promiscuous mode [ 1757.903937][T30874] team0 (unregistering): Port device team_slave_1 removed [ 1757.915153][T30874] team0 (unregistering): Port device team_slave_0 removed [ 1757.930738][T30874] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1757.990791][T30874] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1758.081740][T30874] bond0 (unregistering): Released all slaves [ 1758.184548][T11786] IPVS: ftp: loaded support on port[0] = 21 [ 1758.335777][T11786] chnl_net:caif_netlink_parms(): no params data found [ 1758.421251][T11786] bridge0: port 1(bridge_slave_0) entered blocking state [ 1758.439711][T11786] bridge0: port 1(bridge_slave_0) entered disabled state [ 1758.456363][T11786] device bridge_slave_0 entered promiscuous mode [ 1758.477554][T11786] bridge0: port 2(bridge_slave_1) entered blocking state [ 1758.484735][T11786] bridge0: port 2(bridge_slave_1) entered disabled state [ 1758.507117][T11786] device bridge_slave_1 entered promiscuous mode [ 1758.539164][T11786] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1758.568135][T11786] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1758.608739][T11786] team0: Port device team_slave_0 added [ 1758.615839][T11786] team0: Port device team_slave_1 added [ 1758.657656][T11786] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1758.664763][T11786] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1758.691129][T11786] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1758.703300][T11786] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1758.710611][T11786] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1758.737565][T11786] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1758.791641][T11786] device hsr_slave_0 entered promiscuous mode [ 1758.836802][T11786] device hsr_slave_1 entered promiscuous mode [ 1758.995444][T11786] bridge0: port 2(bridge_slave_1) entered blocking state [ 1759.002559][T11786] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1759.010214][T11786] bridge0: port 1(bridge_slave_0) entered blocking state [ 1759.017295][T11786] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1759.065409][T11786] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1759.084846][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1759.097878][T30608] bridge0: port 1(bridge_slave_0) entered disabled state [ 1759.109284][T30608] bridge0: port 2(bridge_slave_1) entered disabled state [ 1759.123787][T11786] 8021q: adding VLAN 0 to HW filter on device team0 [ 1759.140061][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1759.152393][T30608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1759.159528][T30608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1759.193009][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1759.202375][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1759.209440][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1759.223446][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1759.232501][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1759.250316][T11786] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1759.264886][T11786] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1759.280498][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1759.289481][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1759.302152][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1759.311462][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1759.323731][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1759.344526][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1759.352521][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1759.363682][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1759.373026][T11786] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1759.453299][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1759.462499][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1759.479882][T11786] device veth0_vlan entered promiscuous mode [ 1759.488867][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1759.497853][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1759.510511][T11786] device veth1_vlan entered promiscuous mode [ 1759.518496][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1759.527467][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1759.535536][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1759.555458][T11786] device veth0_macvtap entered promiscuous mode [ 1759.564614][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1759.573189][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1759.581935][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1759.592598][T11786] device veth1_macvtap entered promiscuous mode [ 1759.600659][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1759.609685][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1759.624211][T11786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1759.635113][T11786] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1759.645224][T11786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1759.656027][T11786] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1759.666161][T11786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1759.676808][T11786] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1759.686694][T11786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1759.697363][T11786] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1759.707572][T11786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1759.718221][T11786] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1759.729617][T11786] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1759.738357][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1759.747942][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1759.757960][T11786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1759.769258][T11786] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1759.780241][T11786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1759.791045][T11786] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1759.801259][T11786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1759.812007][T11786] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1759.822079][T11786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1759.832997][T11786] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1759.843388][T11786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1759.854377][T11786] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1759.866582][T11786] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1759.874688][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1759.884107][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1760.048888][T11795] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:47:53 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:53 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43614c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:53 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x0, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x30, 0x2e]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:53 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x800, 0x70bd29, 0x25dfdbfb}, 0x14}}, 0x4800) r2 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="0000ff0f0000d800", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/20]) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='wchan\x00') preadv(r3, &(0x7f0000001300)=[{&(0x7f0000000180)=""/68, 0x44}], 0x1, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x8, 0xc}]}, 0x1c}, 0x1, 0xfdffffff00000000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f00000000c0)={0x0, 0x55, &(0x7f0000000080)={&(0x7f0000000040)={0xfffffd47, r6, 0x560f36c1cd2edf17, 0x70bd28}, 0x14}}, 0x4000) sendmsg$L2TP_CMD_SESSION_CREATE(r4, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x12000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=r6, @ANYBLOB="000329bd7000ffdbdf250500000008001d00000000000c000f000100000000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10004102}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x24, r6, 0x715b86aa951f8e84, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r6, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r7, 0x84, 0x1c, &(0x7f0000000080), &(0x7f0000000180)=0x4) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r8, &(0x7f0000000380)='syz0\x00', 0x1ff) epoll_create(0x99) read$usbfs(r8, &(0x7f00000001c0)=""/133, 0x85) 20:47:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x2000001c) 20:47:53 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x14, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1760.265785][T11809] BPF:Unsupported section found 20:47:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x20, 0x1e, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x201}, 0x1c) 20:47:54 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000fdffffff0000000401000000f3000000000000000f030000007794b90000914f7f1b4a5e9d74a240db1168674bd3b81069bb74026512af37ae538b5e4d88e300938da44d86218496f827de338118aed48e64b7e90ed6383b8d56b11fab796a38edbeff6617465d0c563dcb670960de987c7974411e4f7a9cda967b740cd48fca30693a7d546edc697512d4e8bc56137a8d22caeea11a7da52ada630613c9587553a99904f786a347417d7d65f5417348765e9e1b7d84e4542e631b64a9cf38edb91a89a83ac7e20daf3bc7"], &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0xffffffffffffffba, &(0x7f0000000100)={&(0x7f0000000040)={0x3c, r2, 0xc0d58860b4c77945, 0x0, 0x0, {{0x1, 0x0, 0xd31d}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'bridge0\x00'}}}}}, 0x3c}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x400, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40040}, 0x14) 20:47:54 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3b, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:54 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket(0x22, 0x80000, 0x78) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) setreuid(0xee00, r2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000080)=ANY=[@ANYBLOB="49c54a958945191cb8ce0be6fffcdb7f072779b77b73b221588decf0debdc97477f5e758a14fcaa124b47700"/60]) [ 1760.517565][T11819] BPF:[1] Invalid name_offset:4294967293 20:47:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$CAPI_INSTALLED(r1, 0x80024322) 20:47:54 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43615c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:54 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1760.700627][T11819] tipc: Enabling of bearer rejected, already enabled 20:47:54 executing program 5: clone(0xc884fa2ff9776e78, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:54 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="0f0000000000000000000000dae77c0aa1ef6d8b8cd400000000e6ffffff", @ANYRES32, @ANYBLOB='\x00'/20]) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000180)=0x1) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000140)) ioctl$SNDCTL_DSP_SETTRIGGER(r1, 0x40045010, &(0x7f0000000100)=0x9) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) r3 = accept4$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000200)=0x1c, 0x80800) getsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000240)={@mcast1}, &(0x7f0000000280)=0x14) [ 1760.866321][T30874] tipc: TX() has been purged, node left! 20:47:54 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}]}) 20:47:54 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(0x0, 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:47:54 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x500, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1760.976456][T11940] BPF:[1] Invalid name_offset:4294967293 20:47:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0xfffe, 0x3, @remote, 0x1}, 0x1c) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) 20:47:54 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000000)={0x2710, 0x1, 0x4000, 0x1000, &(0x7f0000002000/0x1000)=nil}) 20:47:54 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43616c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:47:54 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000c3cce4b66e7ebe8781c8c2f5d00e427847a0f7dcfd321fd4837210a5e247d3a5e25792934b21727e8bd71d5965e6ae9ecc29b0140000af5fc167a85172b497004796bdc057f71d426bc4851ee507ed222223ee8190c92e5ee11e219a0a70e1019a5160fa1f1d2ce964f4d7843c48d5c032fbb39cfc5db37c188aefd495ddb0015a73a5f5368790"]) [ 1761.319198][T11952] BPF:[1] Invalid name_offset:4294967293 [ 1761.332056][T11952] BPF:[1] Invalid name_offset:4294967293 20:47:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x6, @mcast1, 0xffffffff}, 0x1c) 20:47:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) 20:47:55 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb010018000000005cd30000001c0000001c00000002000000fdffffff0000000401000000f3000000000000007794b9000000000063d9e9da3d2f88778e50eb1c223f08960652d141cff0c8faa539a906e558e4597079b74c5d52b40f668043978664c1dcaccdbb5a8bbf1a3aa2bd5d153cd0c82668874738a7114668e218132fdddad2c27d934dad14a3f49d7fe61dd368d8e23b875799e9f698970179fd3ee2bd43cd912e4777600ca2588d2e490b7c666e88eb6861b8a3fb888b5f1fb144884c9d88615f383549a5a115ed6463dbc294256a825625f3d0caf944231e4f42ea11a077809c3edd3ad19c8917dbd75f814a0b6dc6aa53d733b275707e91050ac7ffc5d8e7b8671751c8e8b8745540b9a0c86aa374342ebf8fb2b64a3bf3c900008c837a5bbc9d34bbf7386904d21b5a9b8b8e14d06bbac30627dbf515a1bafb9439c346439542ec682fbbe0276e8e3aaf6ced80dc5c51c8af668e24a18971f918acf2e7b415898c44fad4927450c4433666641d6bbfe6174a1c7b830cf77ed37fe067932073f9b3f09dc5ab8853a10c58b916a49ef6f00b2686ca9e101bdca160464f818bbd9e8a531d643ef1aaf93026f9dd1fee0e5982b43b08fff31785a2dd8e17c45f0596872fa6effa17c0a3bb5508c8c4bacce0ccf47abb636286c91301a826c397c609a35507c229687c62ab2fdd0b786958f293b1741a589ad5cff6a4869efb116e6279dd8992d95c3a3034"], &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:47:55 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x9000, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1761.791907][T12072] BPF:Invalid section offset 20:47:55 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r4, 0x0, 0x0) getgroups(0x1, &(0x7f00000000c0)=[r4]) fchownat(r1, &(0x7f0000000080)='./file0\x00', r3, r5, 0x100) 20:47:55 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43617c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1762.779898][T30874] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1762.809278][T30874] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1762.818049][T30874] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1762.825745][T30874] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1762.857796][T30874] device bridge_slave_1 left promiscuous mode [ 1762.864249][T30874] bridge0: port 2(bridge_slave_1) entered disabled state [ 1762.920005][T30874] device bridge_slave_0 left promiscuous mode [ 1762.939591][T30874] bridge0: port 1(bridge_slave_0) entered disabled state [ 1763.001407][T30874] device veth1_macvtap left promiscuous mode [ 1763.010566][T30874] device veth0_macvtap left promiscuous mode [ 1763.017240][T30874] device veth1_vlan left promiscuous mode [ 1763.022998][T30874] device veth0_vlan left promiscuous mode [ 1764.656700][T30874] device hsr_slave_0 left promiscuous mode [ 1764.706307][T30874] device hsr_slave_1 left promiscuous mode [ 1764.763475][T30874] team0 (unregistering): Port device team_slave_1 removed [ 1764.774574][T30874] team0 (unregistering): Port device team_slave_0 removed [ 1764.789165][T30874] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1764.853819][T30874] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1764.941864][T30874] bond0 (unregistering): Released all slaves [ 1765.043974][T12090] IPVS: ftp: loaded support on port[0] = 21 [ 1765.205220][T12090] chnl_net:caif_netlink_parms(): no params data found [ 1765.278246][T12090] bridge0: port 1(bridge_slave_0) entered blocking state [ 1765.289634][T12090] bridge0: port 1(bridge_slave_0) entered disabled state [ 1765.309500][T12090] device bridge_slave_0 entered promiscuous mode [ 1765.337118][T12090] bridge0: port 2(bridge_slave_1) entered blocking state [ 1765.344178][T12090] bridge0: port 2(bridge_slave_1) entered disabled state [ 1765.367486][T12090] device bridge_slave_1 entered promiscuous mode [ 1765.406672][T12090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1765.427754][T12090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1765.467470][T12090] team0: Port device team_slave_0 added [ 1765.474351][T12090] team0: Port device team_slave_1 added [ 1765.517093][T12090] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1765.524087][T12090] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1765.576293][T12090] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1765.597421][T12090] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1765.604468][T12090] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1765.631064][T12090] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1765.701717][T12090] device hsr_slave_0 entered promiscuous mode [ 1765.760350][T12090] device hsr_slave_1 entered promiscuous mode [ 1765.913624][T12090] bridge0: port 2(bridge_slave_1) entered blocking state [ 1765.920730][T12090] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1765.928050][T12090] bridge0: port 1(bridge_slave_0) entered blocking state [ 1765.935153][T12090] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1766.039858][T12090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1766.052865][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1766.061582][T30608] bridge0: port 1(bridge_slave_0) entered disabled state [ 1766.070108][T30608] bridge0: port 2(bridge_slave_1) entered disabled state [ 1766.084291][T12090] 8021q: adding VLAN 0 to HW filter on device team0 [ 1766.094832][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1766.104447][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1766.113442][T30608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1766.120517][T30608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1766.138479][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1766.147899][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1766.156931][ T8063] bridge0: port 2(bridge_slave_1) entered blocking state [ 1766.163963][ T8063] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1766.172846][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1766.182332][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1766.195918][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1766.211285][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1766.232041][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1766.240493][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1766.252838][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1766.262304][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1766.271323][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1766.280233][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1766.289354][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1766.298968][T12090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1766.319306][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1766.327139][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1766.339393][T12090] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1766.411953][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1766.421336][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1766.445161][T12090] device veth0_vlan entered promiscuous mode [ 1766.456011][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1766.465456][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1766.481618][T12090] device veth1_vlan entered promiscuous mode [ 1766.492321][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1766.501161][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1766.511901][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1766.533935][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1766.542901][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1766.555609][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1766.567231][T12090] device veth0_macvtap entered promiscuous mode [ 1766.575967][T12090] device veth1_macvtap entered promiscuous mode [ 1766.607856][T12090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1766.622005][T12090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1766.632845][T12090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1766.647657][T12090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1766.659725][T12090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1766.672233][T12090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1766.684368][T12090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1766.698982][T12090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1766.710200][T12090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1766.723145][T12090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1766.735881][T12090] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1766.747601][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1766.755831][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1766.767664][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1766.780279][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1766.791161][T12090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1766.816281][T12090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1766.827595][T12090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1766.841080][T12090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1766.851824][T12090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1766.865672][T12090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1766.879499][T12090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1766.890678][T12090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1766.903952][T12090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1766.915424][T12090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1766.930631][T12090] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1766.939893][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1766.952063][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1767.058789][T12099] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:48:00 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(0x0, 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x33}, 0x1}, 0x1c) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8982, &(0x7f0000000040)={0x7, 'dummy0\x00', {0x1f}, 0x9}) 20:48:00 executing program 5: r0 = getpid() r1 = socket(0x15, 0x80000, 0x20) recvfrom$netrom(r1, &(0x7f00000001c0)=""/75, 0x4b, 0x0, 0x0, 0x0) tkill(r0, 0x9) ptrace$setopts(0x4206, r0, 0x0, 0x100020) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '(\\cgroup#\x00'}, &(0x7f0000000080)=""/21, 0x15) socket$vsock_stream(0x28, 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x5, 0x0, 0xf, 0x3, [{0x4, 0x6, 0x1}, {0x1, 0x1, 0xbbe}, {0x2, 0xffff06b4, 0xf94}, {0x3, 0x882f, 0x20}, {0x5, 0x1, 0x229}], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x72, 0xf9, 0x8}, 0x20) 20:48:00 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000300)={0x7, 0x2, 0x4, 0x10000, 0x6, {0x77359400}, {0x5, 0x2, 0x1, 0x6, 0x0, 0x81, "44162a32"}, 0x1a72ba71, 0x3, @planes=&(0x7f0000000180)={0x99e, 0x5, @userptr=0x4, 0x2}, 0x2, 0x0, r0}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000040)={r3}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f0000000440)={r3, &(0x7f00000003c0)=""/82}) ioctl$int_out(r1, 0x0, &(0x7f0000000380)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x3000)=nil, 0x5000) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x7fff, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="015a645b436139a07a8b4b6827e6ae9435bb39bcb204186558f9c7415454198ec5a5fc59032b29666af926527e2dfcbab3b037f0a9c4b2f2a1fb4686b8ddd93df0fbae0ba3c2c2eb2dea6423b5758a83e775b4c5b19bef674b80a609cc8f4eb7fd9a2ce985dfafd3e86deaeffe21858101fa69468d2050e81427830f0cacfee5966a0d0dbd607a0ca7e1f45d9d8d1955451f54b46edfc92c92d3412549f885252b8e7fa92648", 0xa6, 0x8}], 0x80040, &(0x7f00000001c0)={[], [{@measure='measure'}, {@measure='measure'}, {@subj_role={'subj_role', 0x3d, 'usereth1'}}]}) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00000000000000100000000000000000000000004f9ebedf5b936e0c335668b82de4142b94b0fdc9ec63686fdbe081551552d7be98b07d054c753f8501fef143fdb23df56d1de5f9bb34c042500f3dea6b9cf586e2e679de7347bde9466d3e36e131071892a294e01e76290dd9", @ANYRES32, @ANYBLOB="000000e41d84568fc0026c697985daed00000000123ecf6b29491458b7999c3c7353e519f65e595b98fc604116a10e50053d97accfbe8d185107c8acffc81056144693377c"]) 20:48:00 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43618c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:00 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x9700, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:00 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000fdffffff0000000401000000f3000000000000000f030000007794b9000029822b9a985cafee79839b6967e3b0ab618588382f8c7075d08b1690ad957e6eb899a43eb035a719bbc0243f878d815e6fca073774f5207df5e1c4b0b778b8a373329b20c47e663a93f3504d18d56c"], &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1767.267417][T12113] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:48:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) [ 1767.349907][T12120] BPF:[1] Invalid name_offset:4294967293 20:48:01 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(0x0, 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:01 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43619c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1767.611212][T12127] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:48:01 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:01 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x400, 0x10000) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000080)={r3}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000180)={r3, @in={{0x2, 0x4e24, @broadcast}}, [0x17, 0xffff, 0x100000001, 0x5, 0x0, 0x6, 0x81, 0x1, 0xffffffff00000001, 0x3, 0xffffffffffffffff, 0x0, 0xb4, 0x80, 0x8]}, &(0x7f0000000280)=0x100) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x100, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r5, &(0x7f0000000380)='syz0\x00', 0x1ff) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000300)={0x1, 0x20114243317225af, 0x4, 0x800, r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f00000002c0)={{0x4, @addr=0x5}, 0x8, 0x4, 0x8}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r9, &(0x7f0000000380)='syz0\x00', 0x1ff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r10, &(0x7f0000000380)='syz0\x00', 0x1ff) r11 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r4, 0x40087543, &(0x7f00000000c0)=ANY=[@ANYBLOB="feffffff04000000", @ANYRES32=r11, @ANYBLOB="0000000000000001000000000000010000000000", @ANYRES32=r10, @ANYBLOB="0000000000000007b10000000000008000000000", @ANYRES32, @ANYBLOB="0000000000800000000000000000000000000100", @ANYRES32=r9, @ANYBLOB="0000000000000000010000000040000000000000"]) 20:48:01 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4361ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000000c0)={0xf000000, 0x2, 0x4, r1, 0x0, &(0x7f0000000080)={0x9909ce, 0x6, [], @p_u16=&(0x7f0000000040)=0xa17}}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r3, &(0x7f0000000380)='syz0\x00', 0x1ff) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x48b6e3b4f2e72558, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r4, 0x80045530, &(0x7f0000000240)=""/63) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000080)={r7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000100)={r7, 0x4, 0x20, 0xfff}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x100, 0x6, 0x8001, 0x2, 0x2, 0x8001, 0x80000001, 0x6, r8}, &(0x7f00000001c0)=0x20) [ 1767.977749][T12135] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:48:01 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r1 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) r3 = accept4(r1, &(0x7f0000000340)=@nl, &(0x7f0000000080)=0x80, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x9, &(0x7f00000004c0)=0x3, 0x4) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r4, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000200)={0x1, 0x401, 0x7, 0xcfb, 0xf, "fe28a03d53aa12f9"}) r5 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x30800) ioctl$GIO_UNISCRNMAP(r5, 0x4b69, &(0x7f0000000100)=""/202) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0), 0x4) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000540)=ANY=[@ANYBLOB="00de0000020000003b5bbd378502ab9d05ccabb7cf596db9cd5941ff85ec2e8047ec9f94ffdb230be319ba68692644e765b7b7097ddfccbd16b173697c16c16a7345872112fccdbe90a7a7a9bfc02437bd18c773bb655252dc311cc4ac0a62f48db6", @ANYRES32, @ANYBLOB="00001b000000000000000010080000000000000022000000000000020000e099fcc219cc84faaa6ba563ecb67426cfe30934fabd53fbed614fdd247bb551bc22c4f5e71e3b58db2c58098710e62d712f210df6d1d47e2eba9db69c98b2fb357ce1f7942d15fe397f50b8a8957c227e327d857ccb9fca133c07240c01a9cb6bd7742b75ccee8b0c22e354be2f2522116bcb6e9b9045b17a5b7993a285540ff242fd153fdd4ddfa8e2d97e7caa2f55e61b18a91f3645a3d0b5de44e66ca4f359cb0749696f7ffef67f208d2d6b0e0a006e5e5ddb98", @ANYRES32, @ANYBLOB="1d1b830ffe6d9e06"]) 20:48:01 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cachefiles\x00', 0x80680, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000001580)={0x1, 0x3, 0x5, {0x4, 0x5}, 0xa7, 0x94}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000f00000001c0000001c40000002004000fdffffff0000000401000000f3000000000000000f030000007794b9000069bb3e33695ebeebca0a73491e72a5cca1a93e88b718b2240ce21182008a62ca7a7352657fa21cb16d74dc28cc9312b463aa53525707cdaaf6c49103515f5be8d2f53f2434ef55c30e1be2070d9cefbedf1ca393f6260697686386ff71a523fa4ff3996013c043586b8d9e64b3f022904b16f5537af9dd7f12bd50a858ae51a7"], &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) r1 = getpid() tkill(r1, 0x9) r2 = shmget$private(0x0, 0x14000, 0x10, &(0x7f0000feb000/0x14000)=nil) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r3, &(0x7f0000000380)='syz0\x00', 0x1ff) r4 = getpid() tkill(r4, 0x9) write$cgroup_pid(r3, &(0x7f00000021c0)=r4, 0x12) shmctl$SHM_STAT_ANY(r2, 0xf, &(0x7f0000001880)=""/163) getresgid(&(0x7f0000001600), &(0x7f0000001640)=0x0, &(0x7f0000001d00)) setfsgid(r5) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000001840)=r1) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r6, &(0x7f0000000380)='syz0\x00', 0x1ff) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) fadvise64(0xffffffffffffffff, 0x3, 0x3, 0x3) getsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000080)={r9}, &(0x7f00000000c0)=0x8) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000001ec0)=[@in={0x2, 0x1000, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x7f, @rand_addr="7471a877a04bf570a219e76e2c0965d9", 0x800}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e23, @rand_addr=0xfd}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e24, 0x1f, @local, 0x8}, @in={0x2, 0x4e21, @rand_addr=0xfff}, @in={0x2, 0x4e23, @loopback}], 0x98) r11 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmsg$nfc_llcp(r6, &(0x7f0000001e80)={&(0x7f0000001940)={0x27, 0x0, 0x0, 0x7, 0x2, 0x8, "7100b51126fe0e46333166a0326afd63d44927b434a1743b1759607f3d6ca965056723a5040e4eb71cf81077e2c78d3145f5d22287be4d482a0b181d7dce97", 0x39}, 0x60, &(0x7f0000001dc0)=[{&(0x7f00000019c0)="ba05b8d61c4a8b7bede194cfa62790ef89c531537b9e66e1a79052c36345fb5f643b22b03c327b0f22dd8036b231491fe04309395b3ae77540a5ee546f6cbb79fc141b541d8a74d043d79fdaeb4cf63c3d7bc8c4ac52f71b64a24d2950bf7839897fbf96dd15ca6eb22e9577fddbdd4028ada15d4d59a10e63de763e51816cde14a1a8c219d5d74321bbadf9272999505c8e3675f18f1e4b00aa263a9d37a90bbddc0e23a0009f8ee3b9b4e4f6c1e1286bee957a45d016439e95eae96535fb7666374b892c22641a51cfd4fa01af4352f846aca172b64b1a62cbd87bb49c4be8b03b1ccbf8acb5dd85af9ceb040592b2d177", 0xf2}, {&(0x7f0000001ac0)="d5e79fa838b5301621b7005ea68b683b909cab59ed6d258598e3f2799fd0f081212acfbfab4635894e095782f1d075fc12844eb19c5385992d29e6621ecde94c9ee1e0b1aaacc6d9687ffb57b4079a7252882820b49b8631a687620bbaec8b46a9004c548295cb2e40f8544f4e1d9b0b07998a7fe70019984d5e63378a3403a365baccd84eb7716013049d814bc05886984343255f90be2e642537758ae840a3282eb3ec81a701360869fbecd83ece24189bd1d022416fee035ef4b4660825d95c18016854f9845fd433c9ae0bd451e910577eec9cbf95430b3d5674b5", 0xdd}, {&(0x7f0000001bc0)="9aa97ebafb57cc9d3915e4fbe1a9a9b5e430da1ae17815fb5e2e895d28dc4a134f030fd2406b6f2185cb89efbd94cae995011849530fe44bcb2d306307d2fd69f0a1c3aa6833a156ec38165c7603a439a8d55f7133e65d8ee9ce47c32b56d5dc20b7895dff54707eaaa40caeef4f12de1fc1699ffff2d7d2f186fccaefefb59e4ddc1ea15ca3d80683984168c49008d5d224ed2de9523cf2bf30821981a2983972e8401ad2aa635e94adc29e5a3b71", 0xaf}, {&(0x7f0000001c80)="ddaa598569a2aa32e5e08b851b926d0d83e814b3ff2aeadd214b90df06ca17f9728b8b5c934d2d44a677b59dea211b3300741d4c922e663de77473fce53aa3cacb30fdcbf6603c145c77506921aa8a1ebb5c63db1116afea51f71c785ab287deca3967f57ef53789717232569b39d3303185411c", 0x74}, {&(0x7f0000001d00)}, {&(0x7f0000001d40)="6b4b7d4ab3dde7c88725623103ad36778538d99affd8a0ad333d741946429367ae90ff1fce0af2937e623451993f305d0817755b85c2382a49af9bf9d9d17f83e0f64f8292fd3c38f9eb5975115c768422d12ce7c6be69a1543008f889f2e4a355582b453a", 0x65}], 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="28e900000000000000010000810000002affa2e498741edb8afb16b273eaf69faa00000000000000"], 0x28, 0x4009}, 0x44000) getsockopt$inet_sctp6_SCTP_MAX_BURST(r11, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r13, &(0x7f0000000380)='syz0\x00', 0x1ff) accept4$ax25(r13, 0x0, &(0x7f0000000240), 0x80000) getsockopt$inet_sctp6_SCTP_CONTEXT(r10, 0x84, 0x11, &(0x7f0000000080)={r12}, &(0x7f00000000c0)=0x8) sendmmsg$inet_sctp(r6, &(0x7f00000017c0)=[{&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x8, @remote, 0x7fffffff}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000100)="514723daea8bed61bf8c9c31a3d4b701d7122f3217606ab00229717ed264439b9b4419ab573601758846", 0x2a}, {&(0x7f00000001c0)="8322c1b9bb5e1cc476b7d2aae695a87084e7db7101468e0be32ac0b500cc424668d7ed627a1b989fe2b0f3f94787b66cbd80089db566b6dbf5d1f14d07c409c2956f04f90cc8e268c83da5762ea3b0c0cb8744661557989c598199ddae2978b9a7af9c0d4cece124bbd33f10d194054ff9d27d0fca16", 0x76}, {&(0x7f0000000140)="86e5ff2e06429764aaa90651364a409cd7a444822b3cbc966133a9dbcda457", 0x1f}, {&(0x7f0000000480)="aa377fe1ecda1656579e4d6b728fd952e29c7dc0bd3e322bd26437bdb6d1f24cf7e822db7e418fdaaaba74847adc1a62475adca52baa1ed49d18b45a88b8153f71aa58d672a8e7b60a7f337f9c1b4a87d220599d10320abc6a4ba55bf13402aa877d3f9a14555dcf4d6a322003179e658ea0a5da586517363e0e18212430b4453c0d46e8ef6af831c9e325c2498a12b6cb59e7e1f6d13a2bc1a1e26aa73307be3f3ed5f24b085efdc9969c6977cb22223fb810d34c35d14e7b90ad93c74d450f6abafc791bfa01c6ef4f52251566fa2b17ec264a6678a98d902297ab91fe48030b57e442ed14c457fe29cff35fc781cd54187cab010e6fffd4cc70c6baa5475f315049565f19f226d6e587f5b703e151a1bca60f864c868ede7546c7484d43d3b7915eba2acb226f7ef8faec38fd9016e3490b5a947e2eae732c5ed00c1fa21b7ba863f4fd0b4ad806d39707459dd6d6e07aea333b5be0de1ade87622084390489631b0ecdfb531ae9d08ce7a9a1ecc397eb275e52533a92901e8f2d59342ce1340e0c4627442585fb3b64bf30e728fa2bd060708c52944978edbe0f4e36ebd142688b8ab5aed3123ef0d3faca12e40ae8b1bca8568ea4f942e242f39f7940ab68ba4c87566ef68a09d9ac710a7e20eff600636cfe02d572c836de5e083f27af2be32e6db23e660c08acba378e42f2424b920d50006e1d620d64dfabe931b8ced419223e407113680b9caed98ef84bbd8ed5010a22e65e593b2e7e244f389cbe00ca3460b636e894dacb566b821c8d53a54c96adb4fd48313a94abc70bbfe29044ea8ba2be3f2734ffaa769f6ce3c4e79da7e51f8b5f3ef3b4d478efb30dc1800e5f5bd60d52b2387c6749faf2fad61ca00624d84d0026257e208e43b89cede3acb9c6a59fe22ee54d05a3090a7396733c11b437f14518c29daf95ed78462799a484a6d21874089fc9ac6c5b2a99bebef19c059bbcbf6a3e5ee44bc52fccbc6b87284bd1feb35ef1637402450a3edece4b0d95a4ec6ea5359922fbd0a2bfc35cfd3ce853d7f6339f56eef827e81af5f30913c5243fed6a27adea16626b95013280218458595e6be6f8a9ce57760b53f887e5ed6e7312bf8ff8b8307626d407b5788a4e1c0423ad4da88d53938b4963b4aa27149bd860c379b67277e86acb2098aa898e84c27955475b0a880b8f8c8c37a8c1958db12d3efb0070703144b442f538e6fd44397e8515d93bc92ff2945e623db46fe22394e091adc32e924735cd8dadffc14ea46f6fa51d780dc64049b2d12cb7135b23ce90a111abd5af29ad8f121c9f06b2433c1e1e9635b6db8a4e1d07138eb7e22ef952237d500f8ddf649d47220dabd39710d9540eeacbf5661b905357af879d243846ee10f3a25c79371f12dd5754bce911f4a071fee22cb8cab9ee2c5dad75a56b40ac8c14fd465ed4eb385b949d7ad31200a91781e5e0744fa0eae33dc9dbe7fd58aec83a9d6dd0b7b6bbb2d36c44dd6a9cc969a42a3bf446c3fdb5dcf74c1eda95768386eb5bd3b2f88f98d994c7d93e6ccc2571a9052b5d0e6c2bb8da8ef2dfdb62ab3bb5713c485b6050caffd6fec5964a98ae49fe299072d0cb39f0202b97d7c143586018688f525f2d711426180b28bb5d042fb1afd58872d944ad764beca1aa3ac93f198523d9f7bbb85ad19b4a02904b884b4292ed942cb901bf91118230d2f30e246ae84ccf2b676f65c434e131cf8ac74b0187b5803e4e46e6f8d3bd3558749c2d849153ff3c0d1e552780531d93f4b3fcadcf10ab5b24928f450202d4924f07eb5a72e0635e73d330c6e9ae0b0958f96f28df1c92ddd461305a393d505e8d634614ad31ba28122f0ec78f45eebc23cb80a7acae8602c8477858b282a036eb6475cdfab8a3c03a9e2fce43517aec657caed375c9a501a25dfed4b4446619b63bd4149b2d908f8daf1133ec5ec6d30c79922c7c8f40e2463d3873e8be558e02c9246fd23145eb5b1a55f543d9e4804e96eceb61cc44fd86410ded86dc85de2dd4ec9a7dcf6e33fb68c86fefa134fcb4c2d5cea5125a81b850450bffda460300bcb98ff7d5e3cd12b746f80f97980a0ebc3e17fe47ae0cdfd65188581572df92b859923654432d3e10948a67436353d082626ecd44252cf4207a79f510f52f3fc962265b5e23c7fa2a44d38221216ac706e276a98fe777ed2ab65ebf3cd1895a67864e8d7d63b4eb8034c76b13915e495959ac2f3d8412d799cd3300d534ffafc527fadecbc1635a1c04626aa6221134ce912e97b4a7d01ee714d43a83fd070063c30ca76102019640d7d1e6b5ed7e9b9c1c48643b1774cc578af830450c8e0ea9e763e3334bf2b6b28115de8587be332d0419b6962efbc7526774d0d95068073af2bf9e5a5cdcd61b08e72cf2a8aa50d7d918f78b3c99ebd5f6bb4fca03df376a3312160172ab4cb82644d19524deb149bbe22069a5ae0603d7728fe758db626ed5a7a651a6dc7ef4fc6a9480d1cfe3c26a0868bec61d71eb86e07709ed9d1d109be891a73ce0e44ef215c3f7a041b78a0cf514f08bddc9babc5655b2f41479eb70cbc278bb4fe653eeeb40f10b5b50a5680d040dbcb2fad1780885a16b06fa77ddeb002e7a92302cc14d871e6928b2ac73f70b8a27e6f6ea6206643e3872192028030efb131aa34eaefe82458d5600708ba3283a3fd762c69b110f37147be1e1b0c9791f632aa3db1f1a3e1f012f5a8e519312693513392f0b34987fbb7323a8faffd15957699af620aac64ac5b5e5b50e6789445cff39d5efbd2b920c5fe524ec7445871ac949fd09e31a159e1058ca96b0a257e4b9e9842c0e02262427a8d6b88d13655400c85cf91b4b7467a7724e5a3773ea4e2d1d8be18346195fffa4d05ce7d8d6f2c2853a5b7581ab05a25ff2df41faec28f530295af2ef0afaa0fd701a03caf7bd9e950fb2cceeedbc02d0b8036f1371859a2538db4700b2d09e14a9389f62483afac28f5be04be8f43c895de5ab30255a6eb2aaa6b65e7c4da9f215d2ce562e5122113abde42785a9ff78fb96d193f67201445aad6e3a53cee7bd86bf18218cee2a57978e0624a0965dd43b8edf07fe313bc4700f1fef721eb0f58289305ed3cd90303d9176daba91f041b4d792b479297551aeca5a2ec451c618a8c2b6c98b45f23f11a7d6721810a7fb026d50b05cfbe721d4f5392927a4adb9402d79e3ed499a6b6b9a0b938ae45754adf06f2442611b532fd1c9f49cdd6ee2640ef891cfc7254825720d75efc3b0d67ee853721470dd987cf6ab40858a3d0c9304f6426d9774ad576e2b8714e9aceab8533a6c70a6c4a16c8241b346c91f71a65fa9c0ba4d038f22a26fc8d282b4607eb2a05e2865ace64870d3e93985114c244677526c053fbca5c06aaefebd0434fe0be6bee10c1adccd9112971c9923ebe9c7584a4e4558543345ed5f45ae1e8c2694c326dd3fe9fbcf9f13a890a791d4b2268e0e8190616885be963e599ad15d697994ba86bac37a9344f5b5122daa116ab8e58dc893cdc4ffac4d9fbb1a5236a44ceaf00863a8b9db22b60d8694f289abcce77013869fc240ee33592a57fe3c0ad33fe3190183ca779f328a4ffd08004facc2c97cabfb1173da9714b951c223f0cc973dedce00fb38e39da0824ea9d4c3f32ddb8ddeb9daa16010c0df95e307a344a64d262680f9da657151ac3b9183a34667a0c1716e209b87ceb61aee3b6dccddd2940fe76a8f71a6e98928d12784bc668b7750ebebe742bef27eeedce5042b6541637b6136691697af74a99fba754f02d5de7b7fa12a8e997f00541e69dbee58dac9cfe96b91307a46a030e3c3c8c5c6f60c61d8017957afebfc9ccc30efba5e57b469ef430c0e3b1c128b028ce62f37d0c30ba8cbfe37786c7a5f12a5a6a73b4cdbffc9d727716de7a06ea2d8d8f5bd6d77df32ba3f48e24757a3e4682e178bd3e5a14f4a10d160dda677db4c81c53b3213b1aa32c15bed79ed1c403fbcd7e1613bf3f1fda9dcce085c657f6a6be5a7952383df0e12a20e55b6b02a49ac4214a38ad774ff8dd0db8937658d4f23351c279496c192eb94e5f9fb36038f3e74126aaa01dcc49ef2647c6a9389d0a07bc56ea25c343090017e1cd84dd8a7a56d10d9a0e82e8468ddeeff78092ce8790821a8affaf00f8dd7421fc35d568a73c98a6f46843f210eacd04cc6c97390103b98199417d2798d339f431822e444417b66241f710dbf4ae92a992482ae18553531b1c3baa8ace8cc78ea1bd090368bf116f6b1cf268498904a0f881382fe8f6d00869a20581d0b6d5fcd2c4f8d2fff6db9e34bb7c92e8adf5c8ad7fe35b91b55a699557603b7d0ce689e36404838b5fa59f5b8cd7424c50550a38c1ac651a975bc6e29cec0b6fc56296ec376b7b60eb7d0989e862b99ea34581cdc4aa3b3f5782984b7117737407c0434b48e64c959f7750041951a8b0a8bc77049f93f03deeb36dbe656fcee3778897836bb55adc16c13025b715d2f68739f1f9e26f6ad6b989bec667ea20925c8eeaede0ded348bbdaf6fcfd67beaeaf34894cbffefda2db9312a30b7f360bc957a8767b505e15ded0e2d287b8162ea331d296be94a6901a806de740b5df50209dca9880067b244ba77942d25f011c3807cec94bb8b06868ec7f5723170511332104a64a77d5eece747ca55848be94e85b3fffd101355f4c564c54424b8428539ca5827a32f247379ac5a0245ba0fc50cea7b2a39cd2f68edca1d016198735c3d71cb029fc06cf8e5c1986ef2a6e8286a3dcadc654f90abcb244877d0416be1cc7cafc0c0b3d1ca804c0f26065b8709a059aaac8fdbe58e942988b1ebc7dbe7f805b58c8939fbdbc04c72ced853a6ca0680e6deb526c193680237853b7f6fd277c856cfc870a3ef7f3c25c4db7e30d9015225146b5c1069a8e543069069677fcfed44cacf8e2d4e3f23db2c0d7b91522112e51af086a55d225bb0895cac1263694ff5764491efd61181a6c6a28fc5d3f00854b2b4e9e0bb6663278f1e357ee8059f404aea45fed010fd0d7ab1527efee47fd714d7388d998500dbe128fd191dedc8cb22e25454d05be9833752e3032cafd3efdad5bc8459a42b6f14abf1a3dc3ef6064bbb7058217fe37cec28e63103a74dfadf849d4fd9f96b5bb8c610b15587376a1a69954efe65ae70ff41fecb4b3d5753aef579cf267019a18529bd2c55713f90ebf4c791e0e88ae15626108ce0379b92cf52dae270972f75418f8f50fdf374435c966c34786400a0bdb1d469a42a93a4a1737b651b1903f3373b12beacde3506b47835b608dea926d9201c73f24640363e09d26d19851b0a3229fbb30adc9948a1709d47127025b721e78c15850388ee1c6df1fc8872fee82569abb58ec19fe7629fe8759e6bd532fd0a081f7231996b3f39c572b7013b2ec46d120f14796be68c19b8957aa7b22857638ae84d3a1734b56c4b55fdd7395d8e9447e60d09585bf04288003fd139589505bcb423582b8ac1d6c2f6e6e87456ae5c7af96413f2b1a15de38a3721c3c1e044b05e370986357a2dbf8914622af294b884830516957ef7dd19ec48d2ca1ce64039833840ec6acab8232f7eab058b43ef996dca52039d3190bfd2c7312f9d68e777b7ba3bbe50a9ab2717ff9dac7870fe1db63620da5465544446e5682829f993c21c5f0688e1968f5dc44b31665a12a0fb036bf7fbccbf7705ad2e65f8e9e385cfc5b98bc278fec73131af14a8abf3a0565f8d4e5958b78d10e17cc498c2c3a49985b6e1e6b353bfb0511e83afdbc3667187", 0x1000}, {&(0x7f0000002080)="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", 0x11d}, {&(0x7f0000001480)="c7d8e315c22e4637263a1045af6227f2b429209d15184ce222cfe099cb338de8647999cd3ef2a5d8ba3efa257cae0dacb96fca68f38d738849de236bb6ff0aae53b7bf188d9f9773d65e203dacd613bc81232ddc3b068acb1f995a76455ddb397972d5cdb92ecf1f0f6afbaa95b0b5665dc80afa8921f3fbcb32f22cfa80b7cffed6624563ebe89a2c8975b830c7a988fbdfda63ce2f95b46e0d3b8099cde50f9137f40a42c96ffff67559d186dd8e79231219fbf1d98b4cfa6a43e3946666a369acd3e8db76fec0aaf74fc1af3cd5f5d27fe9f6d6532ed9af3a798b944212", 0xdf}, {&(0x7f00000002c0)="0feff249c97720416e6523c261540874c6ab0763348a1463247f", 0x1a}], 0x7, &(0x7f0000001f80)=[@sndrcv={0x30, 0x84, 0x1, {0x8, 0x81, 0x8, 0x9, 0x400, 0x1000, 0x5, 0xffffff00, r9}}, @dstaddrv6={0x20, 0x84, 0x8, @rand_addr="8c60dd19a35fabf928632ea75f2a0a9e"}, @sndrcv={0x30, 0x84, 0x1, {0x6c, 0x4, 0x8203, 0x1, 0x4, 0xffffffff, 0x6, 0x3, r12}}, @dstaddrv4={0x18, 0x84, 0x7, @broadcast}, @authinfo={0x18, 0x84, 0x6, {0x2}}, @init={0x18, 0x84, 0x0, {0x0, 0x0, 0x7fff, 0x7}}, @authinfo={0x18, 0x84, 0x6, {0x9}}], 0xe0, 0x4000080}, {&(0x7f0000001680)=@in={0x2, 0x4e20, @loopback}, 0x10, &(0x7f0000001740)=[{&(0x7f00000016c0)="25e376f18f3605c8a9f86dddce0ce8c8107294ecb35a3317b9d5214b6bb8eb76788fa1a0b06fd637", 0x28}, {&(0x7f0000001700)="4d833fed88a6d91dfaf472a5298853a774c00eb91772b0a99b63d14a824ca386", 0x20}], 0x2, &(0x7f0000001780)=[@init={0x18, 0x84, 0x0, {0x1, 0x7, 0x3, 0x7}}], 0x18, 0x4000001}], 0x2, 0x4885) 20:48:01 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xff00, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:01 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000080)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r3, &(0x7f0000000380)='syz0\x00', 0x1ff) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/btrfs-control\x00', 0x400001, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz1\x00', 0x1ff) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000480)=0x20080008) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000280)={0x80000, 0x0, [0x0, 0x100000001, 0xca5c, 0x3f, 0x99, 0x10000, 0x31, 0x512c]}) getsockopt$inet_dccp_buf(r0, 0x21, 0xcf, &(0x7f00000003c0)=""/81, &(0x7f0000000440)=0x51) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) [ 1768.134488][T12146] BPF:Invalid section offset 20:48:01 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:01 executing program 4: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x46, "eb6555b03f1e0aeb0352e7aac9938c17d47b3b253d59657647b72abfe63683dfac3eb95ae5c534d66b39acf3a77ca961f6b10df1aa7e754add749ac0ca735d242abc95f18dc4"}, &(0x7f00000000c0)=0x4e) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={r1, @in={{0x2, 0x4e20, @remote}}}, 0x84) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) 20:48:01 executing program 2: socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0xe, &(0x7f0000000000)={@initdev}, &(0x7f0000000080)=0x14) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 20:48:02 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$rds(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @loopback}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:48:02 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4361bc0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:02 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)=ANY=[@ANYBLOB="00000016431c7ad964bf6c7b0000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/20]) 20:48:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000080)=0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) [ 1768.457598][T12166] BPF:[1] Invalid name_offset:4294967293 20:48:02 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$KDENABIO(r0, 0x4b36) 20:48:02 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4361cc0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:02 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) accept4$tipc(r0, &(0x7f0000000180)=@id, &(0x7f0000000200)=0x10, 0x80800) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@rand_addr=0xc23, @in6=@ipv4={[], [], @rand_addr=0x10000}, 0x4e24, 0x1000, 0x4e24, 0xfff, 0xa, 0x80, 0x80, 0x2f, 0x0, r2}, {0x40, 0x1, 0x6, 0x4, 0x400, 0x8, 0x1, 0x2}, {0x2, 0x6, 0x0, 0x1}, 0x2, 0x6e6bb8, 0x1, 0x0, 0x7, 0x1}, {{@in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x25}}, 0x4d5, 0xff}, 0x2, @in=@local, 0x3502, 0x0, 0x1, 0x1, 0x7f, 0x9, 0xef55b40b}}, 0xe8) r3 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r3, 0x40087543, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="0000000000000100"/20, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000009fef7d909f66b70b0f09ce8d70c253e861d45d4848584f5422ed78194e58bebe0361b4020e4fab728f71bfafa92f2e13f46d15a4f7d6061be42a2e5512ba7a6c59718c138996bb2146a8487a6af6234448b1d68f8c57d0944021a5acd7d76ab28054"]) [ 1768.674090][T12277] BPF:[1] Invalid name_offset:4294967293 [ 1768.695729][T12277] BPF:[1] Invalid name_offset:4294967293 [ 1768.906498][ T8086] tipc: TX() has been purged, node left! 20:48:02 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:02 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x1, @mcast2, 0x1}, 0x1c) 20:48:02 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10001) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000040)=0x6) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3b, [@datasec={0xfffffffd, 0x3d, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "008000"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x40000, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f00000000c0)) 20:48:02 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4361dc0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:02 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r1 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000180)=""/169) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f00000000c0)) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x100, 0x40, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getpid() tkill(r4, 0x9) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r6, &(0x7f0000000380)='syz0\x00', 0x1ff) r7 = gettid() r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r9 = socket$kcm(0x2, 0x3, 0x2) perf_event_open$cgroup(0x0, r8, 0x6, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, r8, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r9, 0x1, 0x3e, &(0x7f00000002c0)=r8, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x5}, 0x0, 0x0, &(0x7f0000000300)={0x3, 0xc, 0x2, 0x10000}, &(0x7f0000000340)=0x4f, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x948}}, 0x10) r11 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x890c, &(0x7f0000000000)) r12 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r12, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r12, 0x890c, &(0x7f0000000000)) dup3(r11, r12, 0x80000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r8, 0x0, 0x3e, &(0x7f0000000140)='!proc/{@*)posix_acl_access/-selinuxmd5sum!*\'wlan1selinuxwlan1\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, r6, 0x0, 0xd, &(0x7f0000000240)='/dev/udmabuf\x00', r10}, 0x30) shmctl$IPC_SET(r1, 0x1, &(0x7f00000002c0)={{0x0, r2, r3, 0xffffffffffffffff, 0xee00, 0x8, 0x40}, 0x7ff, 0x1, 0x6, 0x5, r4, r13, 0x6}) bind$rds(r5, &(0x7f0000000500)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x23}}, 0x10) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB='\x00\t\x00\x00\x00@\x00\x00', @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/20]) [ 1769.308525][T12395] BPF:Total section length too long 20:48:03 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x4200, 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000140)) r1 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) r3 = openat(r2, &(0x7f0000000040)='./file0\x00', 0x8000, 0x10a) faccessat(r2, &(0x7f00000000c0)='./file0\x00', 0x100, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r3, 0x4008af14, &(0x7f0000000080)={0x0, 0x8001}) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f0000000340)={0x0, 0x2, [{}, {}]}) 20:48:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000140)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000080e4ffff0883fa9923b98dc499ebd78b581946f9fc7f887c781557ee369251eb03b6306b5a209bcef1b4bae2364b94437ff4841c200f9420ba3a062c4520d490673e3a0d902cb8193be75a8f452ee138cf97152dafb91b27775c501d383b643bd6cf34feaef37f46b2341225c228ba71b8e81a07bcb4e88fc68c7300ec43de134246bf6d23"], &(0x7f0000000100)=0xa4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x7f, 0xfffffffc, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, 0x18) 20:48:03 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4361ec0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:03 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 20:48:03 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="007b00800000204098f1bd08da00260000a6080038cf8746e7662622b4f4102dcd97f36765f7f8276755000000", @ANYRES32, @ANYBLOB='\x00'/20]) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={'tunl0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x15}}}) 20:48:03 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22a840, 0x0) ioctl$SNDRV_PCM_IOCTL_UNLINK(r0, 0x4161, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x151700, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) [ 1769.687286][T12506] BPF:No type found 20:48:04 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xffff8880983f5098, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1770.460059][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1770.476416][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1770.497045][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1770.504574][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1770.549384][ T8086] device bridge_slave_1 left promiscuous mode [ 1770.555845][ T8086] bridge0: port 2(bridge_slave_1) entered disabled state [ 1770.649526][ T8086] device bridge_slave_0 left promiscuous mode [ 1770.655812][ T8086] bridge0: port 1(bridge_slave_0) entered disabled state [ 1770.733350][ T8086] device veth1_macvtap left promiscuous mode [ 1770.749177][ T8086] device veth0_macvtap left promiscuous mode [ 1770.755242][ T8086] device veth1_vlan left promiscuous mode [ 1770.777608][ T8086] device veth0_vlan left promiscuous mode [ 1772.870007][ T8086] device hsr_slave_0 left promiscuous mode [ 1772.909635][ T8086] device hsr_slave_1 left promiscuous mode [ 1772.965900][ T8086] team0 (unregistering): Port device team_slave_1 removed [ 1772.980518][ T8086] team0 (unregistering): Port device team_slave_0 removed [ 1772.996797][ T8086] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1773.063211][ T8086] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1773.151342][ T8086] bond0 (unregistering): Released all slaves [ 1773.285664][T12523] IPVS: ftp: loaded support on port[0] = 21 [ 1773.457398][T12523] chnl_net:caif_netlink_parms(): no params data found [ 1773.538848][T12523] bridge0: port 1(bridge_slave_0) entered blocking state [ 1773.569658][T12523] bridge0: port 1(bridge_slave_0) entered disabled state [ 1773.577942][T12523] device bridge_slave_0 entered promiscuous mode [ 1773.590602][T12523] bridge0: port 2(bridge_slave_1) entered blocking state [ 1773.616293][T12523] bridge0: port 2(bridge_slave_1) entered disabled state [ 1773.624155][T12523] device bridge_slave_1 entered promiscuous mode [ 1773.658391][T12523] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1773.687798][T12523] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1773.727185][T12523] team0: Port device team_slave_0 added [ 1773.734235][T12523] team0: Port device team_slave_1 added [ 1773.766978][T12523] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1773.773989][T12523] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1773.836276][T12523] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1773.848692][T12523] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1773.855777][T12523] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1773.882259][T12523] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1773.952104][T12523] device hsr_slave_0 entered promiscuous mode [ 1774.009435][T12523] device hsr_slave_1 entered promiscuous mode [ 1774.155849][T12523] bridge0: port 2(bridge_slave_1) entered blocking state [ 1774.162988][T12523] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1774.170315][T12523] bridge0: port 1(bridge_slave_0) entered blocking state [ 1774.177502][T12523] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1774.234824][T12523] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1774.253071][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1774.265210][T30608] bridge0: port 1(bridge_slave_0) entered disabled state [ 1774.273681][T30608] bridge0: port 2(bridge_slave_1) entered disabled state [ 1774.290719][T12523] 8021q: adding VLAN 0 to HW filter on device team0 [ 1774.318528][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1774.327359][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1774.335934][ T8683] bridge0: port 1(bridge_slave_0) entered blocking state [ 1774.343043][ T8683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1774.381025][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1774.389884][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1774.398374][ T1960] bridge0: port 2(bridge_slave_1) entered blocking state [ 1774.405407][ T1960] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1774.414309][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1774.423756][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1774.433236][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1774.445291][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1774.454744][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1774.467676][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1774.476912][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1774.485573][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1774.501131][T12523] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1774.512831][T12523] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1774.521670][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1774.530998][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1774.539953][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1774.556348][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1774.563915][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1774.575015][T12523] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1774.641372][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1774.650520][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1774.669390][T12523] device veth0_vlan entered promiscuous mode [ 1774.680298][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1774.688762][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1774.704034][T12523] device veth1_vlan entered promiscuous mode [ 1774.711766][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1774.722882][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1774.731328][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1774.753435][T12523] device veth0_macvtap entered promiscuous mode [ 1774.761711][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1774.770683][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1774.779939][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1774.790992][T12523] device veth1_macvtap entered promiscuous mode [ 1774.799026][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1774.807750][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1774.821376][T12523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1774.832873][T12523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1774.843181][T12523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1774.853910][T12523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1774.864115][T12523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1774.874771][T12523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1774.885028][T12523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1774.895666][T12523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1774.905931][T12523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1774.916770][T12523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1774.928172][T12523] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1774.937334][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1774.950138][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1774.960361][T12523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1774.975555][T12523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1774.985761][T12523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1774.999721][T12523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1775.009734][T12523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1775.023341][T12523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1775.033488][T12523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1775.047597][T12523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1775.060226][T12523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1775.072311][T12523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1775.085970][T12523] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1775.096502][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1775.105312][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1775.242481][T12532] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:48:09 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = getpid() tkill(r1, 0x9) ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000000140)={&(0x7f0000000040)=""/214, 0xd6}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0xe2002, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f00000001c0)=0x3) 20:48:09 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$SNDRV_PCM_IOCTL_UNLINK(r0, 0x4161, 0x0) 20:48:09 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43621c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000001000/0x1000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"54abec7338595f275a2292c45ff078f1cbbf04241d1c3421ec9bf61b2221bc18246e74f0001e36735c2ad340bf94ad2a35cfc5d0953a3b2bfd41e2e051c6765447395415a9b05dffbe957e300168dc46f8377130fd28e50a805a6005ab6167da65430e3fcc214d7893c6d91026b5f5192f346a367dbc8ae5df0fd099b4e7a6dadd7f555b203f504eda86e0e8d8c5f319604db5a686750d03bf3a67210063e9a17ca0a1ccd80a7d57cb034b828b784b14c9e5dd70ca358c6819c3df7f4443dced6d9a56bb54eac6538cc61c5e9ef3bda9feeb62cbe4f0e1d1c7f6cbbcada85dbb247b0551773f0734e6f4733db49c22e497557c2f74bfa0e4af9b6228643f180d9f9e1e2bcdf0c35a5b8c388e728b574a066e190800db7b42573f534b8f60e8f756dc4d8dec7ad58b0474fc002851b265cc72099d43115828ac723e73009150fcf7196b4133e2988d4b0fc459e57293afef8837fa0d5d24b984a95cb4bdc48fc9c6e73ebee6b1a3239b2c0eef7c751ccb9f2dcdc3c69173db48df6b5d6e59e6465283de675a8d053e7f3abf86f43006a5a0c6225a589c12583e767b9d817f17bf690444a18e6f8a35b2cb4b60c191efbb16393560b568ee6c82bed918aa4a34b575ac9966b395aafa7fc3b7f467b484eb7d2617e0a240e8acbc2a7e02b650f7d1be52f462be20faa32dd88eb041e2c46b24ed7ab79c10f05296f5461f4ebda25dd7b9908da4be62b0871b169016fab8aae31c7ba45e5b30b7556a062999f43d2dbb9995d2d5de72ffe885bf6bce45caa470933c0906807da75cd38533d8f16d875452c543b259e78215011d2be638eab023513cfe0693d3107e17cfc87e038fc7d1db232d15307fe1d2a818d0a4bde2c53d221111ffa646514dd1fbd3c011b058f79c6fb0a31857ea309018bf72180a434611195c975cf5e285777231b6f158ecaf212183600379fe9762277c13cb6cde9cc0178b883fd1f210180e599f8eb33d33a9ff0f70db1de485b2f2434f2707bf9a54bb6aff687c515c430d5087f4d53a57adf7c97a06dcc61d7733a93dc505d57d8d5c83bf83e345a979307d708756c3f0f1c53a28883b665fda239019f32fc6f07d700d05023e9ef5b66d4b6be57ffd6fe39703fd4eed61535568f47ee51eff8290618e8387d0ba0d00c5bc4585d2d85688af46bb1da08bf42901634cb10e6b03ee276c16980090b59f3c57b428ae0a7ede758c781e2a5a8585e903adde0a0a281a7779a59067d82985655d9138b75042970e11aee4b95b8bcf232473767cca0139b2c2fb40045c6e031950c314015db2524c3f2fe941f249d158a44aa14774e61b2ee185bdfea8f317e440a39533c6db7ffd3c2b626c1e1e088bcebc59526b016cc6a0e4b766c3f00f619d366e5a4378bc15f805a6fb8c9400"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:48:09 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xffff8880983f5a18, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:09 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x9) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) [ 1775.466348][T12544] BPF:[1] Invalid name_offset:4294967293 [ 1775.473655][T12544] BPF:[1] Invalid name_offset:4294967293 20:48:09 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000053c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 20:48:09 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xe8) ioprio_get$uid(0x3, r0) r1 = syz_open_dev$ndb(&(0x7f0000000280)='/dev/nbd#\x00', 0x0, 0x20500) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f00000002c0)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000200), &(0x7f0000000300)=0xc) open(&(0x7f0000000040)='./file0\x00', 0xa2941, 0x80) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, &(0x7f0000000080)) 20:48:09 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43622c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:09 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_PCM_IOCTL_RESUME(r0, 0x4147, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:48:09 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1775.880300][T12666] BPF:[1] Invalid name_offset:4294967293 20:48:09 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xb, 0x7, 0x209e20, 0x8, 0x1}, 0x3c) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x8}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r2, &(0x7f0000000000), &(0x7f0000000140)=""/130}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f00000000c0)="bfecfadd68", &(0x7f0000000340)=""/203}, 0x20) [ 1776.006926][T30874] tipc: TX() has been purged, node left! 20:48:09 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:09 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43623c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:09 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f00000001c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYRESDEC=r0], &(0x7f0000000000)=""/253, 0x14, 0xfd, 0xa}, 0x20) 20:48:09 executing program 2: socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000080)={{0x7000, 0x2000, 0x0, 0x5, 0x81, 0x0, 0x5, 0x46, 0x2f, 0xfe, 0xb3, 0x46}, {0xd000, 0x1000, 0x0, 0x7, 0x1, 0x9, 0x5, 0x6, 0x80, 0xb2, 0x3b, 0x6}, {0x2000, 0x10000, 0x3, 0x8, 0xff, 0x1, 0x7c, 0xc0, 0x92, 0x8, 0x0, 0xe1}, {0x1, 0x1000, 0x10, 0x9, 0x7, 0x7f, 0x9b, 0x8, 0x7, 0x50, 0x4, 0x20}, {0x2000, 0x4, 0xd, 0x2, 0x0, 0x8, 0x1, 0x1, 0x7f, 0x81, 0x0, 0x9}, {0x1000, 0x100000, 0xc, 0x9, 0x1, 0x4, 0x5b, 0x5, 0x81, 0x1, 0x5, 0x2}, {0x10000, 0xd000, 0x10, 0x7, 0x70, 0x7f, 0x30, 0x81, 0x9, 0xd9, 0x0, 0x7}, {0x3000, 0xf000, 0x9, 0x5, 0x2, 0xa6, 0x3f, 0x0, 0xff, 0xf3, 0x5, 0x1}, {0x6001, 0x3000}, {0xc0017683c1c598, 0x1}, 0x4, 0x0, 0x0, 0x198951825c3ccdff, 0xf, 0x0, 0x5000, [0x3, 0x4, 0x5, 0x8]}) 20:48:10 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x1, @remote, 0x1}, 0x1c) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x3, 0x70, 0x5, 0x20, 0x40, 0xd9, 0x0, 0xffff, 0x202, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff753, 0x0, @perf_bp={&(0x7f0000000080), 0xd}, 0x20410, 0x0, 0x7, 0x7, 0x800, 0x2000008, 0xd}) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) dup(0xffffffffffffffff) listen(r1, 0x5) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x90, 0x7, 0x6, "d9f1d9858a020463c189a024b0ac02ac", "a2c88cb4102f8048d09b9120923708fe1e7027435872b9380f6c71094630d80feece870b7a94abeba804ddc28e0929a74c65876b495ace32ffc3e694dcd0ddd5f94246136cdc6b1c71633bf64ab01e64f722ba6ffe83447a5593800bbb836b8a3e776b4bc39c91dcc3d1f1c20e44cb9a197c678eb1c62647801089"}, 0x90, 0x0) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00422dbd7000ffdbdf250e0000001600050008000100756470000800010065746800"], 0x28}, 0x1, 0x0, 0x0, 0x21}, 0x4042004) 20:48:10 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x105482) write(r0, &(0x7f0000000000), 0x52698b21) 20:48:10 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcsa\x00', 0x80800, 0x0) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES32, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYPTR64, @ANYRESHEX=0x0, @ANYBLOB="e6b675b5cae0b2ff33b5f80d31eb48fd892fc4a070f50f80c0943cc3a4bedb12f42bc989d1c097daa057a767ae4ba07eb3989bbeca274fb6f7a24661f83dfd3641711664c1196ebdb78b8ca5ce5607000000004f4ce0ceb5", @ANYRES64]]], &(0x7f0000000040)=""/243, 0x8, 0xf3, 0x8}, 0x20) 20:48:10 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43624c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1776.664138][T12897] BPF:Invalid magic 20:48:10 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x200081, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x80c, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz1\x00', 0x1ff) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000000c0)={'raw\x00'}, &(0x7f0000000140)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r3, &(0x7f0000000380)='syz0\x00', 0x1ff) setsockopt$inet_tcp_int(r3, 0x6, 0xa, &(0x7f0000000180), 0x4) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) 20:48:10 executing program 4: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44000) fallocate(r1, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) write$P9_RREADLINK(r0, &(0x7f0000000300)={0xe, 0x17, 0x0, {0x5, './bus'}}, 0xe) io_submit(r2, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000000000000, 0x0, 0x8, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) 20:48:10 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) inotify_init() bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], '\x00\x00\x00'}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1777.035464][T13011] BPF:[1] Invalid name_offset:4294967293 [ 1777.709644][T30874] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1777.736422][T30874] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1777.757149][T30874] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1777.764606][T30874] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1777.787457][T30874] device bridge_slave_1 left promiscuous mode [ 1777.796862][T30874] bridge0: port 2(bridge_slave_1) entered disabled state [ 1777.836885][T30874] device bridge_slave_0 left promiscuous mode [ 1777.843150][T30874] bridge0: port 1(bridge_slave_0) entered disabled state [ 1777.901125][T30874] device veth1_macvtap left promiscuous mode [ 1777.910817][T30874] device veth0_macvtap left promiscuous mode [ 1777.917403][T30874] device veth1_vlan left promiscuous mode [ 1777.923162][T30874] device veth0_vlan left promiscuous mode [ 1779.606568][T30874] device hsr_slave_0 left promiscuous mode [ 1779.646564][T30874] device hsr_slave_1 left promiscuous mode [ 1779.704133][T30874] team0 (unregistering): Port device team_slave_1 removed [ 1779.721901][T30874] team0 (unregistering): Port device team_slave_0 removed [ 1779.733403][T30874] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1779.790959][T30874] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1779.875596][T30874] bond0 (unregistering): Released all slaves [ 1779.977889][T13116] IPVS: ftp: loaded support on port[0] = 21 [ 1780.119350][T13116] chnl_net:caif_netlink_parms(): no params data found [ 1780.195787][T13116] bridge0: port 1(bridge_slave_0) entered blocking state [ 1780.216289][T13116] bridge0: port 1(bridge_slave_0) entered disabled state [ 1780.236386][T13116] device bridge_slave_0 entered promiscuous mode [ 1780.257287][T13116] bridge0: port 2(bridge_slave_1) entered blocking state [ 1780.264423][T13116] bridge0: port 2(bridge_slave_1) entered disabled state [ 1780.290521][T13116] device bridge_slave_1 entered promiscuous mode [ 1780.335814][T13116] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1780.357546][T13116] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1780.398605][T13116] team0: Port device team_slave_0 added [ 1780.405608][T13116] team0: Port device team_slave_1 added [ 1780.447442][T13116] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1780.454453][T13116] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1780.509206][T13116] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1780.537526][T13116] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1780.544581][T13116] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1780.606293][T13116] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1780.708372][T13116] device hsr_slave_0 entered promiscuous mode [ 1780.750626][T13116] device hsr_slave_1 entered promiscuous mode [ 1780.885890][T13116] bridge0: port 2(bridge_slave_1) entered blocking state [ 1780.893014][T13116] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1780.900374][T13116] bridge0: port 1(bridge_slave_0) entered blocking state [ 1780.907428][T13116] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1780.983618][T13116] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1780.993319][T30608] bridge0: port 1(bridge_slave_0) entered disabled state [ 1781.002007][T30608] bridge0: port 2(bridge_slave_1) entered disabled state [ 1781.019649][T13116] 8021q: adding VLAN 0 to HW filter on device team0 [ 1781.027287][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1781.035304][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1781.058205][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1781.067445][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1781.076091][T30608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1781.083148][T30608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1781.092216][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1781.101290][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1781.110243][T30608] bridge0: port 2(bridge_slave_1) entered blocking state [ 1781.117414][T30608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1781.125641][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1781.135277][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1781.144897][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1781.154074][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1781.163578][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1781.173018][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1781.182318][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1781.191148][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1781.202974][T13116] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1781.215232][T13116] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1781.225225][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1781.234855][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1781.243780][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1781.264788][T13116] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1781.274084][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1781.282305][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1781.359328][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1781.369853][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1781.392014][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1781.403086][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1781.414284][T13116] device veth0_vlan entered promiscuous mode [ 1781.425086][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1781.434566][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1781.447806][T13116] device veth1_vlan entered promiscuous mode [ 1781.469224][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1781.480971][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1781.489528][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1781.501440][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1781.512357][T13116] device veth0_macvtap entered promiscuous mode [ 1781.526283][T13116] device veth1_macvtap entered promiscuous mode [ 1781.540470][T13116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1781.551713][T13116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1781.561592][T13116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1781.572116][T13116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1781.582454][T13116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1781.593264][T13116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1781.603502][T13116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1781.614311][T13116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1781.624556][T13116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1781.635302][T13116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1781.647143][T13116] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1781.655191][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1781.664086][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1781.672840][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1781.682159][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1781.692844][T13116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1781.704089][T13116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1781.714379][T13116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1781.725160][T13116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1781.735354][T13116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1781.746141][T13116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1781.756261][T13116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1781.767103][T13116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1781.777232][T13116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1781.787901][T13116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1781.799224][T13116] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1781.807791][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1781.817307][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1781.951178][T13126] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:48:15 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000540)=""/201, 0xc9}, {&(0x7f0000000640)=""/202, 0xca}, {&(0x7f0000000740)=""/59, 0x3b}], 0x3}, 0x10000) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'batadv_slave_1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_MPATH(r1, &(0x7f0000000a00)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x1}, 0x5c, &(0x7f00000009c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042dbd7000ffdbdf25170000000c00990009000000040000000a00060054bf8d40d81ecef021000300", @ANYRES32=r2, @ANYBLOB="8a89cf765973b89ea966f34c91f8b1713aaac5693ad1389280097b3c12881c6b0a7ac80a4b1bee398283e069972a953e2e6c6e75"], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x8001) r3 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890c, &(0x7f0000000000)) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f00000000c0)={0x3, 'ip6gre0\x00', {0x75}, 0x24}) [ 1782.004871][T13125] fuse: Bad value for 'fd' 20:48:15 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43625c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:15 executing program 4: creat(0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) r0 = getpid() tkill(r0, 0x9) syz_open_procfs(0x0, &(0x7f0000000100)='net/unix\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) syncfs(r1) close(r1) r2 = open(0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000540)=ANY=[], 0x0) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x50, r3, 0x0, 0x0, 0x25dddbff, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @remote}, @NLBL_MGMT_A_FAMILY={0x6}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @empty}]}, 0x50}}, 0x80) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x60, r3, 0x8, 0x0, 0x25dfdbfb, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_DOMAIN={0xd, 0x1, '/dev/vcs\x00'}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x1a}, @NLBL_MGMT_A_DOMAIN={0x24, 0x1, 'ppp1md5sum%[#proc/%-cpusetwlan0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, &(0x7f0000000100)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80082, 0x0) sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, 0x0, 0x4004084) getgid() syz_read_part_table(0x0, 0x0, 0x0) 20:48:15 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0xe0, r1, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7f}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x3e}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x20}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_FWD_METHOD={0x6, 0x3, 0x1}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x20}, 0x850) 20:48:15 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43b3ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1782.120510][T13136] BPF:[1] Invalid name_offset:4294967293 [ 1782.165004][T13136] BPF:[1] Invalid name_offset:4294967293 20:48:16 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43626c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e20, 0xf0000000, @dev={0xfe, 0x80, [], 0x36}, 0xc6cf}, {0xa, 0x4e24, 0x101, @ipv4={[], [], @rand_addr=0x80}, 0x100}, 0x8, [0x4b2f, 0x7ffc, 0xfffff001, 0xffffffc0, 0x5, 0x600, 0x1ae, 0x180000]}, 0x5c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000180)=""/169) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000140)=""/4096) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r3, &(0x7f0000000380)='syz0\x00', 0x1ff) r4 = syz_open_dev$vcsn(&(0x7f0000001140)='/dev/vcs#\x00', 0x1, 0x8402) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000e5b000)={0x2, 0x4e20, @loopback}, 0x10) connect$inet(r5, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f000031aff8)={r5, r6}) sendmsg$IPSET_CMD_TYPE(r3, &(0x7f00000013c0)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001380)={&(0x7f00000012c0)={0x98, 0xd, 0x6, 0x100, 0x0, 0x0, {0x0, 0x0, 0x1}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xc}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xc}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x98}, 0x1, 0x0, 0x0, 0x884}, 0x0) connect$inet(r5, &(0x7f0000001240)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) write$cgroup_int(r2, &(0x7f0000001200)=0x6, 0x12) ioctl$ION_IOC_HEAP_QUERY(r4, 0xc0184908, &(0x7f00000011c0)={0x34, 0x0, &(0x7f0000001180)}) ioctl$CAPI_INSTALLED(r3, 0x80024322) accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000100)=0x1c) [ 1782.289374][T13247] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:48:16 executing program 5: clone(0x2a00100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018010000000000001c1100001c00000002000000fdffffff000f030000007794b900"/54], &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1782.394547][T13151] fuse: Bad value for 'fd' 20:48:16 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da45c3ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:16 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01f817000000010000001c0000001c00000002000074f59acbff0000000401000000f3000000000000000f262312963f3300ef0c2468a0e692e53061a542ed6086c980a95ea56fbc088c408ac9c4c1a0d59a09901f80ab229789c74141001166cc000000000000000000000000000063a93a837945a1e6ad6a54f9"], &(0x7f00000001c0)=""/252, 0x7d, 0xfc}, 0x20) [ 1782.504498][T13256] BPF:btf_header not found [ 1782.511298][T13252] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 20:48:16 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:16 executing program 4: creat(0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) r0 = getpid() tkill(r0, 0x9) syz_open_procfs(0x0, &(0x7f0000000100)='net/unix\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) syncfs(r1) close(r1) r2 = open(0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000540)=ANY=[], 0x0) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x50, r3, 0x0, 0x0, 0x25dddbff, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @remote}, @NLBL_MGMT_A_FAMILY={0x6}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @empty}]}, 0x50}}, 0x80) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x60, r3, 0x8, 0x0, 0x25dfdbfb, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_DOMAIN={0xd, 0x1, '/dev/vcs\x00'}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x1a}, @NLBL_MGMT_A_DOMAIN={0x24, 0x1, 'ppp1md5sum%[#proc/%-cpusetwlan0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, &(0x7f0000000100)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80082, 0x0) sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, 0x0, 0x4004084) getgid() syz_read_part_table(0x0, 0x0, 0x0) 20:48:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x1, 0x1, 0xbe) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x800, 0x70bd2b, 0x25dfdbfc, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2c}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}]}, 0x2c}}, 0x804) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) waitid$P_PIDFD(0x3, r3, &(0x7f00000001c0), 0x20000000, &(0x7f0000000240)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r4, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$MON_IOCH_MFLUSH(r4, 0x9208, 0x9e1) 20:48:16 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43627c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1782.763651][T13274] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:48:16 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3f, 0x4802) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000040)=@null) [ 1782.839737][T13269] fuse: Bad value for 'fd' 20:48:16 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc) 20:48:16 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000200)={0x5, 0x3, 0x4, 0x200000, 0xfffffffa, {0x0, 0x2710}, {0x4, 0xc, 0x0, 0x5, 0x36, 0x8, "dede6aae"}, 0xe4ee, 0x2, @planes=&(0x7f00000001c0)={0x2, 0x8, @fd}, 0x1f, 0x0, r0}) ioctl$SIOCAX25OPTRT(r2, 0x89e7, &(0x7f0000000280)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x2, 0x20}) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000080)={0x1, 0x0, {0x0, 0x6, 0x1, 0x1}}) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r3 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890c, &(0x7f0000000000)) recvfrom(r3, &(0x7f00000000c0)=""/88, 0x58, 0x40000000, &(0x7f0000000140)=@ipx={0x4, 0x1000, 0x3, "cb8d87d0f743", 0x80}, 0x80) [ 1782.981063][T13285] BPF:[1] Invalid name_offset:4294967293 20:48:16 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363bc0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1783.023461][T13285] BPF:[1] Invalid name_offset:4294967293 [ 1783.135026][T13397] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:48:16 executing program 4: 20:48:17 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) getpeername$llc(r0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1783.292235][T13397] fuse: Bad value for 'fd' 20:48:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) write$P9_RREMOVE(r1, &(0x7f0000000240)={0x7, 0x7b, 0x1}, 0x7) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0xe0001, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) ioctl(r4, 0x8, &(0x7f0000000140)="fa83d3a72bebb6d33cc5b84543ad6c558f9902bcf3ce62d2fb634ba8d44258107a3c360c593948904a730c488e4453c638b1a8c85cc084ba4b1a35d7b2e03809db875445fd918d11d521dccbb5ff2f6dc1a09f1c825cd14b7c72abd5ad93e082b957e31bc6ae6786e5619e6fd62f1d560ae119caee072603dce734c50bb6a1997c634a8b88c9165c6895ca8624de9edf0d473114c5d76e7ff5bddbbf1266df0cae14d7e668d0c3cb42ccea0b4c30c53f2b5f8578da2bdc2e4d015c4391ad4e9ceabfa56ae10ebe01639397640f56415919151ee20d0cf14040b0bb367d073d15") ioctl$SNDRV_TIMER_IOCTL_INFO(r3, 0x80e85411, &(0x7f0000000100)=""/24) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000300)={r2, &(0x7f0000000280)="14fa752b5cfaa2f640c099276b63fd2d1453cde8c76935aecefe137b68b524ea6e1a09398b3f68136cf0a7b4a942fa1621bcd179c6da17a86727dcfbcc8cede71bf5977429dcd222e108b5ebff6addde90f7d93542b72bf0dcb86a879dece6cbc8f4ccc429eb9274dbb74a519c78ca8db5ed9b5d037e5e8fb3b1b81e07"}, 0x20) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) getpeername$l2tp(r2, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10) 20:48:17 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43628c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:17 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:17 executing program 4: [ 1783.457873][T13408] BPF:[1] Invalid name_offset:4294967293 20:48:17 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363a24ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:17 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0x1f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) [ 1783.633256][T13517] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:48:17 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000240)}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) r2 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGSERIAL(r2, 0x541e, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x1}, 0x0, 0x5, r2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000006c0)=ANY=[@ANYBLOB="2000000011000d0400"/20, @ANYRES32=r5, @ANYBLOB="000400006a4d767fe38a83f3d536fb2b9b2f072f00000000"], 0x20}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'ip_vti0\x00', r5}) r7 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x65400) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000000)) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x65400) ioctl$EXT4_IOC_SETFLAGS(r8, 0x40086602, &(0x7f0000000000)=0xaa850ab34c804c98) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r8, &(0x7f00000006c0)}]) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r8, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x1, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x1, 0x8, 0x10001}, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x2f}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={r7, 0x10, &(0x7f0000000640)={&(0x7f0000000440)=""/203, 0xcb, r9}}, 0x10) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcs\x00', 0x20080, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x7, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x528dbc8d, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1f8000, 0x0, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0x7, 0x6, 0x1, 0xfffffffffffffff8, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000000140)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x1, [], r6, 0x10, r2, 0x8, &(0x7f0000000400)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xe, 0xfff, 0x9}, 0x10, r9, r10}, 0x78) r11 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x242301) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1a, 0x3, &(0x7f0000000000)=@raw=[@exit, @map={0x18, 0x9, 0x1, 0x0, r0}], &(0x7f0000000040)='GPL\x00', 0x4, 0xf1, &(0x7f0000000080)=""/241, 0x41000, 0x12, [], r1, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0x10, 0x2, 0x5}, 0x10, r9, r11}, 0x78) 20:48:17 executing program 4: [ 1783.777749][T13531] BPF:[1] Invalid name_offset:4294967293 20:48:17 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:17 executing program 4: 20:48:17 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43629c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1783.947044][T13531] BPF:[1] Invalid name_offset:4294967293 20:48:17 executing program 4: 20:48:17 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000040)='mountinfo\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x603ae) 20:48:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x581000, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000080)={r4, 0x6}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)={r4, 0x54, "d29c0ce7eb782ee09d1de9ef863be6bbd8286045e63b33b954fe9bff9cdaa47f0ba217c234c7f1d8d9fe2d6fe233b2f9dcc4c20bbebe9cabdfa898949c569585d16de6ed8dc0986c8e1a3a3ae4de65d2009e22d9"}, &(0x7f0000000100)=0x5c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x61c05f55, 0x6, 0x101, 0x3, 0xffe1, 0xe9, 0xd5, {r5, @in6={{0xa, 0x4e22, 0x1ff, @loopback, 0x80}}, 0x0, 0x8, 0x4, 0x683, 0x20}}, &(0x7f0000000200)=0xb0) socket$bt_hidp(0x1f, 0x3, 0x6) 20:48:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) 20:48:17 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363a9fed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:17 executing program 4: 20:48:18 executing program 4: 20:48:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) r3 = socket$kcm(0xa, 0x5, 0x0) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0xc87e, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, &(0x7f0000000400), &(0x7f0000000440)=0x4) mkdirat$cgroup(r4, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$VIDIOC_ENUMAUDIO(r4, 0xc0345641, &(0x7f00000003c0)={0x2, "5b303ee3a13db6f133301e81271dac10a56a9f2d10465c00221cdd3097f6eeae", 0x1, 0x1}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890c, &(0x7f0000000000)) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000180)={0x0, 0xfff, 0x0, r3, 0x0, &(0x7f0000000140)={0x9a0902, 0x8, [], @value=0xffffffff}}) ioctl$RTC_AIE_OFF(r5, 0x7002) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) r6 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x890c, &(0x7f0000000000)) splice(r1, &(0x7f00000000c0)=0xffff, r6, &(0x7f0000000100)=0x6, 0x10001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) set_tid_address(&(0x7f0000000280)) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000002c0)="ff06b662000a40d483ffeece1dba92e4b4b480cb7b2c248a47bcb2c9cccfc42ad41e8f21612287dbf9c7450b596bd27496944d21f72448a939d7d07549ef6ba921673c05a3900de97b1ca0e35056bc3cdfd96caf2ca37a12f596f3047081", 0x5e) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000001c0), 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480)='/dev/snapshot\x00', 0x40, 0x0) r8 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x890c, &(0x7f0000000000)) fstat(r8, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25DELUID(r7, 0x89e2, &(0x7f0000000540)={0x3, @bcast, r9}) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000000)={0xa, 0x0, 0x8dee35f9, @ipv4={[], [], @remote}, 0x1}, 0x1c) 20:48:18 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4362ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:18 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:18 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000000c0)={@initdev, 0x0}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={@remote, 0x6d, r1}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) gettid() 20:48:18 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed03000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1784.636289][ T8086] tipc: TX() has been purged, node left! 20:48:18 executing program 4: [ 1784.689603][T13768] BPF:[1] Invalid name_offset:4294967293 20:48:18 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:18 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x27, 0x1, 0x20, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002dcab7d7bffffff0000000401000000f3000000000000000f030000007794b90000"], &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:48:18 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4362bc0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:18 executing program 4: [ 1785.169588][T13884] BPF:Total section length too long 20:48:18 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed04000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x10000, @remote, 0x1}, 0x1c) 20:48:19 executing program 4: 20:48:19 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4362cc0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:19 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="02002dc47000fedbdf25070000000500010000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x206b7eb5866e29aa}, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1785.490892][T13993] BPF:[1] Invalid name_offset:4294967293 20:48:19 executing program 2: timer_create(0x6, &(0x7f0000000140)={0x0, 0x23, 0x0, @thr={&(0x7f0000000040)="dcb85942bd194bfb8d962f7491aa1b66ed167879a1380799e5b26ac00779db7664103d640587115e357151d04b752eba80694d348f", &(0x7f0000000080)="1f7caad92e435a02ccb97720c9b9b289a627de87b089ac75d346b3e543ce977a8600334c9ddde7ab093b6631e4447870dc26c2d268fbdb5552c80deb4569a9b1b5b9f364b9ff21ddea1e031707afebd8085d90376a40884f042b53655e819bd26f0e68d739fefb05ddf430973f90ceab2364d446492711b9ebc2bd609578b4cfe627235fd12fd8a7d326356cc9590663c5a5504ef68c237fcd841c3ba5a2a4bb5256c0eef8363cd1ece33b97417a785739c24f3de049f432c9923629d2"}}, &(0x7f0000000180)) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfffe, 0x0, @local, 0x1}, 0x1c) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x88) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$SNDRV_PCM_IOCTL_RESET(r2, 0x4141, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000200)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240)=0xfff, 0x3) 20:48:19 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:48:19 executing program 4: [ 1785.810749][T14105] BPF:[1] Invalid name_offset:4294967293 [ 1786.399637][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1786.416404][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1786.450547][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1786.458082][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1786.490385][ T8086] device bridge_slave_1 left promiscuous mode [ 1786.496756][ T8086] bridge0: port 2(bridge_slave_1) entered disabled state [ 1786.570678][ T8086] device bridge_slave_0 left promiscuous mode [ 1786.589665][ T8086] bridge0: port 1(bridge_slave_0) entered disabled state [ 1786.655126][ T8086] device veth1_macvtap left promiscuous mode [ 1786.664444][ T8086] device veth0_macvtap left promiscuous mode [ 1786.673957][ T8086] device veth1_vlan left promiscuous mode [ 1786.679749][ T8086] device veth0_vlan left promiscuous mode [ 1788.626652][ T8086] device hsr_slave_0 left promiscuous mode [ 1788.676357][ T8086] device hsr_slave_1 left promiscuous mode [ 1788.745273][ T8086] team0 (unregistering): Port device team_slave_1 removed [ 1788.757870][ T8086] team0 (unregistering): Port device team_slave_0 removed [ 1788.773514][ T8086] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1788.843435][ T8086] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1788.934186][ T8086] bond0 (unregistering): Released all slaves [ 1789.055310][T14210] IPVS: ftp: loaded support on port[0] = 21 [ 1789.204004][T14210] chnl_net:caif_netlink_parms(): no params data found [ 1789.282393][T14210] bridge0: port 1(bridge_slave_0) entered blocking state [ 1789.310317][T14210] bridge0: port 1(bridge_slave_0) entered disabled state [ 1789.318777][T14210] device bridge_slave_0 entered promiscuous mode [ 1789.346544][T14210] bridge0: port 2(bridge_slave_1) entered blocking state [ 1789.353687][T14210] bridge0: port 2(bridge_slave_1) entered disabled state [ 1789.365116][T14210] device bridge_slave_1 entered promiscuous mode [ 1789.387750][T14210] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1789.401810][T14210] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1789.425096][T14210] team0: Port device team_slave_0 added [ 1789.432260][T14210] team0: Port device team_slave_1 added [ 1789.451078][T14210] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1789.461318][T14210] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1789.490672][T14210] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1789.502985][T14210] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1789.513570][T14210] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1789.543271][T14210] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1789.648885][T14210] device hsr_slave_0 entered promiscuous mode [ 1789.699925][T14210] device hsr_slave_1 entered promiscuous mode [ 1789.851378][T14210] bridge0: port 2(bridge_slave_1) entered blocking state [ 1789.858482][T14210] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1789.865756][T14210] bridge0: port 1(bridge_slave_0) entered blocking state [ 1789.872813][T14210] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1789.923027][T14210] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1789.936434][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1789.948399][T10494] bridge0: port 1(bridge_slave_0) entered disabled state [ 1789.958643][T10494] bridge0: port 2(bridge_slave_1) entered disabled state [ 1789.974315][T14210] 8021q: adding VLAN 0 to HW filter on device team0 [ 1789.990035][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1790.000699][T10494] bridge0: port 1(bridge_slave_0) entered blocking state [ 1790.007762][T10494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1790.030560][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1790.042105][ T8683] bridge0: port 2(bridge_slave_1) entered blocking state [ 1790.049243][ T8683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1790.073944][T14210] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1790.084652][T14210] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1790.111737][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1790.122950][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1790.135270][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1790.146449][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1790.165403][T14210] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1790.177336][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1790.185978][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1790.208648][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1790.225700][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1790.290713][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1790.302069][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1790.323852][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1790.334081][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1790.345685][T14210] device veth0_vlan entered promiscuous mode [ 1790.355216][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1790.365202][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1790.378168][T14210] device veth1_vlan entered promiscuous mode [ 1790.400048][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1790.409671][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1790.420580][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1790.431583][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1790.442741][T14210] device veth0_macvtap entered promiscuous mode [ 1790.459173][T14210] device veth1_macvtap entered promiscuous mode [ 1790.473747][T14210] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1790.484375][T14210] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1790.494613][T14210] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1790.505490][T14210] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1790.515631][T14210] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1790.526528][T14210] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1790.536686][T14210] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1790.547546][T14210] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1790.557757][T14210] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1790.568839][T14210] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1790.580247][T14210] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1790.589148][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1790.598115][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1790.606696][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1790.615626][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1790.625962][T14210] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1790.637255][T14210] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1790.647518][T14210] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1790.658325][T14210] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1790.668380][T14210] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1790.679235][T14210] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1790.689616][T14210] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1790.700398][T14210] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1790.710812][T14210] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1790.721722][T14210] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1790.733349][T14210] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1790.742338][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1790.751836][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1790.859077][T14219] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:48:24 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:24 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed05000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:24 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) 20:48:24 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4362dc0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:24 executing program 4: 20:48:24 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x80000) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'xfrm0\x00', 0x1}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1790.968957][T14227] BPF:[1] Invalid name_offset:4294967293 20:48:24 executing program 4: 20:48:24 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r1}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r2, &(0x7f0000000100)="1c9d", 0x0}, 0x20) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@ipv4={[], [], @local}, 0x0}, &(0x7f00000000c0)=0x14) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r4, &(0x7f0000000380)='syz0\x00', 0x1ff) r5 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGSERIAL(r5, 0x541e, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x1}, 0x0, 0x5, r5, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) bind$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="2000000011000d0400"/20, @ANYRES32=r8, @ANYBLOB="0004000000000000"], 0x20}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'ip_vti0\x00', r8}) r10 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r10, 0x4, 0x65400) ioctl$EXT4_IOC_SETFLAGS(r10, 0x40086602, &(0x7f0000000000)) r11 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r11, 0x4, 0x65400) ioctl$EXT4_IOC_SETFLAGS(r11, 0x40086602, &(0x7f0000000000)=0xaa850ab34c804c98) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r11, &(0x7f00000006c0)}]) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r11, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x1, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x1, 0x8, 0x10001}, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x2f}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={r10, 0x10, &(0x7f0000000640)={&(0x7f0000000440)=""/203, 0xcb, r12}}, 0x10) r13 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcs\x00', 0x20080, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x7, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x528dbc8d, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1f8000, 0x0, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0x7, 0x6, 0x1, 0xfffffffffffffff8, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000000140)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x1, [], r9, 0x10, r5, 0x8, &(0x7f0000000400)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xe, 0xfff, 0x9}, 0x10, r12, r13}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f0000000240)=""/211, 0xd3, r12}}, 0x10) r15 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-control\x00', 0x4040, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc742, 0x0, 0x0, 0x0, 0xc69}, [@alu={0x4, 0x0, 0x4, 0x9, 0x7, 0xfffffffffffffff8, 0xa9ce3b1e183d43ce}, @map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000040)='syzkaller\x00', 0x400, 0x0, 0x0, 0x41000, 0x6, [], r3, 0xd, r4, 0x8, &(0x7f0000000100)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0xa, 0x5cca, 0x1f146dad}, 0x10, r14, r15}, 0x78) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:48:24 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed06000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r2 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890c, &(0x7f0000000000)) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x4000, 0x2, {0x0, 0x2710}, {0x4, 0x2, 0x1f, 0x2, 0x69, 0xfb, "ddc58690"}, 0x1ff, 0x0, @planes=&(0x7f0000000180)={0x1ff, 0x0, @userptr=0xffffffffffff0001, 0x401}, 0xddb, 0x0, r2}) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, r5) keyctl$clear(0x7, r5) keyctl$get_security(0x11, r4, &(0x7f00000003c0)=""/162, 0xa2) 20:48:25 executing program 4: 20:48:25 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1791.392591][T14340] BPF:[1] Invalid name_offset:4294967293 20:48:25 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4362ec0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1791.536592][ T8086] tipc: TX() has been purged, node left! 20:48:25 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:25 executing program 4: 20:48:25 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x70000, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x100, 0x70bd28, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40804}, 0x41) r2 = socket$kcm(0xa, 0x5, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ubi_ctrl\x00', 0x101080, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890c, &(0x7f0000000000)) r4 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x890b, &(0x7f0000000000)) r5 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x890c, &(0x7f0000000000)) r6 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x890c, &(0x7f0000000000)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000240)={0xfffffffffffffffa, 0x4, 0x3, 0x0, 0x0, [{{r5}, 0x100}, {{r3}, 0xc172}, {{r6}, 0x8}]}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x890c, &(0x7f0000000000)) r7 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x890c, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x890b, &(0x7f0000000340)={r7}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890c, &(0x7f0000000000)) r8 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x890c, &(0x7f0000000000)) fcntl$dupfd(r2, 0x406, r8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9f00000018000000000000441c0000001c02001002000000fdffffff00000004caba26c1b901000000f30094b90000f021acbfba0e17631743ab620864747d8a753469e0ec4fe1b200e4c03f080000001ab6e1581334872ed68b84eee83e444bdd4c0f144887285c5f37bd819a49bb429be8bd091ad1e8fe80"], &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:48:25 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed07000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:25 executing program 4: 20:48:25 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4362fc0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:25 executing program 4: 20:48:26 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed08000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:26 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) r3 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890c, &(0x7f0000000000)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r4, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$UI_SET_MSCBIT(r4, 0x40045568, 0x6) fstat(r3, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000480)=@getpolicy={0x234, 0x15, 0x800, 0x70bd2b, 0x25dfdbfe, {{@in=@broadcast, @in6=@ipv4={[], [], @loopback}, 0x4e22, 0x1, 0x4e23, 0xffff, 0xa, 0x20, 0x20, 0x73, r2, r5}, 0x6e6bb8}, [@algo_comp={0x136, 0x3, {{'lzs\x00'}, 0x770, "c3b7d2713cdc457bf11253e5cffba4209ea410009b8995cc3cc0f9b92c345fb7f491e11cf6b9c6cf5516516eed87052b795b25530faf9c7c820a637de831074331bf9a75e9f011a75148b24abcc2911574234eff2b33f8a06136b863e91d4cd68280fc66127ef4514e42b6aad5bbd9f56252da84e3b0129c237fa79c9dd531a350799439d5c6a78e6cc7d5b0f31ecbfab755406fa7281891a89a4aafd405e5a974b1c9bc9e12448dc0b433d6fba98aa4cf793d419dab1de99b25b25fcf61d64958c0f35a0313cff36fc83d4e8187756e3fd13241d4a18eab5a391a554cf0900e46055f5cd6dbf03d9361e13fb442"}}, @algo_comp={0xac, 0x3, {{'lzs\x00'}, 0x320, "9c871c705ac006b3aee6bfe67e08d76a6aa0ee04ec2b6385391cfce3bcb0f2e9856aad8b5566cedb836d45b271587e746f978fae15e0075b260951a417e607b34eccbab6f8640eade879dcc15117f9b82591f7fa5764db3b8ae429a38adcc9b4ff190fdb"}}]}, 0x234}, 0x1, 0x0, 0x0, 0x14}, 0x0) 20:48:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sync_file_range(r1, 0x1, 0x8001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) r3 = socket(0x11, 0x5, 0xff) write(r3, 0x0, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r3, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x38, r4, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x40}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7fff}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="09abf2cd6849"}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x4081) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r4, 0x57bc98bb64b060ce, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x99ea}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000800}, 0x8000) 20:48:26 executing program 4: [ 1792.527758][T14573] BPF:[1] Invalid name_offset:4294967293 20:48:26 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43630c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1793.389986][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1793.419752][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1793.428419][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1793.435897][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1793.458939][ T8086] device bridge_slave_1 left promiscuous mode [ 1793.465253][ T8086] bridge0: port 2(bridge_slave_1) entered disabled state [ 1793.508074][ T8086] device bridge_slave_0 left promiscuous mode [ 1793.514551][ T8086] bridge0: port 1(bridge_slave_0) entered disabled state [ 1793.571144][ T8086] device veth1_macvtap left promiscuous mode [ 1793.580467][ T8086] device veth0_macvtap left promiscuous mode [ 1793.586940][ T8086] device veth1_vlan left promiscuous mode [ 1793.592713][ T8086] device veth0_vlan left promiscuous mode [ 1795.426646][ T8086] device hsr_slave_0 left promiscuous mode [ 1795.466455][ T8086] device hsr_slave_1 left promiscuous mode [ 1795.524873][ T8086] team0 (unregistering): Port device team_slave_1 removed [ 1795.535985][ T8086] team0 (unregistering): Port device team_slave_0 removed [ 1795.551389][ T8086] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1795.611357][ T8086] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1795.702318][ T8086] bond0 (unregistering): Released all slaves [ 1795.793753][T14685] IPVS: ftp: loaded support on port[0] = 21 [ 1795.931309][T14685] chnl_net:caif_netlink_parms(): no params data found [ 1796.016329][T14685] bridge0: port 1(bridge_slave_0) entered blocking state [ 1796.023453][T14685] bridge0: port 1(bridge_slave_0) entered disabled state [ 1796.047101][T14685] device bridge_slave_0 entered promiscuous mode [ 1796.054694][T14685] bridge0: port 2(bridge_slave_1) entered blocking state [ 1796.076302][T14685] bridge0: port 2(bridge_slave_1) entered disabled state [ 1796.084043][T14685] device bridge_slave_1 entered promiscuous mode [ 1796.118835][T14685] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1796.147812][T14685] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1796.187359][T14685] team0: Port device team_slave_0 added [ 1796.194039][T14685] team0: Port device team_slave_1 added [ 1796.237174][T14685] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1796.244158][T14685] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1796.270587][T14685] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1796.282591][T14685] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1796.289852][T14685] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1796.316153][T14685] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1796.408535][T14685] device hsr_slave_0 entered promiscuous mode [ 1796.446566][T14685] device hsr_slave_1 entered promiscuous mode [ 1796.582556][T14685] bridge0: port 2(bridge_slave_1) entered blocking state [ 1796.589775][T14685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1796.597170][T14685] bridge0: port 1(bridge_slave_0) entered blocking state [ 1796.604209][T14685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1796.640713][T14685] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1796.654490][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1796.664078][T10494] bridge0: port 1(bridge_slave_0) entered disabled state [ 1796.676077][T10494] bridge0: port 2(bridge_slave_1) entered disabled state [ 1796.700314][T14685] 8021q: adding VLAN 0 to HW filter on device team0 [ 1796.720276][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1796.736800][ T1960] bridge0: port 1(bridge_slave_0) entered blocking state [ 1796.743855][ T1960] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1796.768795][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1796.778056][T10494] bridge0: port 2(bridge_slave_1) entered blocking state [ 1796.785109][T10494] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1796.794821][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1796.805069][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1796.820312][T14685] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1796.830953][T14685] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1796.845062][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1796.854069][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1796.863385][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1796.883163][T14685] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1796.892318][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1796.900953][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1796.909019][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1796.979484][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1796.989229][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1797.003039][T14685] device veth0_vlan entered promiscuous mode [ 1797.010756][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1797.019542][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1797.032439][T14685] device veth1_vlan entered promiscuous mode [ 1797.040467][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1797.048994][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1797.057500][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1797.076946][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1797.085414][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1797.095189][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1797.105784][T14685] device veth0_macvtap entered promiscuous mode [ 1797.129350][T14685] device veth1_macvtap entered promiscuous mode [ 1797.152093][T14685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1797.162611][T14685] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1797.177178][T14685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1797.190640][T14685] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1797.201490][T14685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1797.215115][T14685] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1797.226282][T14685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1797.240303][T14685] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1797.250647][T14685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1797.264810][T14685] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1797.279927][T14685] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1797.287982][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1797.300577][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1797.311975][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1797.325447][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1797.335623][T14685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1797.350895][T14685] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1797.361620][T14685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1797.375572][T14685] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1797.385822][T14685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1797.402848][T14685] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1797.413062][T14685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1797.427287][T14685] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1797.439563][T14685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1797.451269][T14685] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1797.465289][T14685] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1797.477322][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1797.489425][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 20:48:31 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:31 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x1ec8}, 0x8) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0x8000) 20:48:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x8, @remote, 0x1}, 0x1c) openat$procfs(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/bus/input/devices\x00', 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f0000000080)) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) 20:48:31 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0a000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x24800, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000300)=0x3) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r4, 0x2008001) dup3(r5, r4, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r6, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000000), 0x200a00}]) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') socketpair$unix(0x1, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x2], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) getpeername$packet(r7, 0x0, &(0x7f0000000040)) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @local}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 20:48:31 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43631c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1797.631008][T14694] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1797.798125][T14703] BPF:[1] Invalid name_offset:4294967293 [ 1797.885724][ T26] audit: type=1804 audit(1579639711.579:121): pid=14811 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir154330200/syzkaller.T7zDa0/408/bus" dev="sda1" ino=17454 res=1 20:48:31 executing program 5: clone(0x9700a400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000803000000fdffffff0000b60cd8441caf9b120f453db3dbf0000401000000f500000000"], &(0x7f0000000380)=""/249, 0x37, 0xf9, 0x8}, 0x20) 20:48:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r3, &(0x7f0000000380)='syz0\x00', 0x1ff) accept$alg(r3, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000000c0)={0xc52d, 0x5, 0x4, 0x80000000, 0x20, {r4, r5/1000+10000}, {0x5, 0x2, 0x1f, 0x5, 0x2c, 0x4, "dd1b1fb0"}, 0x1, 0x1, @userptr=0xff9, 0x7fffffff, 0x0, 0xffffffffffffffff}) sendto$ax25(r6, &(0x7f00000001c0)="2d20cdbe202a35e7e762f977a291b15127db925a142f17df84e4360d94f7cab82fd902193c4065f1595014dfbfc12c328f3e35214f8249920e9ab2c201418d2c46a4e0ba2a3484ade3d1f414fe9925723f47ab2f9241294bac6ac8bdc9d49d10a42402c6c37498cef527a297c7acdd8c4b88ccd3d497f2bf091c8a14f7eb03b7aef2f8814e9091091fbb3ee1e91d97b2cff04000db7b60c057a44cfb9e95e92da5dab280187ce1067e261a94174f278b877e865004e16f", 0xb7, 0x20008012, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000180)={'lo\x00', &(0x7f0000000040)=@ethtool_cmd={0x49}}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) 20:48:31 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43632c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:31 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:31 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed10000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) 20:48:31 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000000c0)={0x980000, 0x7fffffff, 0x1, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x990a68, 0x9, [], @p_u32=&(0x7f0000000040)=0x8}}) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x40, 0x40, 0x1, 0x7db7a782}]}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0x1, 0x4, &(0x7f0000000680)=[{&(0x7f0000000480)="dc42de54949d9a42efbd21e847a2ca2a2d8e2a608e46f1c1c6c0ebd1b3c80fc34f8d46470103b2e0b868277c6cbfed3a79b32508fe5fac61e01a9f967f1370bbdc3a961d402c87a6c4ffce2f5cb1f2dcb69e0974263f67c07b52113c86489d6b4ed49f3ef7a00a168dff6ae83a974aeb9b7a73f39869f8e6d75f56ab168cdebbe81d58cfe93505a50539eb2be07141ae415bb1801ddce8715d844ac76dcc914b9dd6e1529d0b8dccf2524a53328dfde7e8cf6a17057c461b8777ef2d26f46bedd8b64b43b291110452e330f3ff444e18083686d680110ef3680334e45333f5c4e967d17e06f30d848a5428a2bd63ff03f3", 0xf1, 0x2}, {&(0x7f0000000300)="c5ae03e86953b64e2b5a1816d465de5346eed79dca3bc3ba3f681cc2cb561d2f5e63cf3f155468afdc44fc", 0x2b, 0x1000}, {&(0x7f0000000580)="73672e1e484a786d6c06f49b1538bc357bd840e0c07cd3cda291b34887b76dd23079d35ac0cb484604271b77844842d965ecb13502e89a2b03fbd2c1f7893dbbcbdf8d8d48db7915f508710144e7dcbcc5d347c2db540536f069848369e60e93d19b8209ee09967d89e8f4fafafcbc92271cd2c9262c", 0x76, 0x7}, {&(0x7f0000000600)="fb2a6b85be598b4177d12ddccb6ae465b0a145c6e731e033d0889e8062f418a89c2b37f47b8323a042b13a6ff618977713db9e205171a35f12bf432c379b4307148c5192159fd53495e5991336d2353c315bbc7f8cd8d99a08423b48282ec3701a9ab1f6980edfe4620fe9e569549b9e97faed02", 0x74, 0xa3e0}], 0x400, &(0x7f0000000700)={[{@nodots='nodots'}], [{@hash='hash'}, {@euid_eq={'euid', 0x3d, r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, '^wlan1'}}, {@obj_role={'obj_role'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYRES32], &(0x7f0000000380)=""/249, 0x4, 0xf9, 0x8}, 0x20) 20:48:32 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1798.316391][T30874] tipc: TX() has been purged, node left! [ 1798.418554][T14928] FAT-fs (loop5): Unrecognized mount option "hash" or missing value 20:48:32 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43633c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x1) [ 1798.580832][ T26] audit: type=1804 audit(1579639712.269:122): pid=15026 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir154330200/syzkaller.T7zDa0/408/bus" dev="sda1" ino=17454 res=1 20:48:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1e79712b405ea563, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x21000000108) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000014, &(0x7f00000000c0)=0x2, 0x4) sendmmsg(r1, &(0x7f0000007f40)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="9f", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)='!', 0x1}], 0x1}}], 0x127ad, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000040), 0x4) 20:48:32 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000fdffffff0000000401000000f3000000002000000f030000007794b90000edb9f2229df0da526e34811fc0d7435c55c902dfe4b20527c2a41f8e68a64f06a2e67c6868ff9882bd874626849e4924a4f0ed31a30ff8651cc640e7adef95c89364545dcb827226edff803595e8840c6ea4acb578b97a95151d8e1214"], &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:48:32 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed14000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:32 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) [ 1798.867978][T15051] BPF:[1] Invalid name_offset:4294967293 20:48:32 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) shutdown(r0, 0x1) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x80, r2, 0x1, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x30, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x905}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1ab}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfe000}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x8000) 20:48:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) write$P9_RSTAT(r1, &(0x7f0000000200)={0x7c, 0x7d, 0x2, {0x0, 0x75, 0x2eb, 0x400, {0x80, 0x4, 0x4}, 0x14c0000, 0x3, 0x1, 0xffff, 0xe, '/dev/snapshot\x00', 0x18, ',vboxnet1\xbafvboxnet0nodev', 0xe, '/dev/snapshot\x00', 0xe, '/dev/snapshot\x00'}}, 0x7c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x100, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000180)={&(0x7f0000000140)=[0x0], 0x1, 0x544, 0x19, 0x1, 0x8, 0x80, 0x3, {0x3, 0x1, 0x1, 0x2, 0x1ff, 0xff, 0x8000, 0x4, 0x1, 0x99e, 0xe54, 0x4, 0xef, 0x8, "2b7842a0848e4f8760d7ab082734442771c133043374a86e1de2ee3a8cccb704"}}) accept4$ax25(r2, &(0x7f0000000080)={{}, [@rose, @remote, @bcast, @remote, @default, @netrom, @null, @rose]}, &(0x7f0000000100)=0x48, 0x80400) 20:48:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1e79712b405ea563, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x21000000108) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000014, &(0x7f00000000c0)=0x2, 0x4) sendmmsg(r1, &(0x7f0000007f40)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="9f", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)='!', 0x1}], 0x1}}], 0x127ad, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000040), 0x4) [ 1799.173203][T15066] BPF:[1] Invalid name_offset:4294967293 [ 1799.228735][T15066] BPF:[1] Invalid name_offset:4294967293 20:48:33 executing program 5: ioctl$SNDCTL_DSP_GETODELAY(0xffffffffffffffff, 0x80045017, &(0x7f0000000000)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000340)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x400000, 0x0) mkdirat$cgroup(r3, &(0x7f00000000c0)='syz0\x00', 0x1ff) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000040)={0x4, 0x0, 0xfff9, 0x8}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000080)={@empty, 0x0}, &(0x7f0000000140)=0x14) setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000240)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@dev={0xac, 0x14, 0x14, 0xf}, 0x4e21, 0x0, 0x4e24, 0x200, 0x2, 0x20, 0xc0, 0x2b, r5}, {0x2, 0x200, 0x7f, 0xfffffffffffffffd, 0x3f, 0x10000, 0x7fffffff, 0x7ff}, {0x2, 0x1, 0x0, 0x3ff}, 0x4, 0x6e6bc0, 0x2, 0x1, 0x2, 0x1}, {{@in6=@ipv4={[], [], @loopback}, 0x4d2, 0x33}, 0xa, @in6=@remote, 0x3505, 0x0, 0x2, 0xfd, 0x80000001, 0x6, 0x6}}, 0xe8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb0100180000000000002052918a372b50ee4b3b5e02021c0000001c000000020000003923299400000004f4fcfffff30000000000"], &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:48:33 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43634c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1799.479229][T15176] BPF:Invalid section offset [ 1799.859801][T30874] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1799.877213][T30874] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1799.907469][T30874] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1799.915005][T30874] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1799.947258][T30874] device bridge_slave_1 left promiscuous mode [ 1799.953526][T30874] bridge0: port 2(bridge_slave_1) entered disabled state [ 1800.020096][T30874] device bridge_slave_0 left promiscuous mode [ 1800.039548][T30874] bridge0: port 1(bridge_slave_0) entered disabled state [ 1800.104326][T30874] device veth1_macvtap left promiscuous mode [ 1800.119571][T30874] device veth0_macvtap left promiscuous mode [ 1800.125632][T30874] device veth1_vlan left promiscuous mode [ 1800.146310][T30874] device veth0_vlan left promiscuous mode [ 1801.996644][T30874] device hsr_slave_0 left promiscuous mode [ 1802.046338][T30874] device hsr_slave_1 left promiscuous mode [ 1802.103283][T30874] team0 (unregistering): Port device team_slave_1 removed [ 1802.114267][T30874] team0 (unregistering): Port device team_slave_0 removed [ 1802.129096][T30874] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1802.190894][T30874] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1802.276051][T30874] bond0 (unregistering): Released all slaves [ 1802.383772][T15283] IPVS: ftp: loaded support on port[0] = 21 [ 1802.470185][T15283] chnl_net:caif_netlink_parms(): no params data found [ 1802.573402][T15283] bridge0: port 1(bridge_slave_0) entered blocking state [ 1802.591610][T15283] bridge0: port 1(bridge_slave_0) entered disabled state [ 1802.609926][T15283] device bridge_slave_0 entered promiscuous mode [ 1802.630435][T15283] bridge0: port 2(bridge_slave_1) entered blocking state [ 1802.649171][T15283] bridge0: port 2(bridge_slave_1) entered disabled state [ 1802.670991][T15283] device bridge_slave_1 entered promiscuous mode [ 1802.692479][T15283] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1802.703518][T15283] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1802.729652][T15283] team0: Port device team_slave_0 added [ 1802.736960][T15283] team0: Port device team_slave_1 added [ 1802.758224][T15283] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1802.765193][T15283] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1802.794616][T15283] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1802.810196][T15283] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1802.817187][T15283] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1802.847443][T15283] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1802.949642][T15283] device hsr_slave_0 entered promiscuous mode [ 1803.027793][T15283] device hsr_slave_1 entered promiscuous mode [ 1803.193958][T15283] bridge0: port 2(bridge_slave_1) entered blocking state [ 1803.201059][T15283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1803.208360][T15283] bridge0: port 1(bridge_slave_0) entered blocking state [ 1803.215384][T15283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1803.251650][T15283] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1803.264655][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1803.273578][T30608] bridge0: port 1(bridge_slave_0) entered disabled state [ 1803.282360][T30608] bridge0: port 2(bridge_slave_1) entered disabled state [ 1803.295323][T15283] 8021q: adding VLAN 0 to HW filter on device team0 [ 1803.307384][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1803.316012][T30608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1803.323109][T30608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1803.349442][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1803.358320][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1803.365406][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1803.375056][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1803.384674][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1803.399851][T15283] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1803.410605][T15283] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1803.424884][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1803.434051][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1803.443107][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1803.462024][T15283] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1803.469891][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1803.478171][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1803.485572][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1803.537199][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1803.548657][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1803.571747][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1803.583846][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1803.594988][T15283] device veth0_vlan entered promiscuous mode [ 1803.605628][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1803.613790][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1803.625674][T15283] device veth1_vlan entered promiscuous mode [ 1803.643302][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1803.651929][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1803.660919][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1803.669984][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1803.680352][T15283] device veth0_macvtap entered promiscuous mode [ 1803.690462][T15283] device veth1_macvtap entered promiscuous mode [ 1803.704048][T15283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1803.714845][T15283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1803.725591][T15283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1803.736482][T15283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1803.746723][T15283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1803.757655][T15283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1803.767720][T15283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1803.778404][T15283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1803.788486][T15283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1803.799158][T15283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1803.810787][T15283] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1803.818871][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1803.827555][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1803.835696][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1803.844867][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1803.855055][T15283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1803.866650][T15283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1803.876959][T15283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1803.887919][T15283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1803.898257][T15283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1803.909135][T15283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1803.919360][T15283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1803.930072][T15283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1803.940169][T15283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1803.951071][T15283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1803.962414][T15283] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1803.971136][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1803.980572][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1804.141482][T15292] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:48:37 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:37 executing program 2: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0x20000, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000080)=""/187) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x400) write$P9_RRENAME(r2, &(0x7f0000000180)={0x7, 0x15, 0x1}, 0x7) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) 20:48:37 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed3b000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:37 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0100ff0200000000000000000000002000c743e1e43f28e200000000000000"], &(0x7f0000000380)=""/245, 0x1a, 0xffffffffffffff70, 0x8}, 0x20) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10a202, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)=0xf4240) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @multicast2}}, 0x4, 0x6}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000280)={r2, @in6={{0xa, 0x4e22, 0x5d, @loopback, 0xa52}}}, 0x84) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r3, &(0x7f0000000380)='syz0\x00', 0x1ff) accept$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) 20:48:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1e79712b405ea563, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x21000000108) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000014, &(0x7f00000000c0)=0x2, 0x4) sendmmsg(r1, &(0x7f0000007f40)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="9f", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)='!', 0x1}], 0x1}}], 0x127ad, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000040), 0x4) 20:48:37 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43635c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:38 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x800, 0x109101) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000080)) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000040)={0x0, 0x85, 0x2822, 0x1}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}, @restrict={0x10, 0x0, 0x0, 0xb, 0x2}, @typedef={0xe}]}}, &(0x7f0000000380)=""/249, 0x4e, 0xf9, 0x8}, 0x20) 20:48:38 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43636c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1804.477023][T15412] BPF:[1] Invalid name_offset:4294967293 20:48:38 executing program 2: socket$inet6(0xa, 0x3, 0xe8) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000180)={0xda, 0x18bf, 0xd30, 0x101, 0x1b, "addae878efcefc81"}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x13}, 0x1c) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x8002, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{0xffc0, 0x80, 0x6, 0x176b}, {0x9, 0x2, 0x5, 0x3}, {0x5b23, 0x8, 0x9, 0xa7}, {0xffff, 0x7f, 0x8, 0x3}, {0x4, 0x3, 0x8, 0x3ff}]}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000080)={0x0, 0x0, [0x80, 0xe9, 0xf, 0x20000000000]}) 20:48:38 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800000000000000030000001c00000002000000fdffffff0000000401000000f30000000000000f030000007794b90000"], &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:48:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)={0xb8, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @rand_addr="16f8bcd383af9b1577def13edad6b8bf"}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x88}}]}, @CTA_TUPLE_REPLY={0x3c, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x14, 0x4, @mcast1}}}]}, @CTA_TIMEOUT={0x8, 0x7, 0xfffffffe}, @CTA_TUPLE_MASTER={0x24, 0xe, [@CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}]}, 0xb8}}, 0x0) 20:48:38 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1804.688553][T15523] BPF:Unsupported section found 20:48:38 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x54, 0x0, 0x1, 0x801, 0x0, 0x0, {0xa, 0x0, 0x1}, [@CTA_STATUS={0x8, 0x3, 0x2400}, @CTA_NAT_DST={0xc, 0xd, [@CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x3d}}]}, @CTA_LABELS_MASK={0x18, 0x17, [0x6, 0x7ff, 0x0, 0x0, 0x1ff]}, @CTA_PROTOINFO={0x8, 0x4, @CTA_PROTOINFO_SCTP={0x4}}, @CTA_TUPLE_MASTER={0xc, 0xe, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x2400005c) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x1, 0x8, 0x5, 0x0, 0x0, {0xf4c72e4c8e68fffe}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x404c050}, 0x4040080) 20:48:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 20:48:38 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200030000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1804.826452][ T8086] tipc: TX() has been purged, node left! 20:48:38 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1804.881095][T15531] BPF:[1] Invalid name_offset:4294967293 20:48:38 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f00000002c0)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=[@hoplimit={{0x14, 0x29, 0x34, 0xfff}}], 0x18}}], 0x2, 0x0) [ 1804.928392][T15531] BPF:[1] Invalid name_offset:4294967293 20:48:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x6, &(0x7f0000000440)=[{&(0x7f00000000c0)="65211bedd743bc0fa8c94ce4b5abada2c9e1d142924c15a629dc42149e81613c9764473900850faf7ca0c3aa7ab0a19c2b7b1b913d4a5ebde97e347e66f4f258e1b5", 0x42, 0x8}, {&(0x7f0000000140)="869c093ae8d0584e2d4a25f372b14c58a1e500bf10294959d4a6ebc724f306445a63cb240d6efb8ad192aee093028f14cdb8d194f788539bb596f0ca4c841943373f6fe6f605db4b4eaac12ff175946285e846505674d96ca0c0ddf2a28a37a776d6f3166f1e866d20695f0da10fc8c9", 0x70, 0x6}, {&(0x7f00000001c0)="e82021fae3e5ec53a4aea5fc276c64618783148d36eca60cf2b56432d91066c7993e37eeec05d2f045f78fbfab868c9d9202f7e017a98ceb52a39f353d59e1246ed778c78379140a526dd4c555737bae8650a60f0e1924b31a3fb220fe7ef4e957411cf27535849387fbbf50a563db32db2b384d", 0x74, 0x3}, {&(0x7f0000000240)="2f2182e91ffeab2a68aa6220b39b6bed05efc78fbe77020ce9e79b9317ef2bb1c0f9acd051254aa8841af35719e8bdd77903c5ba8193002753c185899cb57a2709fffa8b5a8c65f98722f2770292f8b5528a0989c02b8997c5d0955c8695c12df0163f97f9df3619a7151b8d363b8073518cdc539a9d0312a82a41a807c1223649f3dc7f24537124e2f3c715efc8b9407b1b6d9696ca2ccfd6905a517f7c94bf6129bb2810ddd4fdf61a2b7867e5d93f9b3811fbd83a93f5314c058577735d4555061e431cfb482212463b69f4cba2bfdf751e68b14ddf8dc6", 0xd9, 0x1}, {&(0x7f0000000340)="bfe2841aadf4c173216d702dff46b0ebeee9ab58dd61471019747ca5e281f4753a10fa3048c02aa5074a3d14ee6171704db860178abfbd6b1080f7c24f56e4ed290c5109f4df92efe32ca3aa3ce03b10666ba74f9932f68c3ad02f9980f5", 0x5e, 0x8}, {&(0x7f00000003c0)="e5da3a27d8d034063c7825a1b9a096b7d6a8f637d181af6180c7761b467c626a757d70168831c5cc0d32ca68d9e698e6262a5c0c1ac667e5d720813361b526ad6e44efd9cd1d48ec6225ed5b5762d709f6", 0x51, 0x800}], 0x304000, 0x0) 20:48:38 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43637c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:38 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0xfffffffc, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 20:48:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) ftruncate(r0, 0x800) lseek(r0, 0x4200, 0x0) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x9c49) [ 1805.314934][T15649] BPF:Unsupported section found 20:48:39 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200050000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:39 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x72) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1805.390004][ T26] audit: type=1804 audit(1579639719.089:123): pid=15652 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir154330200/syzkaller.T7zDa0/414/bus" dev="sda1" ino=16977 res=1 [ 1805.554824][T15659] BPF:[1] Invalid name_offset:4294967293 [ 1805.556380][ T26] audit: type=1804 audit(1579639719.219:124): pid=15657 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir154330200/syzkaller.T7zDa0/414/bus" dev="sda1" ino=16977 res=1 20:48:39 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x3, {0x1, 0x3, 0x2}}, 0x10) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) r2 = getpid() tkill(r2, 0x9) r3 = getpid() tkill(r3, 0x9) ptrace$peek(0xffffffffffffffff, r3, &(0x7f00000000c0)) write$FUSE_LK(r0, &(0x7f0000000040)={0x28, 0x0, 0x6, {{0x8, 0x400, 0x0, r2}}}, 0x28) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) 20:48:39 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) recvmsg(r1, &(0x7f0000000140)={&(0x7f00000001c0)=@hci, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/137, 0x89}, {&(0x7f0000001540)=""/192, 0xc0}, {&(0x7f0000000300)=""/111, 0x6f}, {&(0x7f0000001600)=""/165, 0xa5}, {&(0x7f00000016c0)=""/239, 0xef}], 0x6, &(0x7f0000001840)=""/197, 0xc5}, 0x40) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f00000000c0)={[{0x10000, 0xffff, 0x0, 0x3f, 0x8, 0x1f, 0x81, 0x2, 0xd8, 0x3, 0x6, 0x31, 0x7ff}, {0x16, 0x7d, 0x1, 0x4, 0x81, 0x77, 0x7, 0x78, 0x7, 0x40, 0x4, 0x20, 0x3ff}, {0xfff, 0x7ff, 0x1, 0x20, 0x9, 0x3, 0x5, 0x1, 0xff, 0x1, 0x5, 0x0, 0x2}], 0x3f}) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x800101, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000001940)=ANY=[@ANYBLOB="9feb01001800001c0000f8fcff000000000f030080007794b90000000000800000000094d84ad5230931fbbcb6cfe9b64f623a5d213363371bc94956003f9607282638d4ede11b9481c2e5ff3c4f5ea8f63f0000006ddc247822a77944cb8f5f729a661bc22391da598f6061edac693223254ed99e706569e36473a90f5f44bcd4d233242a852ce6"], &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:48:39 executing program 2: socket$inet6(0xa, 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x800) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000080)={0x8001, 0xa8, "31d1dcce17870b4c4515c6e87f6b4cb159f9b06a6ab6a82abfcc1e5db3ca9506b7ea90d8161a93b721cc767272282a1a71909707b864f1ec7830a952c6a9c3db3520c809315a34967779934b05730b84ba9abb696a9a1bdbe5f9c48cfde94eb1f350bef31e239ab2f7970dbfd84155faad6c8df3af3fdfc97c01d0982cd8a3e16c18a75b01ef026bf3c4ccd297809bb871ef2deadce5cc735c4a0c6f7294cb5abc90be79fa3af1f4"}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000040)={0xcd, 0x1, 0x100}) 20:48:39 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43638c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1806.350437][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1806.373870][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1806.387004][ T8086] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1806.404770][ T8086] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1806.425878][ T8086] device bridge_slave_1 left promiscuous mode [ 1806.432523][ T8086] bridge0: port 2(bridge_slave_1) entered disabled state [ 1806.497086][ T8086] device bridge_slave_0 left promiscuous mode [ 1806.503358][ T8086] bridge0: port 1(bridge_slave_0) entered disabled state [ 1806.563830][ T8086] device veth1_macvtap left promiscuous mode [ 1806.570082][ T8086] device veth0_macvtap left promiscuous mode [ 1806.576123][ T8086] device veth1_vlan left promiscuous mode [ 1806.585260][ T8086] device veth0_vlan left promiscuous mode [ 1808.156752][ T8086] device hsr_slave_0 left promiscuous mode [ 1808.196358][ T8086] device hsr_slave_1 left promiscuous mode [ 1808.263152][ T8086] team0 (unregistering): Port device team_slave_1 removed [ 1808.277003][ T8086] team0 (unregistering): Port device team_slave_0 removed [ 1808.290895][ T8086] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1808.360272][ T8086] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1808.448740][ T8086] bond0 (unregistering): Released all slaves [ 1808.564661][T15880] IPVS: ftp: loaded support on port[0] = 21 [ 1808.706910][T15880] chnl_net:caif_netlink_parms(): no params data found [ 1808.783622][T15880] bridge0: port 1(bridge_slave_0) entered blocking state [ 1808.794032][T15880] bridge0: port 1(bridge_slave_0) entered disabled state [ 1808.802137][T15880] device bridge_slave_0 entered promiscuous mode [ 1808.813197][T15880] bridge0: port 2(bridge_slave_1) entered blocking state [ 1808.820549][T15880] bridge0: port 2(bridge_slave_1) entered disabled state [ 1808.828744][T15880] device bridge_slave_1 entered promiscuous mode [ 1808.849461][T15880] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1808.860537][T15880] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1808.884799][T15880] team0: Port device team_slave_0 added [ 1808.891846][T15880] team0: Port device team_slave_1 added [ 1808.911136][T15880] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1808.918305][T15880] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1808.948202][T15880] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1808.961888][T15880] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1808.970734][T15880] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1809.003166][T15880] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1809.068374][T15880] device hsr_slave_0 entered promiscuous mode [ 1809.126617][T15880] device hsr_slave_1 entered promiscuous mode [ 1809.282951][T15880] bridge0: port 2(bridge_slave_1) entered blocking state [ 1809.290129][T15880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1809.297482][T15880] bridge0: port 1(bridge_slave_0) entered blocking state [ 1809.304517][T15880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1809.399852][T15880] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1809.428766][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1809.437763][ T1960] bridge0: port 1(bridge_slave_0) entered disabled state [ 1809.456416][ T1960] bridge0: port 2(bridge_slave_1) entered disabled state [ 1809.481733][T15880] 8021q: adding VLAN 0 to HW filter on device team0 [ 1809.496571][T30608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1809.505748][T30608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1809.512887][T30608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1809.563776][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1809.580549][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1809.587628][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1809.611370][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1809.623710][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1809.641339][T15880] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1809.652323][T15880] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1809.687175][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1809.700414][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1809.722042][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1809.731218][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1809.743026][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1809.751973][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1809.779411][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1809.787173][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1809.821577][T15880] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1809.906581][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1809.915444][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1809.934302][T15880] device veth0_vlan entered promiscuous mode [ 1809.941997][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1809.951152][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1809.963219][T15880] device veth1_vlan entered promiscuous mode [ 1809.970789][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1809.978992][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1809.987056][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1810.006575][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1810.015504][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1810.024587][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1810.035862][T15880] device veth0_macvtap entered promiscuous mode [ 1810.052806][T15880] device veth1_macvtap entered promiscuous mode [ 1810.071684][T15880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1810.083796][T15880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1810.097230][T15880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1810.109816][T15880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1810.120969][T15880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1810.133954][T15880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1810.145036][T15880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1810.159225][T15880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1810.169762][T15880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1810.183037][T15880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1810.194911][T15880] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1810.207046][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1810.215529][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1810.227143][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1810.239993][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1810.250248][T15880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1810.265126][T15880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1810.275308][T15880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1810.290133][T15880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1810.300035][T15880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1810.314156][T15880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1810.324064][T15880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1810.337976][T15880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1810.350533][T15880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1810.362327][T15880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1810.375116][T15880] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1810.386062][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1810.398738][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1810.519093][T15889] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:48:44 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000001140), &(0x7f0000001180)=0x1) 20:48:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) readlinkat(r2, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/181, 0xb5) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000140), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0x1}, 0x16, 0x0) 20:48:44 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200060000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:44 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, r0) r1 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='^proc-\x00', r0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280), 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, r3) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/bsg\x00', 0x200000, 0x0) ioctl$sock_TIOCINQ(r4, 0x541b, &(0x7f0000000240)) keyctl$search(0xa, r1, &(0x7f00000000c0)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:48:44 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43639c0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1810.678245][T15897] BPF:[1] Invalid name_offset:4294967293 20:48:44 executing program 5: keyctl$set_timeout(0xf, 0x0, 0x4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:48:44 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) eventfd(0x200) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) r2 = dup3(r0, r1, 0x80000) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000000100)=0x2) r3 = socket$inet6(0xa, 0x2, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x800, @loopback, 0x8}, 0x1c) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/shm\x00', 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r5, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0xfa) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000040)="6094b88600176049c1bffb58bc6c5518", 0x10) r6 = creat(&(0x7f0000000200)='./file0\x00', 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000240), &(0x7f0000000180)=0xfffffffffffffde6) ioctl$SOUND_MIXER_READ_CAPS(r4, 0x80044dfc, &(0x7f0000000080)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r7, &(0x7f0000000380)='syz0\x00', 0x1ff) bind$pptp(r7, &(0x7f00000001c0)={0x18, 0x2, {0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1e) 20:48:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000001140), &(0x7f0000001180)=0x1) 20:48:44 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200070000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1810.872806][T16008] BPF:[1] Invalid name_offset:4294967293 20:48:44 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x10, 0x2, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000340)=0x81) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r1, r2) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x5, &(0x7f0000000100)=[{&(0x7f0000000080)="5d8e75c22b2aa1db0fced246ac0390ec55ea157a1b6099af86f429cd352006ca72a2c9b16a6e90e5d3f35f8dc9ae0cd248851d95c1dfae64ff91f35f4320100f83cd8ab486ef210d32ac1deb3b993eda58b6542328cc2907b596ecff54b24cdac828", 0x62, 0x5}, {&(0x7f0000000240)="892c251fd63c0ab77e6fb05ee2d864642085f84c1381d1e97926f424251948d55d4c4109ab0218abda016be08138c9badc3309d4a8dce0eb4fddca9ef44db9e4f9e05bff139be61445dd4a547e43fb85fc46d49253808f9008747d64bf05924979351f310bcacd032bbee93ff04178d898d76f4f36fb24da08bb7afba06db72e6d3d5eae38856b3f2df01630dc4d6588b291404b4303ba09e50d05cea8a4191a47923d3b81550c542d7f5822304cf72ae6c6dbb3b35b6911ce6c9d3b61a7d373de26", 0xc2, 0x8}, {&(0x7f0000000480)="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", 0x1000, 0x80}, {&(0x7f0000001480)="4358f5363fa7c0c7a76dc64bd780d4f496bb05a496e5fc02aa0c1df860dbc90d6856da95e13d3a33e943e52b074b5691efb607b717bf30de889a8c21d63a73655d7c721c38e7c02130f7fb0357d372ef972d5152528444a85ac0f23fa98600f7d7486a5eedd25628cd64f3aa8a7305e350d35d4120cabd71fd2b44d6730c6eb85f6e6a04503a77ce3ffaea9a5a55ecd11c4043ee5eab1965698060fd66586fd9352f1b963b3eff8bfb47945ef0d8c43df2d9056660c0a10f60af4fad7300e360e808c03ee932e77a4f", 0xc9, 0x9}, {&(0x7f0000001580)="aa054744edab9f36493e6d23e2d3d5ff081395234631f4705ceb5bb06e65bcdf6a20453cca0c3374f14fe26976f186e68f93232af4141b8a0c10ed0735fa89851ef0af410af245fe28735267d1f3e36346041e0f31acd43ef4695a31fb7e82865e8bab35dc1a5a680bb4eb682389adc8138574fc23a69cc65cba5bef7376221b7512d6d7da35e8fd41b4c7bdd4645015f12dcc9f03103ecffb4d8bd3d9668e781ba52d9ad0c0227c4309744c510a", 0xae, 0xffffffffffff7fff}], 0x12000, &(0x7f0000001640)={[{@dmode={'dmode', 0x3d, 0x3f}}, {@check_strict='check=strict'}, {@hide='hide'}], [{@dont_measure='dont_measure'}, {@smackfsdef={'smackfsdef', 0x3d, 'GPL#GPL'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ppp1vboxnet1system!securityvmnet0ppp0$'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@pcr={'pcr', 0x3d, 0xfffffffffffffff8}}]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:48:44 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x40) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1811.087649][T16122] BPF:[1] Invalid name_offset:4294967293 20:48:44 executing program 4: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) 20:48:44 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363a24ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:44 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:44 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pause() bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 1811.219493][T21844] tipc: TX() has been purged, node left! 20:48:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000080)=0x8) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x40) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r3, &(0x7f0000000380)='syz0\x00', 0x1ff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r4, &(0x7f0000000380)='syz0\x00', 0x1ff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r5, &(0x7f0000000380)='syz0\x00', 0x1ff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r6, &(0x7f0000000380)='syz0\x00', 0x1ff) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x244400, 0x0) r8 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x890c, &(0x7f0000000000)) r9 = dup(r8) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000140)={0x0, 0x6, [{r3, 0x0, 0x1000000000000, 0x2000}, {r4, 0x0, 0x4000, 0x1000000000000}, {r5, 0x0, 0x1000}, {r6, 0x0, 0x8000, 0xfffff000}, {r7, 0x0, 0xfffffffff0000000, 0xfffff000}, {r9, 0x0, 0x0, 0x8000}]}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) 20:48:45 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 20:48:45 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200090000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:45 executing program 5: r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r1, r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) keyctl$describe(0x6, r1, &(0x7f0000000480)=""/4096, 0x1000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$DRM_IOCTL_ADD_BUFS(r2, 0xc0206416, &(0x7f00000000c0)={0x2, 0x1, 0x8, 0x6, 0x4, 0xfffffffffffff000}) [ 1811.633093][T16346] BPF:[1] Invalid name_offset:4294967293 20:48:45 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000100)={0x5, 0x6, 0xfffffffb, 0x0, r0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x1, 0x47, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) recvfrom$ax25(r1, &(0x7f0000000000)=""/113, 0x71, 0x2020, &(0x7f0000000080)={{0x3, @default, 0x5}, [@null, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) 20:48:45 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363a9fed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1811.935161][T16459] BPF:[1] Invalid name_offset:4294967293 20:48:45 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02020a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:45 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x1a800, 0x0) getsockname$unix(r0, &(0x7f0000000300), &(0x7f0000000480)=0x6e) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000fdfffbbf0000000421000000f3000000000000000f030000007794b90000f7033b56b6332aff3d3da8877485aa5115c36653a29e14bdb6f39300910e71769c6177bb5367603915bad06cf799a8920acfa4ab5f9c4fbc31d823194843c88e948da4c92d66d8aab00ebf2cbe0a05e193048d72537c15f6d3c77571d76c3cfc872d"], &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x800) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f00000001c0)={0x2, {{0xa, 0x4e21, 0xffff7fff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x10000}}, {{0xa, 0x4e20, 0x7, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x101}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f00000000c0)='gtp\x00') 20:48:46 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed03000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1812.309747][T16570] BPF:[1] Invalid name_offset:3220963325 20:48:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e00000000020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x200, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1261, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000200)={[], 0x101, 0x193c469d, 0x9, 0x200, 0x1000}) [ 1812.879475][T21844] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1812.896353][T21844] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1812.926617][T21844] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1812.934126][T21844] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1812.967375][T21844] device bridge_slave_1 left promiscuous mode [ 1812.973607][T21844] bridge0: port 2(bridge_slave_1) entered disabled state [ 1813.077012][T21844] device bridge_slave_0 left promiscuous mode [ 1813.083249][T21844] bridge0: port 1(bridge_slave_0) entered disabled state [ 1813.170994][T21844] device veth1_macvtap left promiscuous mode [ 1813.186584][T21844] device veth0_macvtap left promiscuous mode [ 1813.192719][T21844] device veth1_vlan left promiscuous mode [ 1813.206340][T21844] device veth0_vlan left promiscuous mode [ 1815.586764][T21844] device hsr_slave_0 left promiscuous mode [ 1815.636377][T21844] device hsr_slave_1 left promiscuous mode [ 1815.699946][T21844] team0 (unregistering): Port device team_slave_1 removed [ 1815.726998][T21844] team0 (unregistering): Port device team_slave_0 removed [ 1815.747728][T21844] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1815.810181][T21844] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1815.902854][T21844] bond0 (unregistering): Released all slaves [ 1817.350466][T16684] IPVS: ftp: loaded support on port[0] = 21 [ 1817.514549][T16684] chnl_net:caif_netlink_parms(): no params data found [ 1817.608160][T16684] bridge0: port 1(bridge_slave_0) entered blocking state [ 1817.615312][T16684] bridge0: port 1(bridge_slave_0) entered disabled state [ 1817.623273][T16684] device bridge_slave_0 entered promiscuous mode [ 1817.647074][T16684] bridge0: port 2(bridge_slave_1) entered blocking state [ 1817.654215][T16684] bridge0: port 2(bridge_slave_1) entered disabled state [ 1817.662285][T16684] device bridge_slave_1 entered promiscuous mode [ 1817.707496][T16684] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1817.740709][T16684] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1817.779537][T16684] team0: Port device team_slave_0 added [ 1817.797038][T16684] team0: Port device team_slave_1 added [ 1817.823778][T16684] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1817.846344][T16684] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1817.896298][T16684] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1817.917720][T16684] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1817.924794][T16684] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1817.951198][T16684] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1818.022119][T16684] device hsr_slave_0 entered promiscuous mode [ 1818.079519][T16684] device hsr_slave_1 entered promiscuous mode [ 1818.230225][T16684] bridge0: port 2(bridge_slave_1) entered blocking state [ 1818.237405][T16684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1818.244658][T16684] bridge0: port 1(bridge_slave_0) entered blocking state [ 1818.251748][T16684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1818.331388][T16684] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1818.343482][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1818.354905][T10494] bridge0: port 1(bridge_slave_0) entered disabled state [ 1818.367142][T10494] bridge0: port 2(bridge_slave_1) entered disabled state [ 1818.380429][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1818.392980][T16684] 8021q: adding VLAN 0 to HW filter on device team0 [ 1818.408502][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1818.420567][T10494] bridge0: port 1(bridge_slave_0) entered blocking state [ 1818.427655][T10494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1818.451435][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1818.460229][T10494] bridge0: port 2(bridge_slave_1) entered blocking state [ 1818.467285][T10494] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1818.480402][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1818.502729][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1818.512213][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1818.523254][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1818.533622][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1818.545875][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1818.564090][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1818.574870][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1818.591427][T16684] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1818.829134][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1818.841347][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1818.864964][T16684] device veth0_vlan entered promiscuous mode [ 1818.872854][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1818.887308][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1818.914082][T16684] device veth1_vlan entered promiscuous mode [ 1818.927569][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1818.935982][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1818.957467][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1818.975476][T16684] device veth0_macvtap entered promiscuous mode [ 1818.998458][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1819.007542][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1819.026373][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1819.036928][T16684] device veth1_macvtap entered promiscuous mode [ 1819.064336][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1819.080227][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1819.097223][T16684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1819.116348][T16684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1819.150605][T16684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1819.166383][T16684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1819.187014][T16684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1819.216258][T16684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1819.236276][T16684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1819.256523][T16684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1819.276937][T16684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1819.296291][T16684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1819.317778][T16684] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1819.325144][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1819.347824][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1819.361449][T16684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1819.386258][T16684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1819.396129][T16684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1819.436286][T16684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1819.446177][T16684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1819.479696][T16684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1819.506279][T16684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1819.521095][T16684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1819.531305][T16684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1819.545205][T16684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1819.559361][T16684] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1819.567544][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1819.586412][T30609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1819.758798][T16693] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:48:53 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02030a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:53 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000380)='syz0\x00', 0x1ff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) linkat(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0019001c00000002000000fdffffff0000000401000000f3000000000000000f030000007794b900004f56d6a4619b663b78c0e58679c4914110b0317e0fd39ba1ff94d962fd0a82249c6441691c9e"], &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) 20:48:53 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed04000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:53 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:48:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0x1}, 0x1c) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x3, 0x0, 0x0, {0xa, 0x0, 0xa}, [@NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x1}, @NFTA_RULE_POSITION_ID={0x8}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x1}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELRULE={0x60, 0x8, 0xa, 0x801, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x1}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x2}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x1}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xec}, 0x1, 0x0, 0x0, 0x40800}, 0x8811) [ 1819.922341][T16700] BPF:Total section length too long 20:48:53 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$kcm(0xa, 0x5, 0x0) socket$isdn(0x22, 0x3, 0x21) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES64, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYRESDEC=0x0, @ANYPTR, @ANYRESHEX=r0], @ANYRESOCT=r1], &(0x7f0000000380)=""/249, 0x2b, 0xf9, 0x8}, 0x20) [ 1819.988340][T16703] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00b10efd9a:0 old:/dev/loop0 new:/dev/loop3 20:48:53 executing program 2: r0 = socket$inet6(0xa, 0xa, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) 20:48:53 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed05000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:54 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02040a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:48:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000040)=@known='trusted.overlay.nlink\x00', &(0x7f0000000080)='md5sumem1vboxnet0keyringuser\x00', 0x1d, 0x3) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) 20:48:54 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) socket(0x10, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1820.506929][T21844] tipc: TX() has been purged, node left! [ 1821.539573][T21844] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1821.556350][T21844] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1821.577732][T21844] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1821.585280][T21844] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1821.607360][T21844] device bridge_slave_1 left promiscuous mode [ 1821.613693][T21844] bridge0: port 2(bridge_slave_1) entered disabled state [ 1821.677080][T21844] device bridge_slave_0 left promiscuous mode [ 1821.683356][T21844] bridge0: port 1(bridge_slave_0) entered disabled state [ 1821.760612][T21844] device veth1_macvtap left promiscuous mode [ 1821.776295][T21844] device veth0_macvtap left promiscuous mode [ 1821.782382][T21844] device veth1_vlan left promiscuous mode [ 1821.796344][T21844] device veth0_vlan left promiscuous mode [ 1823.976777][T21844] device hsr_slave_0 left promiscuous mode [ 1824.016868][T21844] device hsr_slave_1 left promiscuous mode [ 1824.089759][T21844] team0 (unregistering): Port device team_slave_1 removed [ 1824.111192][T21844] team0 (unregistering): Port device team_slave_0 removed [ 1824.137084][T21844] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1824.200357][T21844] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1824.304676][T21844] bond0 (unregistering): Released all slaves [ 1829.068807][ T8043] syz-fuzzer invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 1829.096345][ T8043] CPU: 0 PID: 8043 Comm: syz-fuzzer Not tainted 5.5.0-rc1-syzkaller #0 [ 1829.104645][ T8043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1829.114740][ T8043] Call Trace: [ 1829.118120][ T8043] dump_stack+0x11d/0x181 [ 1829.122460][ T8043] dump_header+0xaa/0x39c [ 1829.126877][ T8043] oom_kill_process.cold+0x10/0x15 [ 1829.132074][ T8043] out_of_memory+0x231/0xa60 [ 1829.136756][ T8043] __alloc_pages_slowpath+0xdcc/0xee0 [ 1829.142180][ T8043] __alloc_pages_nodemask+0x2c8/0x310 [ 1829.147779][ T8043] alloc_pages_current+0xd1/0x170 [ 1829.152951][ T8043] pte_alloc_one+0x18/0x50 [ 1829.157395][ T8043] __handle_mm_fault+0x2be6/0x2e00 [ 1829.162515][ T8043] ? __perf_event_task_sched_out+0x14d/0xb00 [ 1829.168584][ T8043] handle_mm_fault+0x21b/0x530 [ 1829.173375][ T8043] __do_page_fault+0x456/0x8d0 [ 1829.178207][ T8043] do_page_fault+0x38/0x194 [ 1829.182724][ T8043] page_fault+0x34/0x40 [ 1829.186943][ T8043] RIP: 0033:0x45b153 [ 1829.190917][ T8043] Code: Bad RIP value. [ 1829.194995][ T8043] RSP: 002b:000000c42003dea0 EFLAGS: 00010202 [ 1829.201072][ T8043] RAX: ffffffffffffff92 RBX: 000000003b984ba4 RCX: 000000000045b153 [ 1829.209107][ T8043] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001dee360 [ 1829.217105][ T8043] RBP: 000000c42003dee8 R08: 0000000000000000 R09: 0000000000000000 [ 1829.225207][ T8043] R10: 000000c42003ded8 R11: 0000000000000202 R12: 000001b45894a812 [ 1829.233218][ T8043] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000000 [ 1829.257595][ T8043] Mem-Info: [ 1829.260807][ T8043] active_anon:160360 inactive_anon:247 isolated_anon:0 [ 1829.260807][ T8043] active_file:20 inactive_file:0 isolated_file:0 [ 1829.260807][ T8043] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1829.260807][ T8043] slab_reclaimable:5299 slab_unreclaimable:17114 [ 1829.260807][ T8043] mapped:43515 shmem:315 pagetables:1859 bounce:0 [ 1829.260807][ T8043] free:26597 free_pcp:0 free_cma:0 [ 1829.306359][ T8043] Node 0 active_anon:640192kB inactive_anon:988kB active_file:68kB inactive_file:64kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:174100kB dirty:0kB writeback:0kB shmem:1260kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 210944kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1829.364175][ T8043] Node 1 active_anon:1248kB inactive_anon:0kB active_file:24kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1829.419798][ T8043] Node 0 DMA free:14648kB min:188kB low:232kB high:276kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1829.454065][ T8043] lowmem_reserve[]: 0 2908 3615 3615 [ 1829.476008][ T8043] Node 0 DMA32 free:38072kB min:35360kB low:44200kB high:53040kB reserved_highatomic:0KB active_anon:276452kB inactive_anon:8kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2980540kB mlocked:0kB kernel_stack:860kB pagetables:4264kB bounce:0kB free_pcp:8kB local_pcp:8kB free_cma:0kB [ 1829.528790][ T8043] lowmem_reserve[]: 0 0 707 707 [ 1829.533731][ T8043] Node 0 Normal free:8412kB min:10648kB low:12796kB high:14944kB reserved_highatomic:0KB active_anon:363740kB inactive_anon:980kB active_file:128kB inactive_file:36kB unevictable:0kB writepending:0kB present:786432kB managed:724520kB mlocked:0kB kernel_stack:3148kB pagetables:3172kB bounce:0kB free_pcp:248kB local_pcp:248kB free_cma:0kB [ 1829.576297][ T8043] lowmem_reserve[]: 0 0 0 0 [ 1829.580904][ T8043] Node 1 Normal free:45736kB min:45956kB low:57444kB high:68932kB reserved_highatomic:0KB active_anon:1248kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870256kB mlocked:0kB kernel_stack:8kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1829.632092][ T8043] lowmem_reserve[]: 0 0 0 0 [ 1829.636733][ T8043] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 0*64kB 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 3*4096kB (M) = 14648kB [ 1829.660079][ T8043] Node 0 DMA32: 766*4kB (UME) 1344*8kB (UME) 678*16kB (UM) 313*32kB (UME) 43*64kB (UM) 5*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 38072kB [ 1829.689213][ T8043] Node 0 Normal: 1013*4kB (UME) 235*8kB (UME) 105*16kB (UME) 26*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8444kB [ 1829.703892][ T8043] Node 1 Normal: 36*4kB (UM) 19*8kB (UME) 14*16kB (UME) 11*32kB (UME) 7*64kB (UME) 1*128kB (M) 3*256kB (UME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UE) 9*4096kB (M) = 45736kB [ 1829.728888][ T8043] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1829.749494][ T8043] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1829.779160][ T8043] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1829.803809][ T8043] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1829.813208][ T8043] 349 total pagecache pages [ 1829.836312][ T8043] 0 pages in swap cache [ 1829.840519][ T8043] Swap cache stats: add 0, delete 0, find 0/0 [ 1829.856705][ T8043] Free swap = 0kB [ 1829.860481][ T8043] Total swap = 0kB [ 1829.864210][ T8043] 1965979 pages RAM [ 1829.874793][ T8043] 0 pages HighMem/MovableOnly [ 1829.895671][ T8043] 68173 pages reserved [ 1829.911214][ T8043] 0 pages cma reserved [ 1829.915398][ T8043] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=15027,uid=0 [ 1829.932056][ T8043] Out of memory: Killed process 15027 (syz-executor.4) total-vm:73380kB, anon-rss:4292kB, file-rss:34688kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 1830.013243][ T5203] syz-executor.4 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1830.035003][ T5203] CPU: 1 PID: 5203 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1830.043653][ T5203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1830.053718][ T5203] Call Trace: [ 1830.057032][ T5203] dump_stack+0x11d/0x181 [ 1830.061493][ T5203] dump_header+0xaa/0x39c [ 1830.065856][ T5203] oom_kill_process.cold+0x10/0x15 [ 1830.071079][ T5203] out_of_memory+0x231/0xa60 [ 1830.075686][ T5203] __alloc_pages_slowpath+0xdcc/0xee0 [ 1830.081071][ T5203] __alloc_pages_nodemask+0x2c8/0x310 [ 1830.086470][ T5203] alloc_pages_current+0xd1/0x170 [ 1830.091498][ T5203] __page_cache_alloc+0x183/0x1a0 [ 1830.096564][ T5203] ? __do_page_cache_readahead+0x310/0x390 [ 1830.102433][ T5203] pagecache_get_page+0x24b/0x6f0 [ 1830.107463][ T5203] filemap_fault+0xc95/0x10a0 [ 1830.112139][ T5203] ext4_filemap_fault+0x59/0x72 [ 1830.116993][ T5203] __do_fault+0xae/0x1f0 [ 1830.121262][ T5203] __handle_mm_fault+0x270d/0x2e00 [ 1830.126385][ T5203] handle_mm_fault+0x21b/0x530 [ 1830.131159][ T5203] __do_page_fault+0x456/0x8d0 [ 1830.135938][ T5203] do_page_fault+0x38/0x194 [ 1830.140439][ T5203] page_fault+0x34/0x40 [ 1830.144593][ T5203] RIP: 0033:0x41518a [ 1830.148522][ T5203] Code: Bad RIP value. [ 1830.152576][ T5203] RSP: 002b:00007fff6cdd5608 EFLAGS: 00010246 [ 1830.158687][ T5203] RAX: 000000000000039f RBX: 00000000014bb940 RCX: 000000000041518a [ 1830.166654][ T5203] RDX: 0000000040000000 RSI: 00007fff6cdd5640 RDI: ffffffffffffffff [ 1830.174691][ T5203] RBP: 00000000000003bf R08: 0000000000000001 R09: 0000000000000001 [ 1830.182652][ T5203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1830.190683][ T5203] R13: 00007fff6cdd5640 R14: 00000000014bb99b R15: 00007fff6cdd5650 [ 1830.198828][ T5203] Mem-Info: [ 1830.201972][ T5203] active_anon:159316 inactive_anon:247 isolated_anon:0 [ 1830.201972][ T5203] active_file:29 inactive_file:0 isolated_file:0 [ 1830.201972][ T5203] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1830.201972][ T5203] slab_reclaimable:5286 slab_unreclaimable:17096 [ 1830.201972][ T5203] mapped:43522 shmem:315 pagetables:1822 bounce:0 [ 1830.201972][ T5203] free:26678 free_pcp:271 free_cma:0 [ 1830.239236][ T5203] Node 0 active_anon:636016kB inactive_anon:988kB active_file:100kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:174088kB dirty:0kB writeback:0kB shmem:1260kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 210944kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1830.267740][ T5203] Node 1 active_anon:1248kB inactive_anon:0kB active_file:16kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1830.294521][ T5203] Node 0 DMA free:14648kB min:188kB low:232kB high:276kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1830.324109][ T5203] lowmem_reserve[]: 0 2908 3615 3615 [ 1830.337174][ T5203] Node 0 DMA32 free:38136kB min:35360kB low:44200kB high:53040kB reserved_highatomic:0KB active_anon:272356kB inactive_anon:8kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2980540kB mlocked:0kB kernel_stack:860kB pagetables:4116kB bounce:0kB free_pcp:388kB local_pcp:252kB free_cma:0kB [ 1830.370714][ T5203] lowmem_reserve[]: 0 0 707 707 [ 1830.375592][ T5203] Node 0 Normal free:8192kB min:10648kB low:12796kB high:14944kB reserved_highatomic:0KB active_anon:363672kB inactive_anon:980kB active_file:136kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:724520kB mlocked:0kB kernel_stack:3148kB pagetables:3172kB bounce:0kB free_pcp:696kB local_pcp:248kB free_cma:0kB [ 1830.407232][ T5203] lowmem_reserve[]: 0 0 0 0 [ 1830.411746][ T5203] Node 1 Normal free:45736kB min:45956kB low:57444kB high:68932kB reserved_highatomic:0KB active_anon:1248kB inactive_anon:0kB active_file:8kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870256kB mlocked:0kB kernel_stack:8kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1830.442195][ T5203] lowmem_reserve[]: 0 0 0 0 [ 1830.446732][ T5203] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 0*64kB 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 3*4096kB (M) = 14648kB [ 1830.460581][ T5203] Node 0 DMA32: 708*4kB (ME) 1315*8kB (UME) 660*16kB (M) 301*32kB (UME) 38*64kB (M) 3*128kB (M) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 0*2048kB 0*4096kB = 38152kB [ 1830.476751][ T5203] Node 0 Normal: 994*4kB (ME) 213*8kB (UME) 105*16kB (UME) 26*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8192kB [ 1830.490943][ T5203] Node 1 Normal: 36*4kB (UM) 19*8kB (UME) 14*16kB (UME) 11*32kB (UME) 7*64kB (UME) 1*128kB (M) 3*256kB (UME) 1*512kB (E) 2*1024kB (ME) 2*2048kB (UE) 9*4096kB (M) = 45736kB [ 1830.518921][ T5203] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1830.539537][ T5203] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1830.548986][ T5203] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1830.562218][ T5203] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1830.571918][ T5203] 423 total pagecache pages [ 1830.580688][ T5203] 0 pages in swap cache [ 1830.591343][ T5203] Swap cache stats: add 0, delete 0, find 0/0 [ 1830.599992][ T5203] Free swap = 0kB [ 1830.603740][ T5203] Total swap = 0kB [ 1830.607481][ T5203] 1965979 pages RAM [ 1830.611349][ T5203] 0 pages HighMem/MovableOnly [ 1830.616142][ T5203] 68173 pages reserved [ 1830.623084][ T5203] 0 pages cma reserved [ 1830.627318][ T5203] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=16677,uid=0 [ 1830.645356][ T5203] Out of memory: Killed process 16678 (syz-executor.4) total-vm:72848kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1830.664968][ T1065] oom_reaper: reaped process 16678 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 1830.843398][ T3989] udevd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=-1000 [ 1830.885598][ T3989] CPU: 0 PID: 3989 Comm: udevd Not tainted 5.5.0-rc1-syzkaller #0 [ 1830.893460][ T3989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1830.903602][ T3989] Call Trace: [ 1830.906901][ T3989] dump_stack+0x11d/0x181 [ 1830.911322][ T3989] dump_header+0xaa/0x39c [ 1830.915701][ T3989] oom_kill_process.cold+0x10/0x15 [ 1830.920823][ T3989] out_of_memory+0x231/0xa60 [ 1830.925432][ T3989] __alloc_pages_slowpath+0xdcc/0xee0 [ 1830.930860][ T3989] __alloc_pages_nodemask+0x2c8/0x310 [ 1830.936244][ T3989] alloc_pages_current+0xd1/0x170 [ 1830.941274][ T3989] __page_cache_alloc+0x183/0x1a0 [ 1830.946302][ T3989] ? __do_page_cache_readahead+0x310/0x390 [ 1830.952117][ T3989] pagecache_get_page+0x24b/0x6f0 [ 1830.957192][ T3989] filemap_fault+0xc95/0x10a0 [ 1830.961895][ T3989] ext4_filemap_fault+0x59/0x72 [ 1830.966726][ T3989] __do_fault+0xae/0x1f0 [ 1830.971024][ T3989] __handle_mm_fault+0x270d/0x2e00 [ 1830.976127][ T3989] handle_mm_fault+0x21b/0x530 [ 1830.980908][ T3989] __do_page_fault+0x456/0x8d0 [ 1830.985652][ T3989] do_page_fault+0x38/0x194 [ 1830.990237][ T3989] page_fault+0x34/0x40 [ 1830.994413][ T3989] RIP: 0033:0x7f43d06b6930 [ 1830.998819][ T3989] Code: Bad RIP value. [ 1831.002928][ T3989] RSP: 002b:00007fff9f1a4258 EFLAGS: 00010202 [ 1831.008973][ T3989] RAX: 0000000000000bb8 RBX: 0000000000000bb8 RCX: 0000000000000bb8 [ 1831.017045][ T3989] RDX: 0000000000000008 RSI: 00007fff9f1a4350 RDI: 000000000000000a [ 1831.025012][ T3989] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000001 [ 1831.033063][ T3989] R10: 0000000000000008 R11: 0000000000000004 R12: 0000000000000003 [ 1831.041163][ T3989] R13: 0000000000000000 R14: 00000000011f77b0 R15: 00000000011f6250 [ 1831.081201][T16678] syz-executor.4: page allocation failure: order:0, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz4,mems_allowed=0-1 [ 1831.119558][T16678] CPU: 1 PID: 16678 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1831.128281][T16678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1831.138431][T16678] Call Trace: [ 1831.141795][T16678] dump_stack+0x11d/0x181 [ 1831.146150][T16678] warn_alloc.cold+0x72/0xcf [ 1831.150790][T16678] __alloc_pages_slowpath+0xe97/0xee0 [ 1831.156246][T16678] __alloc_pages_nodemask+0x2c8/0x310 [ 1831.161783][T16678] alloc_pages_current+0xd1/0x170 [ 1831.166933][T16678] relay_open_buf.part.0+0x219/0x690 [ 1831.172245][T16678] relay_open+0x381/0x630 [ 1831.176654][T16678] do_blk_trace_setup+0x2aa/0x5f0 [ 1831.181908][T16678] __blk_trace_setup+0x81/0x110 [ 1831.186851][T16678] blk_trace_ioctl+0xe2/0x1d0 [ 1831.191613][T16678] blkdev_ioctl+0xc6/0x1260 [ 1831.196238][T16678] block_ioctl+0x95/0xc0 [ 1831.200500][T16678] ? blkdev_fallocate+0x2f0/0x2f0 [ 1831.203347][ T3989] Mem-Info: [ 1831.205659][T16678] do_vfs_ioctl+0x84f/0xcf0 [ 1831.213283][T16678] ? tomoyo_file_ioctl+0x34/0x40 [ 1831.218319][T16678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1831.224576][T16678] ksys_ioctl+0xbd/0xe0 [ 1831.228818][T16678] __x64_sys_ioctl+0x4c/0x60 [ 1831.233442][T16678] do_syscall_64+0xcc/0x3a0 [ 1831.237983][T16678] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1831.238662][ T3989] active_anon:158763 inactive_anon:247 isolated_anon:0 [ 1831.238662][ T3989] active_file:37 inactive_file:1 isolated_file:0 [ 1831.238662][ T3989] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1831.238662][ T3989] slab_reclaimable:5285 slab_unreclaimable:17093 [ 1831.238662][ T3989] mapped:43534 shmem:315 pagetables:1832 bounce:0 [ 1831.238662][ T3989] free:16286 free_pcp:123 free_cma:0 [ 1831.243945][T16678] RIP: 0033:0x45b349 [ 1831.284811][T16678] Code: Bad RIP value. [ 1831.288890][T16678] RSP: 002b:00007fae8c63dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1831.297304][T16678] RAX: ffffffffffffffda RBX: 00007fae8c63e6d4 RCX: 000000000045b349 [ 1831.305269][T16678] RDX: 0000000020000200 RSI: 00000000c0481273 RDI: 0000000000000003 [ 1831.307471][ T3989] Node 0 active_anon:633804kB inactive_anon:988kB active_file:144kB inactive_file:4kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:174136kB dirty:0kB writeback:0kB shmem:1260kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 204800kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1831.313282][T16678] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1831.349747][T16678] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1831.357728][T16678] R13: 0000000000000223 R14: 00000000004c2f92 R15: 000000000075bf2c [ 1831.379797][ T3989] Node 1 active_anon:1248kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1831.409206][T16678] Mem-Info: [ 1831.412496][T16678] active_anon:158763 inactive_anon:247 isolated_anon:0 [ 1831.412496][T16678] active_file:17 inactive_file:17 isolated_file:0 [ 1831.412496][T16678] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1831.412496][T16678] slab_reclaimable:5285 slab_unreclaimable:17095 [ 1831.412496][T16678] mapped:43522 shmem:315 pagetables:1832 bounce:0 [ 1831.412496][T16678] free:16507 free_pcp:127 free_cma:0 [ 1831.452545][ T3989] Node 0 DMA free:14552kB min:188kB low:232kB high:276kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1831.484117][T16678] Node 0 active_anon:633804kB inactive_anon:988kB active_file:64kB inactive_file:68kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:174088kB dirty:0kB writeback:0kB shmem:1260kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 204800kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1831.515824][ T3989] lowmem_reserve[]: 0 2908 3615 3615 [ 1831.521274][ T3989] Node 0 DMA32 free:23808kB min:35360kB low:44200kB high:53040kB reserved_highatomic:0KB active_anon:270308kB inactive_anon:8kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2980540kB mlocked:0kB kernel_stack:860kB pagetables:4156kB bounce:0kB free_pcp:244kB local_pcp:244kB free_cma:0kB [ 1831.554924][T16678] Node 1 active_anon:1248kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1831.584223][ T3989] lowmem_reserve[]: 0 0 707 707 [ 1831.589163][ T3989] Node 0 Normal free:4864kB min:8600kB low:10748kB high:12896kB reserved_highatomic:0KB active_anon:363496kB inactive_anon:980kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:724520kB mlocked:0kB kernel_stack:3132kB pagetables:3172kB bounce:0kB free_pcp:16kB local_pcp:16kB free_cma:0kB [ 1831.623546][T16678] Node 0 DMA free:14552kB min:188kB low:232kB high:276kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1831.662238][T16678] lowmem_reserve[]: 0 2908 3615 3615 [ 1831.669799][ T3989] lowmem_reserve[]: 0 0 0 0 [ 1831.674343][ T3989] Node 1 Normal free:22804kB min:45956kB low:57444kB high:68932kB reserved_highatomic:0KB active_anon:1248kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870256kB mlocked:0kB kernel_stack:8kB pagetables:0kB bounce:0kB free_pcp:248kB local_pcp:248kB free_cma:0kB [ 1831.705363][T16678] Node 0 DMA32 free:23808kB min:35360kB low:44200kB high:53040kB reserved_highatomic:0KB active_anon:270308kB inactive_anon:8kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2980540kB mlocked:0kB kernel_stack:860kB pagetables:4156kB bounce:0kB free_pcp:244kB local_pcp:0kB free_cma:0kB [ 1831.723453][ T3989] lowmem_reserve[]: 0 0 0 0 [ 1831.756332][ T3989] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 1*128kB (U) 0*256kB 0*512kB 0*1024kB 1*2048kB (M) 3*4096kB (M) = 14552kB [ 1831.782670][ T3989] Node 0 DMA32: 302*4kB (ME) 1013*8kB (UME) 482*16kB (UM) 193*32kB (UME) 9*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 23776kB [ 1831.802351][T16678] lowmem_reserve[]: 0 0 707 707 [ 1831.810271][T16678] Node 0 Normal free:4864kB min:8600kB low:10748kB high:12896kB reserved_highatomic:0KB active_anon:363496kB inactive_anon:980kB active_file:104kB inactive_file:60kB unevictable:0kB writepending:0kB present:786432kB managed:724520kB mlocked:0kB kernel_stack:3132kB pagetables:3172kB bounce:0kB free_pcp:16kB local_pcp:16kB free_cma:0kB [ 1831.854238][ T3989] Node 0 Normal: 818*4kB (ME) 115*8kB (UM) 42*16kB (UM) 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4864kB [ 1831.876276][ T3989] Node 1 Normal: 35*4kB (M) 19*8kB (UME) 13*16kB (ME) 11*32kB (UME) 7*64kB (UME) 2*128kB (UM) 3*256kB (UME) 2*512kB (UE) 3*1024kB (UME) 2*2048kB (UE) 3*4096kB (M) = 22804kB [ 1831.897278][T16678] lowmem_reserve[]: 0 0 0 0 [ 1831.901893][T16678] Node 1 Normal free:22804kB min:45956kB low:57444kB high:68932kB reserved_highatomic:0KB active_anon:1248kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870256kB mlocked:0kB kernel_stack:8kB pagetables:0kB bounce:0kB free_pcp:248kB local_pcp:248kB free_cma:0kB [ 1831.940839][T16678] lowmem_reserve[]: 0 0 0 0 [ 1831.945511][T16678] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 1*128kB (U) 0*256kB 0*512kB 0*1024kB 1*2048kB (M) 3*4096kB (M) = 14552kB [ 1831.966403][T16678] Node 0 DMA32: 302*4kB (ME) 1013*8kB (UME) 482*16kB (UM) 193*32kB (UME) 9*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 23776kB [ 1831.972995][ T3989] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1831.994596][T16678] Node 0 Normal: 818*4kB (ME) 115*8kB (UM) 42*16kB (UM) 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4864kB [ 1832.015055][T16678] Node 1 Normal: 35*4kB (M) 19*8kB (UME) 13*16kB (ME) 11*32kB (UME) 7*64kB (UME) 2*128kB (UM) 3*256kB (UME) 2*512kB (UE) 3*1024kB (UME) 2*2048kB (UE) 3*4096kB (M) = 22804kB [ 1832.045482][ T3989] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1832.045917][T16678] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1832.083577][ T3989] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1832.084675][T16678] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1832.113906][ T3989] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1832.123312][T16678] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1832.123356][T16678] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1832.123375][T16678] 349 total pagecache pages [ 1832.167830][ T3989] 349 total pagecache pages [ 1832.172400][ T3989] 0 pages in swap cache [ 1832.179256][T16678] 0 pages in swap cache [ 1832.179420][ T3989] Swap cache stats: add 0, delete 0, find 0/0 [ 1832.183618][T16678] Swap cache stats: add 0, delete 0, find 0/0 [ 1832.206300][T16678] Free swap = 0kB [ 1832.209007][ T3989] Free swap = 0kB [ 1832.210078][T16678] Total swap = 0kB [ 1832.210102][T16678] 1965979 pages RAM [ 1832.213817][ T3989] Total swap = 0kB [ 1832.236678][T16678] 0 pages HighMem/MovableOnly [ 1832.239690][ T3989] 1965979 pages RAM [ 1832.241388][T16678] 68173 pages reserved [ 1832.245192][ T3989] 0 pages HighMem/MovableOnly [ 1832.258047][T16678] 0 pages cma reserved [ 1832.276267][ T3989] 68173 pages reserved [ 1832.280370][ T3989] 0 pages cma reserved [ 1832.284528][ T3989] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz5,task=syz-executor.5,pid=6368,uid=0 [ 1832.312629][ T3989] Out of memory: Killed process 6368 (syz-executor.5) total-vm:72584kB, anon-rss:2200kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1832.332439][ T1065] oom_reaper: reaped process 6368 (syz-executor.5), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 20:49:08 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed06000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:49:08 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02050a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:49:08 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4c0380, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f00000000c0)=ANY=[@ANYBLOB="030000001000000006000000ff03000006f300008e7200005c153027f680ee38bc5dbe028d40a6729f87197adeb8c53bdc2014eeb0e22335f8ccb892a8d99dce6e96fa87f41db1"]) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f0000000080)={0x4000, 0x5000, 0x80, 0x4, 0x7}) 20:49:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80100, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) 20:49:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e00000000020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x200, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1261, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000200)={[], 0x101, 0x193c469d, 0x9, 0x200, 0x1000}) 20:49:08 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x15) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40) socket(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x20, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') link(0x0, 0x0) socketpair(0xa, 0x2, 0xdf, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xb4000, 0x0) lstat(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r4, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) fstat(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0x0) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313430304f302c750100725f83b887", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r3, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=unconfined_u,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1834.639225][T16930] BPF:[1] Invalid name_offset:4294967293 20:49:08 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=@encrypted_update={'update ', 'default', 0x20, 'trusted:'}, 0x18, 0xfffffffffffffffb) 20:49:08 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02060a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:49:08 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed07000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1835.060185][T17049] BPF:[1] Invalid name_offset:4294967293 [ 1835.081527][T17050] BPF:[1] Invalid name_offset:4294967293 20:49:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0xd8, r2, 0x10, 0x70bd2c, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0x5}, @NL80211_ATTR_MAC_ADDRS={0x34, 0xa6, [{0xa, 0x0, @link_local}, {0xa, 0x0, @dev={[], 0x33}}, {0xa}, {0xa, 0x0, @random="7d57b2413b13"}]}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x3}, @NL80211_ATTR_PRIVACY={0x4}, @NL80211_ATTR_TX_RATES={0x7c, 0x5a, [@NL80211_BAND_2GHZ={0x30, 0x0, [@NL80211_TXRATE_LEGACY={0x13, 0x1, "e8147fe348c152831ad9e86611b3b6"}, @NL80211_TXRATE_LEGACY={0x4}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xffff, 0xfbc2, 0x2, 0x3, 0x200, 0x1ff, 0x1, 0x7e55]}}]}, @NL80211_BAND_5GHZ={0x2c, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0x6, 0x1, 0x3, 0x2, 0xfcd, 0x8, 0x1f]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0xfffd, 0x2, 0x1, 0x8, 0x0, 0x2, 0x4]}}]}, @NL80211_BAND_6GHZ={0x1c, 0x3, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0xe, 0x1, "c39c243db423d17a0add"}]}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x24000001}, 0x80) 20:49:08 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0xfffffffd, 0x0, 0x0, 0x4, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) 20:49:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f00000001c0)) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000080)=@get={0x1, &(0x7f0000000040)=""/17, 0x9}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x2, 0x0, @remote, 0x4}, 0x1) r3 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890c, &(0x7f0000000000)) r4 = dup3(r1, r3, 0x0) write$FUSE_NOTIFY_STORE(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="291772c9638ec96c16962b000000040000000000000000000000000000000000000002000000000000000300"/53], 0x2b) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r5, &(0x7f0000000380)='syz0\x00', 0x1ff) ioctl$IOC_PR_RELEASE(r5, 0x401070ca, &(0x7f0000000180)={0xffffffff, 0x4}) [ 1835.388452][T17161] BPF:[1] Invalid name_offset:4294967293 20:49:09 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02070a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1835.430766][T17162] BPF:[1] Invalid name_offset:4294967293 20:49:09 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$kcm(0xa, 0x5, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@rand_addr="67d950b5308dd5041bb1dad92f650506", 0x8, 0x2, 0x2, 0x8, 0xfffa, 0x4}, &(0x7f0000000180)=0x20) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYRESOCT], &(0x7f0000000080)=""/245, 0x17, 0xffffffffffffff85, 0x8}, 0x20) shmget(0x2, 0x1000, 0x4, &(0x7f0000ffd000/0x1000)=nil) 20:49:09 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed08000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:49:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800006b290000001c0000001c0000000200ca47e9e4e0032c8dfc5aa4750000fdffffff0085166cc40b72b9690df4000004"], &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) modify_ldt$write2(0x11, &(0x7f0000000080)={0x8, 0x20000800, 0x400, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1}, 0x10) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x4000) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x101, 0x0) [ 1835.870807][T17279] BPF:btf_header not found [ 1835.903455][T17279] BPF:btf_header not found [ 1838.328419][T17382] IPVS: ftp: loaded support on port[0] = 21 [ 1838.414587][T17382] chnl_net:caif_netlink_parms(): no params data found [ 1838.482903][T17382] bridge0: port 1(bridge_slave_0) entered blocking state [ 1838.496366][T17382] bridge0: port 1(bridge_slave_0) entered disabled state [ 1838.504326][T17382] device bridge_slave_0 entered promiscuous mode [ 1838.512424][T17382] bridge0: port 2(bridge_slave_1) entered blocking state [ 1838.519982][T17382] bridge0: port 2(bridge_slave_1) entered disabled state [ 1838.528372][T17382] device bridge_slave_1 entered promiscuous mode [ 1838.549095][T17382] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1838.560084][T17382] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1838.579883][T17382] team0: Port device team_slave_0 added [ 1838.587012][T17382] team0: Port device team_slave_1 added [ 1838.604263][T17382] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1838.626371][T17382] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1838.676254][T17382] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1838.707657][T17382] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1838.714716][T17382] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1838.766317][T17382] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1838.858866][T17382] device hsr_slave_0 entered promiscuous mode [ 1838.896753][T17382] device hsr_slave_1 entered promiscuous mode [ 1839.081282][T17382] bridge0: port 2(bridge_slave_1) entered blocking state [ 1839.088452][T17382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1839.095771][T17382] bridge0: port 1(bridge_slave_0) entered blocking state [ 1839.102889][T17382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1839.203871][T17382] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1839.232245][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1839.254853][T10494] bridge0: port 1(bridge_slave_0) entered disabled state [ 1839.277400][T10494] bridge0: port 2(bridge_slave_1) entered disabled state [ 1839.338021][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1839.374180][T17382] 8021q: adding VLAN 0 to HW filter on device team0 [ 1839.401502][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1839.417127][ T1960] bridge0: port 1(bridge_slave_0) entered blocking state [ 1839.424214][ T1960] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1839.496031][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1839.509036][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1839.520523][ T8683] bridge0: port 2(bridge_slave_1) entered blocking state [ 1839.527625][ T8683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1839.556935][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1839.577076][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1839.610201][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1839.618906][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1839.647485][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1839.666903][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1839.687051][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1839.706875][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1839.722818][T17382] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1839.734320][T17382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1839.745555][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1839.754656][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1839.766886][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1839.784790][T17382] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1839.797617][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1839.805269][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1840.457432][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1840.476854][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1840.514501][T17382] device veth0_vlan entered promiscuous mode [ 1840.521993][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1840.534975][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1840.551260][T17382] device veth1_vlan entered promiscuous mode [ 1840.567786][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1840.586789][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1840.606894][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1840.637020][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1840.650882][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1840.681012][ T1960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1840.691106][T17382] device veth0_macvtap entered promiscuous mode [ 1840.710611][T17382] device veth1_macvtap entered promiscuous mode [ 1840.735367][T17382] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1840.746980][T17382] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1840.757282][T17382] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1840.768099][T17382] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1840.778446][T17382] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1840.789332][T17382] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1840.799473][T17382] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1840.810234][T17382] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1840.826683][T17382] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1840.856311][T17382] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1840.877827][T17382] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1840.888870][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1840.907457][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1840.915594][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1840.937373][T10494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1840.958029][T17382] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1840.976317][T17382] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1840.986175][T17382] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1841.026595][T17382] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1841.046310][T17382] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1841.066345][T17382] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1841.076185][T17382] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1841.106366][T17382] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1841.126308][T17382] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1841.146300][T17382] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1841.167702][T17382] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1841.175251][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1841.187320][ T8063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1841.385202][T17391] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1841.956798][T30874] tipc: TX() has been purged, node left! [ 1843.009935][T30874] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1843.026371][T30874] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1843.047237][T30874] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1843.054736][T30874] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1843.077514][T30874] device bridge_slave_1 left promiscuous mode [ 1843.083782][T30874] bridge0: port 2(bridge_slave_1) entered disabled state [ 1843.170404][T30874] device bridge_slave_0 left promiscuous mode [ 1843.189623][T30874] bridge0: port 1(bridge_slave_0) entered disabled state [ 1843.250925][T30874] device veth1_macvtap left promiscuous mode [ 1843.266625][T30874] device veth0_macvtap left promiscuous mode [ 1843.272669][T30874] device veth1_vlan left promiscuous mode [ 1843.296333][T30874] device veth0_vlan left promiscuous mode [ 1845.596830][T30874] device hsr_slave_0 left promiscuous mode [ 1845.639272][T30874] device hsr_slave_1 left promiscuous mode [ 1845.707509][T30874] team0 (unregistering): Port device team_slave_1 removed [ 1845.746740][T30874] team0 (unregistering): Port device team_slave_0 removed [ 1845.789875][T30874] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1845.860871][T30874] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1845.957182][T30874] bond0 (unregistering): Released all slaves [ 1846.956026][ T3989] udevd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=-1000 [ 1846.986846][ T3989] CPU: 1 PID: 3989 Comm: udevd Not tainted 5.5.0-rc1-syzkaller #0 [ 1846.994692][ T3989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1847.004755][ T3989] Call Trace: [ 1847.008056][ T3989] dump_stack+0x11d/0x181 [ 1847.012412][ T3989] dump_header+0xaa/0x39c [ 1847.016749][ T3989] oom_kill_process.cold+0x10/0x15 [ 1847.021870][ T3989] out_of_memory+0x231/0xa60 [ 1847.026479][ T3989] __alloc_pages_slowpath+0xdcc/0xee0 [ 1847.031919][ T3989] __alloc_pages_nodemask+0x2c8/0x310 [ 1847.037315][ T3989] alloc_pages_current+0xd1/0x170 [ 1847.042360][ T3989] __page_cache_alloc+0x183/0x1a0 [ 1847.047449][ T3989] ? __do_page_cache_readahead+0x310/0x390 [ 1847.053353][ T3989] pagecache_get_page+0x24b/0x6f0 [ 1847.058438][ T3989] filemap_fault+0xc95/0x10a0 [ 1847.063159][ T3989] ext4_filemap_fault+0x59/0x72 [ 1847.068029][ T3989] __do_fault+0xae/0x1f0 [ 1847.072278][ T3989] __handle_mm_fault+0x270d/0x2e00 [ 1847.077413][ T3989] handle_mm_fault+0x21b/0x530 [ 1847.082196][ T3989] __do_page_fault+0x456/0x8d0 [ 1847.087044][ T3989] do_page_fault+0x38/0x194 [ 1847.091594][ T3989] page_fault+0x34/0x40 [ 1847.095820][ T3989] RIP: 0033:0x4044ad [ 1847.099728][ T3989] Code: Bad RIP value. [ 1847.103795][ T3989] RSP: 002b:00007fff9f1a4260 EFLAGS: 00010207 [ 1847.109863][ T3989] RAX: 0000000000000001 RBX: 0000000000000bb8 RCX: 00007f43d06b6943 [ 1847.117837][ T3989] RDX: 0000000000000008 RSI: 00007fff9f1a4350 RDI: 000000000000000a [ 1847.125871][ T3989] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000001 [ 1847.133851][ T3989] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000003 [ 1847.141833][ T3989] R13: 0000000000000000 R14: 00000000011f7710 R15: 00000000011f6250 [ 1847.736306][ T3989] Mem-Info: [ 1847.739673][ T3989] active_anon:168092 inactive_anon:247 isolated_anon:0 [ 1847.739673][ T3989] active_file:40 inactive_file:9 isolated_file:0 [ 1847.739673][ T3989] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1847.739673][ T3989] slab_reclaimable:5140 slab_unreclaimable:17200 [ 1847.739673][ T3989] mapped:43522 shmem:315 pagetables:1833 bounce:0 [ 1847.739673][ T3989] free:26733 free_pcp:6 free_cma:0 [ 1847.908322][ T3989] Node 0 active_anon:672320kB inactive_anon:988kB active_file:0kB inactive_file:28kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:174088kB dirty:0kB writeback:0kB shmem:1260kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 206848kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1848.036911][ T3989] Node 1 active_anon:48kB inactive_anon:0kB active_file:128kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1848.140863][ T3989] Node 0 DMA free:14648kB min:188kB low:232kB high:276kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1848.253257][ T3989] lowmem_reserve[]: 0 2908 3615 3615 [ 1848.273143][ T3989] Node 0 DMA32 free:38184kB min:35360kB low:44200kB high:53040kB reserved_highatomic:0KB active_anon:270308kB inactive_anon:8kB active_file:4kB inactive_file:8kB unevictable:0kB writepending:0kB present:3129332kB managed:2980540kB mlocked:0kB kernel_stack:812kB pagetables:4088kB bounce:0kB free_pcp:24kB local_pcp:24kB free_cma:0kB [ 1848.406276][ T3989] lowmem_reserve[]: 0 0 707 707 [ 1848.411188][ T3989] Node 0 Normal free:8380kB min:8600kB low:10748kB high:12896kB reserved_highatomic:0KB active_anon:402012kB inactive_anon:980kB active_file:12kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:724520kB mlocked:0kB kernel_stack:3164kB pagetables:3240kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1848.548057][ T3989] lowmem_reserve[]: 0 0 0 0 [ 1848.552621][ T3989] Node 1 Normal free:45916kB min:45956kB low:57444kB high:68932kB reserved_highatomic:0KB active_anon:48kB inactive_anon:0kB active_file:52kB inactive_file:52kB unevictable:0kB writepending:0kB present:3932160kB managed:3870256kB mlocked:0kB kernel_stack:8kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1848.659446][ T3989] lowmem_reserve[]: 0 0 0 0 [ 1848.663991][ T3989] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 0*64kB 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 3*4096kB (M) = 14648kB [ 1848.738057][ T3989] Node 0 DMA32: 369*4kB (UME) 1068*8kB (UME) 509*16kB (UME) 206*32kB (UME) 13*64kB (UME) 3*128kB (ME) 4*256kB (UM) 1*512kB (M) 1*1024kB (U) 1*2048kB (M) 2*4096kB (UM) = 38772kB [ 1848.813723][ T3989] Node 0 Normal: 1253*4kB (UME) 404*8kB (UME) 19*16kB (UME) 10*32kB (UE) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8868kB [ 1848.869526][ T3989] Node 1 Normal: 18*4kB (M) 19*8kB (UME) 15*16kB (UME) 19*32kB (UME) 12*64kB (ME) 11*128kB (M) 7*256kB (ME) 6*512kB (UME) 5*1024kB (UME) 2*2048kB (ME) 7*4096kB (UM) = 46000kB [ 1848.943322][ T3989] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1848.981862][ T3989] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1849.011862][ T3989] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1849.040116][ T3989] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1849.068939][ T3989] 365 total pagecache pages [ 1849.073496][ T3989] 0 pages in swap cache [ 1849.097422][ T3989] Swap cache stats: add 0, delete 0, find 0/0 [ 1849.103547][ T3989] Free swap = 0kB [ 1849.135793][ T3989] Total swap = 0kB [ 1849.151173][ T3989] 1965979 pages RAM [ 1849.154993][ T3989] 0 pages HighMem/MovableOnly [ 1849.187326][ T3989] 68173 pages reserved [ 1849.191490][ T3989] 0 pages cma reserved [ 1849.195576][ T3989] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz5,task=syz-executor.5,pid=17272,uid=0 [ 1849.275288][ T3989] Out of memory: Killed process 17272 (syz-executor.5) total-vm:72716kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1849.944852][ T1] init invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1849.993692][ T1] CPU: 0 PID: 1 Comm: init Not tainted 5.5.0-rc1-syzkaller #0 [ 1850.001172][ T1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1850.011216][ T1] Call Trace: [ 1850.014592][ T1] dump_stack+0x11d/0x181 [ 1850.018988][ T1] dump_header+0xaa/0x39c [ 1850.023371][ T1] oom_kill_process.cold+0x10/0x15 [ 1850.028495][ T1] out_of_memory+0x231/0xa60 [ 1850.033087][ T1] __alloc_pages_slowpath+0xdcc/0xee0 [ 1850.038478][ T1] __alloc_pages_nodemask+0x2c8/0x310 [ 1850.043906][ T1] alloc_pages_current+0xd1/0x170 [ 1850.048978][ T1] __page_cache_alloc+0x183/0x1a0 [ 1850.054067][ T1] ? __do_page_cache_readahead+0x310/0x390 [ 1850.059899][ T1] pagecache_get_page+0x24b/0x6f0 [ 1850.064927][ T1] filemap_fault+0xc95/0x10a0 [ 1850.069636][ T1] ext4_filemap_fault+0x59/0x72 [ 1850.074516][ T1] __do_fault+0xae/0x1f0 [ 1850.078767][ T1] __handle_mm_fault+0x270d/0x2e00 [ 1850.083896][ T1] handle_mm_fault+0x21b/0x530 [ 1850.088665][ T1] __do_page_fault+0x456/0x8d0 [ 1850.093431][ T1] do_page_fault+0x38/0x194 [ 1850.097936][ T1] page_fault+0x34/0x40 [ 1850.102105][ T1] RIP: 0033:0x4022e8 [ 1850.106034][ T1] Code: Bad RIP value. [ 1850.110099][ T1] RSP: 002b:00007ffc699990e8 EFLAGS: 00010206 [ 1850.116158][ T1] RAX: 0000000000000000 RBX: 00007ffc69999320 RCX: 00007f7f5759ac65 [ 1850.124138][ T1] RDX: 00007ffc699993b0 RSI: 000000000000000a RDI: 0000000000000001 [ 1850.132158][ T1] RBP: 0000000000000000 R08: 000000000110b240 R09: 0000000000000001 [ 1850.140192][ T1] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1850.148164][ T1] R13: 00007ffc69999820 R14: 0000000000000000 R15: 0000000000000000 [ 1850.361195][ T1] Mem-Info: [ 1850.366833][ T1] active_anon:167552 inactive_anon:247 isolated_anon:0 [ 1850.366833][ T1] active_file:24 inactive_file:40 isolated_file:25 [ 1850.366833][ T1] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1850.366833][ T1] slab_reclaimable:5088 slab_unreclaimable:17036 [ 1850.366833][ T1] mapped:43547 shmem:315 pagetables:1807 bounce:0 [ 1850.366833][ T1] free:26798 free_pcp:83 free_cma:0 [ 1850.419021][ T1] Node 0 active_anon:670160kB inactive_anon:988kB active_file:28kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:174188kB dirty:0kB writeback:0kB shmem:1260kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 204800kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1850.599166][ T1] Node 1 active_anon:48kB inactive_anon:0kB active_file:52kB inactive_file:52kB unevictable:0kB isolated(anon):0kB isolated(file):112kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1850.626161][ T1] Node 0 DMA free:14648kB min:188kB low:232kB high:276kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1850.655412][ T1] lowmem_reserve[]: 0 2908 3615 3615 [ 1850.660749][ T1] Node 0 DMA32 free:38288kB min:35360kB low:44200kB high:53040kB reserved_highatomic:0KB active_anon:268260kB inactive_anon:8kB active_file:204kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2980540kB mlocked:0kB kernel_stack:796kB pagetables:3984kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1850.692034][ T1] lowmem_reserve[]: 0 0 707 707 [ 1850.696900][ T1] Node 0 Normal free:8244kB min:8600kB low:10748kB high:12896kB reserved_highatomic:0KB active_anon:401900kB inactive_anon:980kB active_file:48kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:724520kB mlocked:0kB kernel_stack:3164kB pagetables:3240kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1850.728830][ T1] lowmem_reserve[]: 0 0 0 0 [ 1850.733371][ T1] Node 1 Normal free:45744kB min:45956kB low:57444kB high:68932kB reserved_highatomic:0KB active_anon:48kB inactive_anon:0kB active_file:32kB inactive_file:96kB unevictable:0kB writepending:0kB present:3932160kB managed:3870256kB mlocked:0kB kernel_stack:8kB pagetables:4kB bounce:0kB free_pcp:248kB local_pcp:0kB free_cma:0kB [ 1850.764265][ T1] lowmem_reserve[]: 0 0 0 0 [ 1850.768831][ T1] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 0*64kB 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 3*4096kB (M) = 14648kB [ 1850.782578][ T1] Node 0 DMA32: 204*4kB (ME) 1067*8kB (UME) 506*16kB (ME) 203*32kB (UME) 13*64kB (UME) 3*128kB (ME) 4*256kB (UM) 1*512kB (M) 1*1024kB (U) 1*2048kB (U) 2*4096kB (M) = 37960kB [ 1850.799924][ T1] Node 0 Normal: 1118*4kB (UME) 395*8kB (UME) 19*16kB (UME) 9*32kB (UE) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8224kB [ 1850.814217][ T1] Node 1 Normal: 2*4kB (UM) 3*8kB (ME) 11*16kB (UME) 19*32kB (UME) 12*64kB (ME) 11*128kB (M) 7*256kB (ME) 6*512kB (UME) 5*1024kB (UME) 2*2048kB (ME) 7*4096kB (UM) = 45744kB [ 1850.831813][ T1] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1850.841420][ T1] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1850.851161][ T1] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1850.860738][ T1] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1850.870085][ T1] 363 total pagecache pages [ 1850.874599][ T1] 0 pages in swap cache [ 1850.878785][ T1] Swap cache stats: add 0, delete 0, find 0/0 [ 1850.884848][ T1] Free swap = 0kB [ 1850.888664][ T1] Total swap = 0kB [ 1850.892415][ T1] 1965979 pages RAM [ 1850.896334][ T1] 0 pages HighMem/MovableOnly [ 1850.901106][ T1] 68173 pages reserved [ 1850.905157][ T1] 0 pages cma reserved [ 1850.909238][ T1] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz5,task=syz-executor.5,pid=6340,uid=0 [ 1850.923852][ T1] Out of memory: Killed process 6340 (syz-executor.5) total-vm:72584kB, anon-rss:2200kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1850.940947][ T1065] oom_reaper: reaped process 6340 (syz-executor.5), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 1851.098478][ T8042] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1851.126369][ T8042] CPU: 1 PID: 8042 Comm: syz-fuzzer Not tainted 5.5.0-rc1-syzkaller #0 [ 1851.134722][ T8042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1851.144819][ T8042] Call Trace: [ 1851.148176][ T8042] dump_stack+0x11d/0x181 [ 1851.152524][ T8042] dump_header+0xaa/0x39c [ 1851.156875][ T8042] oom_kill_process.cold+0x10/0x15 [ 1851.161987][ T8042] out_of_memory+0x231/0xa60 [ 1851.166757][ T8042] __alloc_pages_slowpath+0xdcc/0xee0 [ 1851.172160][ T8042] __alloc_pages_nodemask+0x2c8/0x310 [ 1851.177600][ T8042] alloc_pages_current+0xd1/0x170 [ 1851.182617][ T8042] __page_cache_alloc+0x183/0x1a0 [ 1851.187640][ T8042] ? __do_page_cache_readahead+0x310/0x390 [ 1851.193453][ T8042] pagecache_get_page+0x24b/0x6f0 [ 1851.198543][ T8042] filemap_fault+0xc95/0x10a0 [ 1851.203217][ T8042] ext4_filemap_fault+0x59/0x72 [ 1851.208068][ T8042] __do_fault+0xae/0x1f0 [ 1851.212355][ T8042] __handle_mm_fault+0x270d/0x2e00 [ 1851.217474][ T8042] handle_mm_fault+0x21b/0x530 [ 1851.222258][ T8042] __do_page_fault+0x456/0x8d0 [ 1851.227081][ T8042] do_page_fault+0x38/0x194 [ 1851.231603][ T8042] page_fault+0x34/0x40 [ 1851.235753][ T8042] RIP: 0033:0x4334b0 [ 1851.239718][ T8042] Code: Bad RIP value. [ 1851.243778][ T8042] RSP: 002b:000000c420039728 EFLAGS: 00010206 [ 1851.249860][ T8042] RAX: 0000000000000000 RBX: 00000000216d9a78 RCX: 000001aeb5677c75 [ 1851.257926][ T8042] RDX: 0000000016aabfde RSI: 00000000000592a6 RDI: 00007ffdc7d25080 [ 1851.265913][ T8042] RBP: 000000c420039750 R08: 00007ffdc7d25090 R09: 00000000000592a6 [ 1851.273901][ T8042] R10: 000000c42004dfc8 R11: 000000c42004dfc0 R12: 000001b920b86c6c [ 1851.281882][ T8042] R13: 0000000000000001 R14: 000000c4381b02d0 R15: 0000000000000002 [ 1851.410413][ T8042] Mem-Info: [ 1851.413624][ T8042] active_anon:167011 inactive_anon:247 isolated_anon:0 [ 1851.413624][ T8042] active_file:3 inactive_file:20 isolated_file:25 [ 1851.413624][ T8042] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1851.413624][ T8042] slab_reclaimable:5085 slab_unreclaimable:17032 [ 1851.413624][ T8042] mapped:43522 shmem:315 pagetables:1781 bounce:0 [ 1851.413624][ T8042] free:26654 free_pcp:0 free_cma:0 [ 1851.450786][ T8042] Node 0 active_anon:667996kB inactive_anon:988kB active_file:0kB inactive_file:40kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:174088kB dirty:0kB writeback:0kB shmem:1260kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 202752kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1851.479327][ T8042] Node 1 active_anon:48kB inactive_anon:0kB active_file:28kB inactive_file:40kB unevictable:0kB isolated(anon):0kB isolated(file):100kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1851.506087][ T8042] Node 0 DMA free:14648kB min:188kB low:232kB high:276kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1851.535870][ T8042] lowmem_reserve[]: 0 2908 3615 3615 [ 1851.541248][ T8042] Node 0 DMA32 free:38116kB min:35360kB low:44200kB high:53040kB reserved_highatomic:0KB active_anon:266212kB inactive_anon:8kB active_file:0kB inactive_file:24kB unevictable:0kB writepending:0kB present:3129332kB managed:2980540kB mlocked:0kB kernel_stack:780kB pagetables:3880kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1851.572274][ T8042] lowmem_reserve[]: 0 0 707 707 [ 1851.577139][ T8042] Node 0 Normal free:8348kB min:8600kB low:10748kB high:12896kB reserved_highatomic:0KB active_anon:401784kB inactive_anon:980kB active_file:0kB inactive_file:16kB unevictable:0kB writepending:0kB present:786432kB managed:724520kB mlocked:0kB kernel_stack:3164kB pagetables:3240kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1851.610968][ T8042] lowmem_reserve[]: 0 0 0 0 [ 1851.615503][ T8042] Node 1 Normal free:45504kB min:45956kB low:57444kB high:68932kB reserved_highatomic:0KB active_anon:48kB inactive_anon:0kB active_file:32kB inactive_file:60kB unevictable:0kB writepending:0kB present:3932160kB managed:3870256kB mlocked:0kB kernel_stack:8kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1851.646154][ T8042] lowmem_reserve[]: 0 0 0 0 [ 1851.651366][ T8042] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 0*64kB 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 3*4096kB (M) = 14648kB [ 1851.665084][ T8042] Node 0 DMA32: 331*4kB (UME) 1066*8kB (UME) 507*16kB (UME) 202*32kB (ME) 12*64kB (ME) 3*128kB (ME) 4*256kB (UM) 1*512kB (M) 1*1024kB (U) 1*2048kB (M) 2*4096kB (M) = 38380kB [ 1851.682413][ T8042] Node 0 Normal: 1154*4kB (UME) 395*8kB (UME) 19*16kB (UME) 10*32kB (UME) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8400kB [ 1851.696798][ T8042] Node 1 Normal: 19*4kB (UM) 10*8kB (ME) 12*16kB (UME) 19*32kB (UME) 12*64kB (ME) 11*128kB (M) 7*256kB (ME) 6*512kB (UME) 5*1024kB (UME) 2*2048kB (ME) 7*4096kB (UM) = 45884kB [ 1851.714379][ T8042] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1851.723950][ T8042] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1851.733382][ T8042] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1851.743187][ T8042] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1851.752572][ T8042] 381 total pagecache pages [ 1851.757116][ T8042] 0 pages in swap cache [ 1851.761284][ T8042] Swap cache stats: add 0, delete 0, find 0/0 [ 1851.767829][ T8042] Free swap = 0kB [ 1851.771607][ T8042] Total swap = 0kB [ 1851.775370][ T8042] 1965979 pages RAM [ 1851.779217][ T8042] 0 pages HighMem/MovableOnly [ 1851.783885][ T8042] 68173 pages reserved [ 1851.788112][ T8042] 0 pages cma reserved [ 1851.792182][ T8042] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz5,task=syz-executor.5,pid=6304,uid=0 [ 1851.806823][ T8042] Out of memory: Killed process 6304 (syz-executor.5) total-vm:72584kB, anon-rss:2200kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1851.823801][ T1065] oom_reaper: reaped process 6304 (syz-executor.5), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 1851.896643][ T8053] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1851.907591][ T8053] CPU: 1 PID: 8053 Comm: syz-fuzzer Not tainted 5.5.0-rc1-syzkaller #0 [ 1851.915824][ T8053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1851.925868][ T8053] Call Trace: [ 1851.929166][ T8053] dump_stack+0x11d/0x181 [ 1851.933479][ T8053] dump_header+0xaa/0x39c [ 1851.937824][ T8053] oom_kill_process.cold+0x10/0x15 [ 1851.943024][ T8053] out_of_memory+0x231/0xa60 [ 1851.947682][ T8053] __alloc_pages_slowpath+0xdcc/0xee0 [ 1851.953054][ T8053] __alloc_pages_nodemask+0x2c8/0x310 [ 1851.958544][ T8053] alloc_pages_current+0xd1/0x170 [ 1851.963605][ T8053] __page_cache_alloc+0x183/0x1a0 [ 1851.968635][ T8053] ? __do_page_cache_readahead+0x310/0x390 [ 1851.974436][ T8053] pagecache_get_page+0x24b/0x6f0 [ 1851.979482][ T8053] filemap_fault+0xc95/0x10a0 [ 1851.984149][ T8053] ext4_filemap_fault+0x59/0x72 [ 1851.988989][ T8053] __do_fault+0xae/0x1f0 [ 1851.993302][ T8053] __handle_mm_fault+0x270d/0x2e00 [ 1851.998429][ T8053] handle_mm_fault+0x21b/0x530 [ 1852.003192][ T8053] __do_page_fault+0x456/0x8d0 [ 1852.008041][ T8053] do_page_fault+0x38/0x194 [ 1852.012602][ T8053] page_fault+0x34/0x40 [ 1852.016761][ T8053] RIP: 0033:0x40a2c0 [ 1852.020728][ T8053] Code: Bad RIP value. [ 1852.024786][ T8053] RSP: 002b:000000c4201e3af8 EFLAGS: 00010246 [ 1852.030880][ T8053] RAX: 000000c43a0d6840 RBX: 000000c442885000 RCX: 000000c442884040 [ 1852.038838][ T8053] RDX: 0000000000821aa0 RSI: 0000000000000000 RDI: 0000000000000000 [ 1852.046797][ T8053] RBP: 000000c4201e3c60 R08: 00000000008b5db6 R09: 0000000000000000 [ 1852.054785][ T8053] R10: 00000000009e4f08 R11: 0000000000000006 R12: 0000000000000000 [ 1852.062751][ T8053] R13: 00000000000000f2 R14: 0000000000000032 R15: 00000000000000aa [ 1852.083822][ T8053] Mem-Info: [ 1852.087059][ T8053] active_anon:166472 inactive_anon:247 isolated_anon:0 [ 1852.087059][ T8053] active_file:7 inactive_file:12 isolated_file:0 [ 1852.087059][ T8053] unevictable:0 dirty:0 writeback:2 unstable:0 [ 1852.087059][ T8053] slab_reclaimable:5082 slab_unreclaimable:17027 [ 1852.087059][ T8053] mapped:43522 shmem:315 pagetables:1780 bounce:0 [ 1852.087059][ T8053] free:26665 free_pcp:0 free_cma:0 [ 1852.250074][ T8053] Node 0 active_anon:665840kB inactive_anon:988kB active_file:16kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:174088kB dirty:0kB writeback:0kB shmem:1260kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 200704kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1852.366394][ T8053] Node 1 active_anon:48kB inactive_anon:0kB active_file:40kB inactive_file:48kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1852.496718][ T8053] Node 0 DMA free:14648kB min:188kB low:232kB high:276kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1852.625420][ T8053] lowmem_reserve[]: 0 2908 3615 3615 [ 1852.637501][ T8042] ================================================================== [ 1852.645662][ T8042] BUG: KCSAN: data-race in do_try_to_free_pages / shrink_node [ 1852.648988][ T8053] Node 0 DMA32 free:37788kB min:35360kB low:44200kB high:53040kB reserved_highatomic:0KB active_anon:264164kB inactive_anon:8kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:3129332kB managed:2980540kB mlocked:0kB kernel_stack:764kB pagetables:3784kB bounce:0kB free_pcp:4kB local_pcp:4kB free_cma:0kB [ 1852.653231][ T8042] [ 1852.686655][ T8042] read to 0xffff88812bcfb478 of 8 bytes by task 8040 on cpu 1: [ 1852.694212][ T8042] shrink_node+0x9c5/0xfe0 [ 1852.698637][ T8042] do_try_to_free_pages+0x245/0xb60 [ 1852.703850][ T8042] try_to_free_pages+0x1f5/0x4a0 [ 1852.708803][ T8042] __alloc_pages_slowpath+0x45c/0xee0 [ 1852.714187][ T8042] __alloc_pages_nodemask+0x2c8/0x310 [ 1852.719558][ T8042] alloc_pages_current+0xd1/0x170 [ 1852.724591][ T8042] __page_cache_alloc+0x183/0x1a0 [ 1852.729624][ T8042] pagecache_get_page+0x24b/0x6f0 [ 1852.734649][ T8042] filemap_fault+0xc95/0x10a0 [ 1852.739323][ T8042] ext4_filemap_fault+0x59/0x72 [ 1852.744192][ T8042] __do_fault+0xae/0x1f0 [ 1852.748438][ T8042] __handle_mm_fault+0x270d/0x2e00 [ 1852.753563][ T8042] handle_mm_fault+0x21b/0x530 [ 1852.758329][ T8042] __do_page_fault+0x456/0x8d0 [ 1852.763097][ T8042] do_page_fault+0x38/0x194 [ 1852.767607][ T8042] page_fault+0x34/0x40 [ 1852.771748][ T8042] [ 1852.774086][ T8042] write to 0xffff88812bcfb478 of 8 bytes by task 8042 on cpu 0: [ 1852.780247][ T8053] lowmem_reserve[]: 0 0 707 707 [ 1852.781736][ T8042] do_try_to_free_pages+0x75f/0xb60 [ 1852.791758][ T8042] try_to_free_pages+0x1f5/0x4a0 [ 1852.796718][ T8042] __alloc_pages_slowpath+0x45c/0xee0 [ 1852.799426][ T8053] Node 0 Normal free:8516kB min:8600kB low:10748kB high:12896kB reserved_highatomic:0KB active_anon:401676kB inactive_anon:980kB active_file:16kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:724520kB mlocked:0kB kernel_stack:3164kB pagetables:3232kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1852.802119][ T8042] __alloc_pages_nodemask+0x2c8/0x310 [ 1852.838373][ T8042] alloc_pages_current+0xd1/0x170 [ 1852.843407][ T8042] __page_cache_alloc+0x183/0x1a0 [ 1852.848446][ T8042] pagecache_get_page+0x24b/0x6f0 [ 1852.853488][ T8042] filemap_fault+0xc95/0x10a0 [ 1852.858204][ T8042] ext4_filemap_fault+0x59/0x72 [ 1852.863066][ T8042] __do_fault+0xae/0x1f0 [ 1852.867332][ T8042] __handle_mm_fault+0x270d/0x2e00 [ 1852.872458][ T8042] handle_mm_fault+0x21b/0x530 [ 1852.877243][ T8042] __do_page_fault+0x456/0x8d0 [ 1852.882022][ T8042] do_page_fault+0x38/0x194 [ 1852.886539][ T8042] page_fault+0x34/0x40 [ 1852.890694][ T8042] [ 1852.893015][ T8042] Reported by Kernel Concurrency Sanitizer on: [ 1852.899184][ T8042] CPU: 0 PID: 8042 Comm: syz-fuzzer Not tainted 5.5.0-rc1-syzkaller #0 [ 1852.901515][ T8053] lowmem_reserve[]: 0 0 0 0 [ 1852.907423][ T8042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1852.907431][ T8042] ================================================================== [ 1852.907441][ T8042] Kernel panic - not syncing: panic_on_warn set ... [ 1852.907471][ T8042] CPU: 0 PID: 8042 Comm: syz-fuzzer Not tainted 5.5.0-rc1-syzkaller #0 [ 1852.938719][ T8053] Node 1 Normal free:45956kB min:45956kB low:57444kB high:68932kB reserved_highatomic:0KB active_anon:48kB inactive_anon:0kB active_file:40kB inactive_file:48kB unevictable:0kB writepending:0kB present:3932160kB managed:3870256kB mlocked:0kB kernel_stack:8kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1852.944853][ T8042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1852.985191][ T8042] Call Trace: [ 1852.988480][ T8042] dump_stack+0x11d/0x181 [ 1852.992827][ T8042] panic+0x210/0x640 [ 1852.993420][ T8053] lowmem_reserve[]: 0 0 0 0 [ 1852.996747][ T8042] ? vprintk_func+0x8d/0x140 [ 1852.996777][ T8042] kcsan_report.cold+0xc/0xd [ 1853.001493][ T8053] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 0*64kB 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 3*4096kB (M) = 14648kB [ 1853.006083][ T8042] kcsan_setup_watchpoint+0x3fe/0x460 [ 1853.006105][ T8042] __tsan_unaligned_write8+0xc7/0x110 [ 1853.006126][ T8042] do_try_to_free_pages+0x75f/0xb60 [ 1853.006240][ T8042] try_to_free_pages+0x1f5/0x4a0 [ 1853.010823][ T8053] Node 0 DMA32: 340*4kB (UME) 1073*8kB (UME) 508*16kB (UME) 204*32kB (UME) 14*64kB (UME) 4*128kB (UME) 3*256kB (M) 1*512kB (M) 1*1024kB (U) 3*2048kB (UM) 1*4096kB (M) = 38552kB [ 1853.024360][ T8042] __alloc_pages_slowpath+0x45c/0xee0 [ 1853.024403][ T8042] __alloc_pages_nodemask+0x2c8/0x310 [ 1853.029763][ T8053] Node 0 Normal: 1266*4kB (UME) 399*8kB (UME) 20*16kB (UME) 10*32kB (UME) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8896kB [ 1853.035239][ T8042] alloc_pages_current+0xd1/0x170 [ 1853.040430][ T8053] Node 1 Normal: 19*4kB (UM) 19*8kB (UME) 15*16kB (ME) 19*32kB (UME) 12*64kB (ME) 11*128kB (M) 7*256kB (ME) 6*512kB (UME) 5*1024kB (UME) 2*2048kB (ME) 7*4096kB (UM) = 46004kB [ 1853.045359][ T8042] __page_cache_alloc+0x183/0x1a0 [ 1853.045378][ T8042] ? __do_page_cache_readahead+0x310/0x390 [ 1853.045411][ T8042] pagecache_get_page+0x24b/0x6f0 [ 1853.062867][ T8053] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1853.068220][ T8042] filemap_fault+0xc95/0x10a0 [ 1853.068252][ T8042] ext4_filemap_fault+0x59/0x72 [ 1853.073626][ T8053] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1853.087942][ T8042] __do_fault+0xae/0x1f0 [ 1853.087965][ T8042] __handle_mm_fault+0x270d/0x2e00 [ 1853.087998][ T8042] handle_mm_fault+0x21b/0x530 [ 1853.093020][ T8053] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1853.110396][ T8042] __do_page_fault+0x456/0x8d0 [ 1853.110427][ T8042] do_page_fault+0x38/0x194 [ 1853.115518][ T8053] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1853.121252][ T8042] page_fault+0x34/0x40 [ 1853.121276][ T8042] RIP: 0033:0x4334b0 [ 1853.126309][ T8053] 355 total pagecache pages [ 1853.135841][ T8042] Code: Bad RIP value. [ 1853.140546][ T8053] 0 pages in swap cache [ 1853.145477][ T8042] RSP: 002b:000000c420039728 EFLAGS: 00010206 [ 1853.154773][ T8053] Swap cache stats: add 0, delete 0, find 0/0 [ 1853.158986][ T8042] RAX: 0000000000000000 RBX: 00000000216d9a78 RCX: 000001aeb5677c75 [ 1853.159018][ T8042] RDX: 0000000016aabfde RSI: 00000000000592a6 RDI: 00007ffdc7d25080 [ 1853.164116][ T8053] Free swap = 0kB [ 1853.168873][ T8042] RBP: 000000c420039750 R08: 00007ffdc7d25090 R09: 00000000000592a6 [ 1853.168891][ T8042] R10: 000000c42004dfc8 R11: 000000c42004dfc0 R12: 000001b920b86c6c [ 1853.168902][ T8042] R13: 0000000000000001 R14: 000000c4381b02d0 R15: 0000000000000002 [ 1853.179938][ T8042] Kernel Offset: disabled [ 1853.278933][ T8042] Rebooting in 86400 seconds..