(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x722000, 0x0, 0x0, 0x0) 04:11:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x17, &(0x7f0000000280)=0x9, 0x4) 04:11:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x7530, 0x380000, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:02 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x18, &(0x7f0000000280)=0x9, 0x4) 04:11:02 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x0, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'bond0\x00'}) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x770000, 0x0, 0x0, 0x0) 04:11:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x8080fffffffe) 04:11:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000280)=0x9, 0x4) 04:11:02 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x907100, 0x0, 0x0, 0x0) 04:11:02 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x0, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'bond0\x00'}) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0xa05100, 0x0, 0x0, 0x0) 04:11:03 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:03 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x7800, 0x380000, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1d, &(0x7f0000000280)=0x9, 0x4) 04:11:03 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x0, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'bond0\x00'}) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000280)=0x9, 0x4) 04:11:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0xb70000, 0x0, 0x0, 0x0) 04:11:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x1000000, 0x0, 0x0, 0x0) 04:11:03 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x21, &(0x7f0000000280)=0x9, 0x4) 04:11:03 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x9, 0x8080fffffffe) 04:11:03 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'bond0\x00'}) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0xd010000, 0x0, 0x0, 0x0) 04:11:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000280)=0x9, 0x4) 04:11:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x7a00, 0x380000, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:04 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x29000000, 0x0, 0x0, 0x0) 04:11:04 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xa, 0x8080fffffffe) 04:11:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f0000000280)=0x9, 0x4) 04:11:04 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'bond0\x00'}) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x30000000, 0x0, 0x0, 0x0) 04:11:04 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x25, &(0x7f0000000280)=0x9, 0x4) 04:11:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x80fe, 0x380000, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) [ 1704.828275][T10386] TCP: TCP_TX_DELAY enabled 04:11:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0xff600000, 0x0, 0x0, 0x0) 04:11:04 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xd, 0x8080fffffffe) 04:11:04 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x3) 04:11:04 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'bond0\x00'}) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:04 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x10, 0x8080fffffffe) 04:11:04 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x400000000000, 0x0, 0x0, 0x0) 04:11:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x8) 04:11:05 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'bond0\x00'}) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x60ffffffffff, 0x0, 0x0, 0x0) 04:11:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0xc0fe, 0x380000, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1, &(0x7f0000000280)=0x2000001, 0x4) 04:11:05 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x12, 0x8080fffffffe) 04:11:05 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:05 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'bond0\x00'}) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x770000000000, 0x0, 0x0, 0x0) 04:11:05 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x7fffffffefff, 0x0, 0x0, 0x0) 04:11:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x204842) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) shutdown(0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000180), r4, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x2, {0x6, 0xbdc, "899dc914c893efad18b122e6fa7129cd5e01563e10db93d7066398d778849eea7f60b5758de127fef8ae21c2283d20dcaaf041035196266d9532f2c1861e65b29dc58ef2fb268b4a02b7663ea0a1859677358e504511a577440336ddbb8e16579752a23c91e5968cf7e3804e887d660f8967717c31e69f0bf6b1e1ef3df6590a0aa24c3fa23addff2f2cd805535a4ac85c2a046255778e239d5410126d86fa8521b280eeac0a693c2269fba3a5aef2db048001ce66a517297c8079612df6a0ee965737eb2230fd9872f5b29e07c17e933676ce54af6a8626444ba373db035dc5cf5fc62ae28d83f1f4e58865dd2c7ced6e0584eb920567ab7ad6c8442a9e64f1", 0x1d, 0x1, 0xff, 0x80, 0x81, 0x18, 0x9}, r4}}, 0x128) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x680, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r6, 0xffffffffffffffff, r7, 0x0) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nvram\x00', 0x800, 0x0) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r5, 0x7, r7, &(0x7f0000000480)={r8, r9, 0x4}) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x3, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x8000}, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0xfffffffc}, r5, 0xffffffffffffffff, r10, 0xa) r11 = getpid() sched_setscheduler(r11, 0x5, &(0x7f0000000380)) r12 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) r13 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000940)='/dev/autofs\x00', 0x8c802, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0x3, 0x3}, r11, 0xffffffffffffffff, r13, 0x0) sendmsg$AUDIT_ADD_RULE(r12, &(0x7f00000009c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000980)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x444}, 0x1, 0x0, 0x0, 0x8000}, 0x10) ioctl$USBDEVFS_BULK(r2, 0xc0185502, &(0x7f0000000340)={{{0xb}}, 0x74, 0x4, &(0x7f00000002c0)="eb59df30db3a0ca326106602084ce633750f1d257b557c3fcc0fda3cf6fa23e7ba9121cc12bd4d1d354afa84f104fb0a436ce111850bb3067515fa06484fa1d2760d41b1be22396ae42622c5c728adf6cd05f62f80a13b8f9b374dd847e5b6172e428cc5ef24822de6cff7fb9cec25eaed67494b"}) ioctl$IMCTRLREQ(r10, 0x80044945, &(0x7f0000000240)={0x8, 0x7, 0x8, 0x8}) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:05 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x1b, 0x8080fffffffe) 04:11:05 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'bond0\x00'}) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:05 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:06 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0xe803, 0x380000, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:06 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0xb70000000000, 0x0, 0x0, 0x0) 04:11:06 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x482, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000080)={0xfa20000, 0x1, 0xd4, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x990afa, 0x3040000, [], @value=0xfffff000}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_ENUMAUDIO(r1, 0xc0345641, &(0x7f00000000c0)={0x101, "7b3cd19433f982a8b18979dd012ef267546a9f41f8534e4538f8e54c79c4e526", 0x1, 0x1}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r5, 0xffffffffffffffff, r6, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r6, 0x84, 0x70, &(0x7f0000000180)={r7, @in6={{0xa, 0x4e23, 0x10000, @rand_addr="be6c8273b6e4af586689dd08a009fc89", 0x4}}, [0x80000000, 0xfffffffffffffffc, 0xc38, 0x101, 0x9305, 0x1f, 0x100000001, 0x7, 0x1, 0xc9e, 0x94, 0x4, 0x2, 0xffffffff00000001, 0x5]}, &(0x7f00000002c0)=0x100) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r4, 0x0) ptrace$pokeuser(0x6, r3, 0xff, 0x8) 04:11:06 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x1e, 0x8080fffffffe) 04:11:06 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'bond0\x00'}) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r1, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r4}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:06 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x24, 0x8080fffffffe) 04:11:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x20720000000000, 0x0, 0x0, 0x0) 04:11:06 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000400)={0x9, "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"}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e21, 0x6a1e, @mcast2}, {0xa, 0x4e22, 0xfff, @ipv4={[], [], @remote}, 0x1}, 0x1f, [0x40, 0xb11, 0x80000001, 0x3, 0x1, 0x5, 0x9, 0x8]}, 0x5c) 04:11:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x90710000000000, 0x0, 0x0, 0x0) 04:11:06 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'bond0\x00'}) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r1, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r4}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:07 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0xf401, 0x380000, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:07 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x3b, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:07 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x2d, 0x8080fffffffe) 04:11:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0xa0510000000000, 0x0, 0x0, 0x0) 04:11:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000000)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) r3 = add_key$keyring(0x0, &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r3) keyctl$clear(0x7, r3) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:07 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'bond0\x00'}) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r1, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r4}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000000)=0x7, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x100000000000000, 0x0, 0x0, 0x0) 04:11:07 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'bond0\x00'}) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r1, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r4}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:07 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:07 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x36, 0x8080fffffffe) 04:11:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0xd01000000000000, 0x0, 0x0, 0x0) [ 1707.954378][T11703] BPF:Unsupported version [ 1707.971503][T11703] BPF:Unsupported version 04:11:08 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0xfc00, 0x380000, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000100)}}, 0x10) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r4, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x4e24, 0x3, @local, 0x7c}}, 0x0, 0x0, 0x4f, 0x0, "8538f2977b3d3f01cfc3c926ea8a26729c46372b3f61826b7bc7ed524d58f4789d80ff876c8c7cffef07bcd610b1bd7d9e7bc50a6d0466f98f63372278516f7ecd28310bcbc57dd5037cb2c59bebb5a0"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:08 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x3, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x2900000000000000, 0x0, 0x0, 0x0) 04:11:08 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'bond0\x00'}) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r1, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r4}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:08 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x48, 0x8080fffffffe) [ 1708.680870][T11933] BPF:Unsupported version [ 1708.692803][T11933] BPF:Unsupported version 04:11:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x3000000000000000, 0x0, 0x0, 0x0) 04:11:08 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x6000, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:08 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x4, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:08 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'bond0\x00'}) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r1, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r4}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0xffefffffff7f0000, 0x0, 0x0, 0x0) [ 1708.863364][T12052] BPF:Unsupported version [ 1708.881716][T12052] BPF:Unsupported version 04:11:08 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x8, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1709.090208][T12170] BPF:Unsupported version [ 1709.099352][T12170] BPF:Unsupported version 04:11:09 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0xfe80, 0x380000, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x51, 0x8080fffffffe) 04:11:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0xffffffffff600000, 0x0, 0x0, 0x0) 04:11:09 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x25, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:09 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x44, r4, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipvlan1\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xf}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r4, 0xec954fab286f28fd, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xc00c050}, 0x890) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r5, 0xffffffffffffffff, r6, 0x0) r7 = syz_open_procfs(r5, &(0x7f0000002800)='net/ip_vs\x00') write$P9_RLOCK(r7, &(0x7f0000002840)={0x8, 0x35, 0x1}, 0x8) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f00000029c0)={&(0x7f0000002900)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000002980)={&(0x7f0000002940)={0x24, r4, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x31}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x8040}, 0x24004001) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r8, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r9 = getpid() sched_setscheduler(r9, 0x5, &(0x7f0000000380)) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r9, 0xffffffffffffffff, r10, 0x0) r11 = getpid() sched_setscheduler(r11, 0x5, &(0x7f0000000380)) r12 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r11, 0xffffffffffffffff, r12, 0x0) getpeername$packet(r12, &(0x7f0000002780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000027c0)=0x14) sendmsg$inet6(r8, &(0x7f00000028c0)={&(0x7f0000000040)={0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c, &(0x7f00000026c0)=[{&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000000080)="5b0b46ac4cdbaac0436caf04cb1dbba272ab5f937e7be49b9ced564648dc4ef33c968e410117dd8e9aae2657b5f742556dd4cd3b4ade32d31c63967460bbb15cb7db7902db381a65d2f7db672e84a4ae889b2be04772ac146db698311abfd3260015f093bcad37567cd007e8e8e44e2c4aa5ebb23cf1ecfef076b77b09e763a0e1dd9534cd681ea4e7ff", 0x8a}, {&(0x7f0000000140)="6930c17d9ff38596b1edefba905173c499f22caebcb148800bce1c08d556bf81408b93c0e74dda3370a81cc16a7b55b74a2898ba5a5a8c8f03e192ac9980ca77674bbe3c6f6162336848e6ef7879a0f643392af4ca42631254a95ab4dd221a832c9d57becbc1d8918615eac94da36738913e09f8c0801e353b954a7806f376aad4feb891a776af8dd56dabd950", 0x8d}, {&(0x7f0000001400)="4320a0ee17e2141caa60aa196b0845c097389bbefbcef56f74cb79429c5541d92c8c36a391c4de79e97c375723ea68e1a1e65fec0ea856ccd6b3bb7f14ad72103e6a57efe80c72358d0ce40eed8d0920c4b85cbccfd30f5f078c09be2704ffb922501e9efc87df3e675772475ce10b6ffb4555ae2b2e724c8c25c189b4e6f0eea40c14bc5ac08ddfaf481f0a08bb41a6470a3fa7cd3183d3ab862cc8f21d50a24971d40690780edfe69b9def5147da0dfccda928a0831c66148dfb62ad2f0f81eb305829d18cb7", 0xc7}, {&(0x7f00000002c0)="e7a8a2d79b228e463351e36999dbbc27c7260bbb061a0b387b712a7b41814b83c9688db68e97fa0ee8e19c5c867436fef98a32866a4150b67363b83a7aab79598e0caad719ee3aeb001684daa5a1b8987ca4df50e6299ec27347db5d534db7efa33e067d02e9d265b94c8db73183d1f7d10ac39d7d57a82b426b33bbf4317796f6272f197990cbe0dc034e7c8aed1929a9d26433d5e56fb8f4f24b11d4273c9527b7e57ebaf7fc77bef36b37d1bd703b73d6ddd041c62157fc30272d", 0xbc}, {&(0x7f0000000200)="f2f8b8651b1575935295b0e83a07008bc4b5d6a239d500796e0b549761ed310a0102fccfdb0634f176bb79f143b400cbe48c13a6cc51c2709daf86bed4508484b974fa2fb7bd78b1adadf71c562269dc007677f9169c3514bbf5ef032ce9a5a9d9309d7dcb3c", 0x66}, {&(0x7f0000001500)="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", 0x1000}, {&(0x7f0000002500)="520f1e515727716dba9bd736f455bdb573d9fa7e0fc6eba85d886be4abfd5d92c84eb692353054dac339307412f5649ae151a755b1a5b8f8d95c5514e8e1faefc491174e5f4c96d12352590b0092250d2055a36e5e95c74c1196b3b8a5063fc3e553bfe1e26aa115e7590067a86aa1ab3ce30569eb1e6b5181b4a0bec235652ac54360dd", 0x84}, {&(0x7f00000025c0)="36befd7b72de537c05e690ebb4758e8fbb96f8097ff255fa38482c5a793e6133f1161585bb", 0x25}, {&(0x7f0000002600)="91340792bf7a9fb0d382ee446d117727041cdb6f74cf497c7082594bd85940f8f126ea33c601d30a54fbca79f60796b8a0b70263477eebd77958ae6f4fa45accb42170301f08396f444a373758f288f17678dabccf3bd1d767a255c510ce6ebb2f562c58e15ba50412cd10e06cf5cb962a5ec999796111d335d09bed7b57194ac6b75a61fd0ca68c2a3bcd5730f06c4e1c08b84643b6147b4835dcb36dda90a3d12d7679e52e6d33c4b9282b01a339ad989665768da57ce812a4bb82", 0xbc}], 0xa, &(0x7f0000002a00)=ANY=[@ANYBLOB="68000000000000002900000039000000000a02f900000000fe8000000000000000000000000000aafe8000000000000000000000000000bbfe800000000000000000000000000039ff020000000000000000000000000001fe8000000000000000000000000000bb2400000000000000290000003200000000000000000000000000ffffac1e0001", @ANYRES32=r13, @ANYBLOB="00001c1c998a2b7d872f027ee15c7ae6f04cfaa1673c29d375fee73c630e1e8031aa886687a0156433bbe066034e8a9424d5403bb17c7a838ecfc67b34d7499c32b3c10deeba90d1189a5a17444dadb42222e105a2136a7539af6634eca00efa41000000000000000000000000a269e32c79a490d202c57bfe338d3ebb92fb746132981c11458a9769c80ba80942d8d3f5951e4eb27f0917ffd5571b"], 0x90}, 0x4000) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r10, 0xc01064ab, &(0x7f0000000000)={0x5, 0x684}) 04:11:09 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1709.642694][T12389] BPF:Unsupported version [ 1709.645236][T12393] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 04:11:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x29, 0x0, 0x0) [ 1709.687744][T12393] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 04:11:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x30, 0x0, 0x0) [ 1709.730621][T12389] BPF:Unsupported version 04:11:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x10d, 0x0, 0x0) 04:11:09 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000000)={0x6, 0x80000001, 0x4, 0x401, 0xfffffffb, 0x1}) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0xd01, 0x0, 0x0) 04:11:10 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0xfec0, 0x380000, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:10 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x3b, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x5a, 0x8080fffffffe) 04:11:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x40083, 0x0) getsockname$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000200)=0x1c) r3 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r3, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r6}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x20000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x3, 0xcf1, 0x5, 0x5, 0xcb, r1, 0x4, [], r6, r7, 0x2, 0x4, 0x3}, 0x40) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x2900, 0x0, 0x0) 04:11:10 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x0, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1710.584414][T12638] BPF:Unsupported version [ 1710.603078][T12638] BPF:Unsupported version 04:11:10 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x63, 0x8080fffffffe) 04:11:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x3000, 0x0, 0x0) 04:11:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r4, 0x0) sendmsg$AUDIT_SET(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x3e9, 0x20, 0x70bd2d, 0x25dfdbfb, {0xe, 0x1, 0x0, r3, 0x7, 0x1, 0x4, 0x0, 0x6}, ["", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x815) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r5, 0xffffffffffffffff, r6, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b700000001edffffbfa30000000000000703000028feffff620af0fff8ffffff71a4f0ff000000000f040000000000007e40031f000000006504000001ed000027000000000000006c44000000000000630a00fe000000003c00000000000000b7000000000000009500000000000000023bc001b7a379d17cf9333379fc9e94af69912435f1b6a693002e7f3be361917adef6ee1c8a2b4f8ef1e50becb19bc461e91a7168c5181554a090f32050e436fe275daf51efd6e86ca5f8f3fdadafa0ef01b6bf01c8e8b1b5e4fef3bef7054809000000c095199fe3ff3128e599b0eaebbd0ee0b399c3952e43c38836dff67359a48f5b0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd8dff0c710e4cdbf4fc41fbba4f94329e646b8ee6de2109fbe4ef154400e2438ec649dc74a1a610643a98d9ec21ead2e3109b151b8b9f75dd08d123deda8a3658d42ecbf28bf7076c15b463bebc7aa4d8e30fe021397466aaa7f6df74a61265d6e0252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06ad99edc3a6138d5fcfba53f8d0c67ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdf098bc908f523d228a40f9411fe7226a4040996e37c4f46756d679dff67b6cca26e71ed816a39bcbac72f53aae03b28fe7c6251006ea499e3889f3ad3726cb0cb22df64928492068e4567cb1559293c55de75f98c28686470c095a8b8df9dbf3a755c0312f0cade306604f189865936c38fba27b36f000000000000000000000000000079fcda3bf7aa752547ad"], &(0x7f00000001c0)='GPL\x00'}, 0x48) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r4, 0xffffffffffffffff, r5, 0x0) ioctl$CAPI_GET_PROFILE(0xffffffffffffffff, 0xc0404309, &(0x7f0000000400)=0xffffffff) ioctl$GIO_FONT(r5, 0x4b60, &(0x7f00000002c0)=""/129) ioctl$DRM_IOCTL_MODE_CURSOR(r5, 0xc01c64a3, &(0x7f0000000240)={0x2, 0x7, 0x6, 0x9, 0x1f, 0x5cf0, 0x6}) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r6, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={&(0x7f0000001840)="48d2bb9bb16f553d1ca2085cecc19ff21a8f4d9d0326a4dfe49af2281a5a37b82f8f08574b8a42f84a5b1da5b9e8e30b77924aafb39d25c34a4b3bcac7963956526f232d41d4cf4d4c6703aa87a0a6f954534d99089443aedb8a07e2bd83b89f3cbc431864c71e8db4a48e59a4c0cffd92d2966372d69f3fccf34623fa266365c1a7e3b5ba66997de8053b79fe08904ccab7e106fcfe347f20b84182a24e5281438488a6bb6aaae024e9bdbccd1b231c80ab101d83d9ae7a4f81f0c955b695d2da7967d1bf3b35ffeaa19cc524d6cc8a52c0f96880441aeea0ef072870f1d44fa3b68a9f99c51ad1323d4e64ae7240d0531415d725137cad6f5118e11b09ed3ecdee465ba04bec76df9a2b2108566a38a6b8bc0413d4c573c2880c140a41539fe4c69b88caaaf4bb202405ec14b705bbf82aa440b71a600668f1e6feb48f1d7ec2aff834ca6df7c66741a37ba47adaefa0189d8fc79685026f09a100b5de9834c8923bdb8f319de429ce9e8a930faa8e8cdbda64415279e78da65cb92d73761571dc4915126e640809ad0e3588d3a53549c8b30fbedd1230e0928d5fe8e3e9e323681096d4676d62dd835acf1703042c00ddfeefb5c781717ee94cee0d59a7961115ffa75fe78931299c0794ef7d7751d95f256d9c66216967143e5c7de3a95dd6a38525c4e8f964723a8eab15d83adf39a6aa1959216085fc25b389269e15b991b4edcc7aa41fd2c3bb86c6c8669fb4ee7222e52a99d166db0c6071864b6c3dae34ec89238495117b8fabf961760e0b3f0b8e945c8f832f42f9c416ed29df66a06ee766d2c09f47376c8cd2f7451df512de4b3a1bc3b447cbe3ecd1ace15f22c15bb34eff1cd4a1a578668dc254d1b3c4162f3f023411817f1cf6b8e4cac8da1e953325ee844bc343ab4b15a2107eeda7bc8bfdb23731af534578d5ccc22af8a56cf6f5e48e2b5e98e43c15008fdd3d367102192a171548ece4651852cfa241e844f662b7d35436150d43f0aedc573968a779727eff27562470c001ba52e338f8bd14dfd336e40a6ea38e3d650e2f7315b7a98224f9671a1db3bd31f9675a7d64c24c66830301846fb9e281a54aba9664a1d271a6291f6f53b484db7c5d38792d5544e2216098bb0878d2854853d6bffda89d6ccd3d72350083b71ceb36c6b1c1c9ab285a7661b56c915e72882dfa337bb5450d7a4e6e0e984f4ea7dbe583eae3583aeb85073993e2f604f428171906db7e60c623c48f962ab18c70cf16f3b57a5f9ff9e9f6f031a685090b70ea86c005c2d6eb404e8bb3b529aaffa4c08f409da0f0566aaafe99f0f7c11c4fa6b1ca1042fbbd8c69919a6839e5f2f398c4a5d0724d924ac7fc3f178a6ff927fd5e2f1cc3a838b530bbe2dc71c7706424f2c915b2bd8be0e307310333a648d560882d00accdd3bde566c59cfc0277214ff152dc254e7ee9915b459d7882d534fe945a5b62b1012e0475806ebba7efda4ce0ccab64493159305a480b5b487459f4af12d853c3e04942ca00d047d44f68f1b1ad6283ce6155c7a2e5708e2ecdf5251500586ce20549bafc5ddb201b84119ee68be76982c0b19a2031ca1f15170e7a99725d053e6485576e15a042688b409554c83bc807834ab9d50b25d6aaeee6dd2133c109f4fb896c25322b6a9bf6354f51262eec29a8abe095c22041fca145c1b5a11fe8db0c191ff2ca7cddc96dfeafc97326c391fad9600b3612cec6a746c44c88bc00b14fc75c497c5b0e4354c3efd77cc450e896bc00f4fe8e28876981e3129985a0af70c212935b777b08720aff582d99f7a2b162e844ffa9d9120206fe8c27c4de3e7896feda48290390d5a5d63f7d9e52c568d5833b8b8db2ac56cb3286497324d7c83181877fb9cb5d03c63c2ca8d0ed3297162d4c39a45e85395d9765c6650c06f35bbce1c0992dbf28354fa379c2a5d366094b3f6b17bda1c0cfcc344b2db9da29e9d00974e54ffa927446f4c7c7a1e75fc51e12768d72c8b0de16545271d835d4c1bdeed58fddf29624ad8fe2fd6d314e71ea2192c489dd23232f83cddb73f9a3f619ee2e116fe9d787c8ac98fa59d4601353b2d5c181d1f18417b5a5f1868ab4be69f735e89e3e95bd3a7ac6e85cfa9b45b78ef0016419b33e49b0dd3f9a3b29e448b4a92839282c291023af3a76f7191bc1ab845238985818bcc9696f95b42e1af382ac388ecb059bcaa45d9a11708940923df2d399fdb8d203055c40468a7a99916617fc5423107abdfb9bfb31afb8ab38b28ab25f1432634e692d549dc1ef7d7df2e935a6d5a6884fea41ebb38af085b7017f381c03f426caa9ffdb74a7016b7eccae27bead7c0daf98dfb077eb3459441914cf2dc354862359cd1a8b8130a28f1fe2be62c130a290c3b7d540398a9c64a35f64bdabe7bb39ade74fe0727b096e47fdb2df0eefc20abb6b365e33aa3d174ab94d2786f752203a099e38be59b8826853172a0c1187d8e0f16df809d46d94751d0b928d2573df6d3ccfdd5783076beaba5a9c5b4f039070dec96842e6097a0ad5eb24da6deedeb24397158211380e8b28611ba59607e22fef2c00908e8f262a957bff3612cae853605d4b6137e68a0f990017edc0a8aa80caac29dc477a8e8ff54084bea5f38c57803caaa172ca3e932906bbd21f31bc7c0324f74f23d7c17c9cc347a9dba41577af1f2a2c20ef60ff2b83c9f1a8cb66474751a0dd7c84a6095961d31479ae93f90c04873f1cb5e0c4d2e02d308990b3cc29ba4d22985eefc8c341439c1fc8075629c3dc3394477e243c8d24e5e0365eb26f8c22467bc749d95eba53a0ddbcf756e92511871d7b468c300848b9fa3e47e802ab86978378caf9f6c5dfdaeb27dc2b52c9a2cdcb925c6905fafe28b1d202c16aa9012cc96d29feae4438c07f7e875d4c52c30c39fff8a81c44d5fc62369a77ac9d6c769664ebe34caa320d2aaebd872075b6b54ff8865b1233b995f34c45ae3bbd57e7a6ee747a10fd1aca2c0a5887bf64e752c18f2e38b82e68b0e7b5173b92f633c4bc3376c2e5629f13eadbfa25ec99d9256a175a6eb52a8e4d45a6487311c090b36cb32d52d2c48081c4acd0c3878edb1a760debbe06ae84e48f36a92ff43db340ea55676b7732f45f94d8fae120c77c3c9f1651d8fd6916e9256fb24942dc4eccb84c49fd5d5890180caae05e8ee43324b1fa93f8001d67cfad8d54d607601045e161945b5c5ecb9c401e9714038e2db7391297adb75887107d7beb930092032d6a2f35bbcec2a5e5e4ea80ea114a1c7d3638b426b08d522883893af294aa856d49504ab1f643cacc4f8271a415e55bc62e18cc3efa76b74394038faef4197f8b22e36ea366a5c1df08d2ba817e1915daee12d82fd5ad5869cebc7b365128a6cd5c3c990323dc09d59ec6685bd3a87844fdcabf9f230107361bcd0aea52ed2967b49042efe9b460a0182dfaa9d05d21c79af6c2c652e9b2412a6f2c9a6fb06a2295059de0fe8a6c29d81b8e296b9fdf260a29e89172320413905054fe061817a0146193ed9b4513f28e3be661686c086ebb184b7581264a38e373f128af2ec1b0a85704ed59d432e07d418661da8f9f2dfac226663b898f552df4ebc1cf50b0c51528da5aeefbf5a7d885d11457dcc69874e8537148f2a8861c439df076349198447f1113e1042d30e47ae02317a532a3e890dc7bba3ffdc50b966b73509b7cdf3ef912c304da51a26b702ee17897e74a1e7f4d739e64ce72b20b94242b8045df48181087730d6ed8e8551ac7891434dfcd54e4b547f9d86b0b393e15f83f1f0fa9e9ad0c49550e32e4d9542b5f09a2795f3beb5423a34a54ed5ddc35662844c8b60e70d3c46db4de4c82f7ecff57032cb1c33d550e663b54dff05721209f649c5980ebcef31146efee8b754198df3d81b76ecf48182a935899d6aef722f8207522e86b1e3a01a80ee4b43679b68b4938be93150b9bddb9c11727707b9f8ecf8a82612d9d982fe8232e28d50c894b8c50dc6601d8c405e51a168ace14f1a6a97fe4bde6b1cad90bb531fda12bd4aa584293d878123049d4dbbd3950e78428ea13057ceb38d986db3ee4a3ab6e027d52b6f2d5a7ca1b8beacf1d57042f747bc45179533a1b36444ab25d32f5a66f48fd7b17fd3fc114c636f1612247ae720f827d301806dbf912c527ee7dde53fa54054e277628a8830099a23574874844df94c55ccedf52fae4825227a7df5b4f7b0333db8f3e46811dd6839ac7b94814a5255f684bc76132173cd91a484b2aca99e4626619200fcffb4761bcf975c82ec247f211fa5db9fd79cbab8693807f5544c0ba6ce4aebe08ec43d37d114fa52a21aede3d5c741495070792dda650dc1b7eb4d9b36bf39fd09d4379748327db24a0eca0b16f549d1ed7f77355fcec3781fa1464982f3267d71411ef282325505a955a019a97c6d1e76229521c449a2b772355e4d52be327c268db0932cf647abfb24268dfcc3095c51032c254ef6c5c0b3a13383acdc5830edecb67f6fa226cda00e042fb281021c542f61a6b42465f53a4b26b0e0d93c01af7d7d1bd59f12eee773344483a392c83d5a304136355ffdf2c29b244aa417db7c957345ebccc0bdb945a4b4cec16b154eff5bed9b58f425d4885f2b44d010f5a0a824812585d446ae9a88d4b14256965de2d2c3a1024d5d1d03ba62efd4e805c47cdb80962c9e6a7990d76c9dcb8732bbdca8f5574fd4ffd2d4e60a27ab1827ad05be68234c8707c801a0e5a9e39e7b1168c3104eac4bfbb6122a30f81b86cc7b130904a04f40f30a16f364d034e6c698023f6a45f9cdbdca3ce1995b0a262afa02441798dc03aba46add84602c97c56aa8c0a3108dbeec64b031fcee0a5f49baa2b484d23045d02b5b9f7f6207e8f5c1a94fc649726f7173243731b733b416a9a1db453bc2aca873db7b7e8fa466c47f635bc7469c8f3ab412e251aef0454b86da4c15b1892c97ba47ea2067fc677c2027bb46754623b53d90f71488cad2a778ae057e121630152dfc5b60aba29fa21203271c5f0ac58987038d00373bda96afe8162a0c25969b4659598740d504965df9af55fe8be1862aacde80607233990014165560fbd11f4228cb6ab69dbe39ab6aa762fce5f920960e281277aae09e2f878482b7ab2f2810254339d6c3ab6e5925db623ca834953f05cdb1bfcc15659ac53a108f405c6fc8a820b7509c43869b73201e8c969dbb86e2060433aa299199a24008d59e4ff8fb2ecb58e237dc3cb921e80453a5a855717195127298855a46e0abd1f8ae8808d7234de0be14522a493ec39f8eee7a1eedc228ce3cb2108d523ff688bd9e387a6eea90df24a85c965ea30f9b1c7749e048edcb86fcb03d5568d6a72af8ac13d3c341b0b9a59ad736c6da44b992880b7a6044ad4c39e7b43f2f9f1f0cab61f9bcfccb4800a3ca0407e0d0395c6f6c23995dd18da42b68b0812bc14f8b22bf399acbcf619d51cb9772885bf1a1ae6521a597a154104ad7836ee1dffbccf8c12ca7cb2ee2d964de413e80f25b3594f5083c3bda98231eced97fdb34b6619ecb12ae3606726b8d46fec14233ca916054302f44beb2486278c3e09c59eb536b03ae55bd37d7bff7d2153b0a6cb29ea52189f61b156fc36478f4575fb23688539498a27c74e66557696f1d6c865ae1cbc65c4245b8bc98eae43f4c3c8d565c6b828a2e89cb4688fac4878b3622d317067c7aad3a90d78ee983e207491337e1cb5257654be86d3d9ed5b60efea8acf09d581d87080a8377ed59a170d8a22f807c4f208f5", &(0x7f0000000040)=""/50, &(0x7f0000000080)="c23a27b5655993a9cadc", &(0x7f00000000c0)="6f0e9158ae22cf5ead59c03ddd14801e5a082d4e0a8e717c4d15674673bc2e3ea58347300109dda13c7de8a4f91f3020fc2da89a56208ec4ad7ce4aa3ab582f2a153f64f116972c676b2b904e959551e908136537798a9ab4fd70513d5b1496d2ddb0dffed558893b9d31738248101978e610a26f5b33ccd83964344463e55a4f6ad86034c29eef7a39c449aa1b5e5f46971fd74d8d3b2463208839c7b83a2696316ccef9e2a6a6da32183624fa66700d252e6adabf6cabd2e3094e11008fcf8a232466212d762bb8a5466575dc0", 0x4, r6, 0x4}, 0x38) bind$bt_rfcomm(r2, &(0x7f0000000440)={0x1f, @none, 0x81}, 0xa) 04:11:10 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x0, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1710.837496][T12767] BPF: (anon) type_id=2 bits_offset=0 [ 1710.872723][T12767] BPF: [ 1710.875539][T12767] BPF:Invalid member [ 1710.879424][T12767] BPF: [ 1710.879424][T12767] 04:11:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0xff00, 0x380000, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x4000, 0x0, 0x0) 04:11:11 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x502f5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x4021, 0xc00, 0xfffffdfe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$TCSETAF(r3, 0x5408, &(0x7f0000000040)={0x8000, 0x5, 0x2, 0x4, 0x15, "7ffbde0186c663bc"}) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x1, 0x4) 04:11:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x6c, 0x8080fffffffe) 04:11:11 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x0, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1711.507725][T12999] BPF:Unsupported flags [ 1711.530182][T12999] BPF:Unsupported flags 04:11:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x60ff, 0x0, 0x0) 04:11:11 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1711.655769][T13114] BPF:Unsupported flags [ 1711.661290][T13114] BPF:Unsupported flags 04:11:11 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x75, 0x8080fffffffe) 04:11:11 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1711.902343][T13229] BPF:Unsupported flags 04:11:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x7700, 0x0, 0x0) [ 1711.926733][T13229] BPF:Unsupported flags 04:11:12 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0xff0f, 0x380000, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0xb700, 0x0, 0x0) 04:11:12 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:12 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x79, 0x8080fffffffe) [ 1712.551085][T13496] BPF:Unsupported flags [ 1712.572474][T13496] BPF:Unsupported flags 04:11:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x207200, 0x0, 0x0) 04:11:12 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380002, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:12 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:12 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x7e, 0x8080fffffffe) 04:11:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x400000, 0x0, 0x0) [ 1712.897274][T13672] BPF:Unsupported flags 04:11:12 executing program 5: timerfd_create(0x1, 0x80000) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x6c40, 0x0) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000140)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="80000000", @ANYRES16=r2, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x4008) sendmsg$NLBL_MGMT_C_ADDDEF(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x38, r2, 0x20, 0x70bd29, 0x25dfdbff, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @rand_addr="feb52d57e3e71a60a2165b4873e5fd0b"}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x10}]}, 0x38}, 0x1, 0x0, 0x0, 0x40804}, 0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000100)=0x2) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) r6 = dup2(r0, 0xffffffffffffffff) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000140)=""/77) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x180, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x8, 0xffffffffffffffff}, r4, 0xffffffffffffffff, r5, 0x0) times(&(0x7f0000000080)) ioctl$DRM_IOCTL_FREE_BUFS(r5, 0x4010641a, &(0x7f0000000040)={0x9, &(0x7f0000000000)=[0x1ff, 0x8, 0x4, 0x1f, 0x5, 0x4e4, 0x4c, 0x80000000, 0x2d87]}) [ 1712.936739][T13672] BPF:Unsupported flags 04:11:12 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:12 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0x9}, 0x11, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff, 0x0, 0x2}, r1, 0xffffffffffffffff, r2, 0x0) bind$x25(r2, &(0x7f0000000000)={0x9, @remote={[], 0x1}}, 0x12) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000280)=0x9, 0x4) 04:11:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x51a000, 0x0, 0x0) 04:11:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x87, 0x8080fffffffe) [ 1713.388082][T13803] BPF:Unsupported flags 04:11:13 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1713.410206][T13803] BPF:Unsupported flags 04:11:13 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380003, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x81, 0x1, 0xff, 0xff, 0x0, 0x6, 0x4081, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x611, 0x0, @perf_config_ext={0x9, 0x3}, 0x410, 0x200000000000000, 0x1, 0x1, 0xfffffffffffffff7, 0x8, 0x800}, r2, 0xd, 0xffffffffffffffff, 0x1) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r4, 0x0) r6 = dup(r5) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x4e21, 0x4, @rand_addr="c042336d1d926672fe7c9694ad064d19"}}, 0x0, 0x0, 0x26, 0x0, "80b460d13c51507264372c66f4220a6b61ec346c3dbeba89619891af15fe62c0d7f0d1aee28f34b2a334eca813f20c000000000000cce0357acba2c2d441a454b332bce8b9769bf8cbe2a08362ea2798"}, 0xd8) 04:11:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x90, 0x8080fffffffe) 04:11:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x719000, 0x0, 0x0) 04:11:13 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:13 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x400001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) setns(r1, 0x20000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:13 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1713.892870][T14031] BPF:Unsupported flags 04:11:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x722000, 0x0, 0x0) 04:11:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x99, 0x8080fffffffe) 04:11:13 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:13 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x220340, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) setsockopt$SO_J1939_PROMISC(r1, 0x6b, 0x2, &(0x7f0000000000)=0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) 04:11:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x770000, 0x0, 0x0) [ 1714.251410][T14162] BPF:Unsupported flags [ 1714.261775][T14162] BPF:Unsupported flags 04:11:14 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@l2tp={0x2, 0x0, @dev}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000080)=""/159, 0x9f}, {&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/184, 0xb8}, {&(0x7f00000002c0)=""/113, 0x71}, {&(0x7f0000000340)=""/236, 0xec}], 0x5, &(0x7f00000004c0)=""/68, 0x44}, 0x0) 04:11:14 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380004, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:14 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x907100, 0x0, 0x0) 04:11:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xa2, 0x8080fffffffe) 04:11:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x13) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) [ 1714.748550][T14391] BPF:Unsupported flags [ 1714.763782][T14391] BPF:Unsupported flags 04:11:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0xa05100, 0x0, 0x0) 04:11:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0xb70000, 0x0, 0x0) 04:11:14 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x1000000, 0x0, 0x0) 04:11:14 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1715.026710][T14516] BPF:Unsupported flags [ 1715.036496][T14516] BPF:Unsupported flags 04:11:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xab, 0x8080fffffffe) 04:11:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000040)={0xf000000, 0x2d4, 0x1, r2, 0x0, &(0x7f0000000000)={0x9c090c, 0x9, [], @value64=0x775b}}) ioctl$BLKREPORTZONE(r3, 0xc0101282, &(0x7f0000000080)={0x8, 0x3, 0x0, [{0x0, 0x2, 0x4, 0x9, 0x1, 0x8, 0x6b}, {0x101, 0x2, 0xffffffffffffff00, 0x0, 0x20, 0xff}, {0x4, 0xffffffffffff9a02, 0x4, 0x0, 0x3, 0x4, 0x7f}]}) socket$inet_dccp(0x2, 0x6, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x1, 0xffffffffffffffff}, r6, 0xffffffffffffffff, r7, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000340)={0x80000001, 0x10000, {r6}, {0xee01}}) r9 = getpid() sched_setscheduler(r9, 0x5, &(0x7f0000000380)) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r9, 0xffffffffffffffff, r10, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r10, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000500)=0xe8) syz_mount_image$f2fs(&(0x7f0000000180)='f2fs\x00', &(0x7f00000001c0)='./file0\x00', 0x3, 0x2, &(0x7f0000000300)=[{&(0x7f0000000200)="9e8f538477ab006abdff0214fe9c274de7fbd0ab853275bf325e22a058469c6606597e7c1a4d4d925d6475b36ba93cd44b15d0d6ec824111d1fda959a322baeb32bf75f39878565091d0f2f94b17b5549417c3b1e9733fdd100e21fd4ca3b0121feeda76d0670f91758f7fee2216a9607a7960", 0x73, 0x7}, {&(0x7f00000002c0)="bca872df8a882d507ccf030df067ff5f89cda6bff89b5d2e9ca3df93b321de755f70a6af63964028f90f", 0x2a, 0xb71}], 0x10808, &(0x7f0000000540)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@background_gc_sync='background_gc=sync'}, {@heap='heap'}, {@fsync_mode_posix='fsync_mode=posix'}, {@noheap='noheap'}, {@fsync_mode_posix='fsync_mode=posix'}, {@test_dummy_encryption='test_dummy_encryption'}, {@background_gc_on='background_gc=on'}], [{@obj_role={'obj_role', 0x3d, '/dev/btrfs-control\x00'}}, {@euid_lt={'euid<', r5}}, {@fowner_eq={'fowner', 0x3d, r8}}, {@uid_gt={'uid>', r11}}]}) 04:11:15 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380005, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0xd010000, 0x0, 0x0) 04:11:15 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x51, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:15 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xb4, 0x8080fffffffe) 04:11:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockopt$sock_buf(r1, 0x1, 0xcc8864bbb312c0e0, &(0x7f0000000000)=""/181, &(0x7f00000000c0)=0xb5) 04:11:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x29000000, 0x0, 0x0) [ 1715.714162][T14749] BPF:Unsupported flags 04:11:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x30000000, 0x0, 0x0) 04:11:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x381100, 0x0) shutdown(0xffffffffffffffff, 0x1) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffdfffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r4, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r5, 0xffffffffffffffff, r6, 0x0) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r7, 0xffffffffffffffff, r8, 0x0) r9 = getpid() sched_setscheduler(r9, 0x5, &(0x7f0000000380)) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r9, 0xffffffffffffffff, r10, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r10, 0x641e) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:15 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x0, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:15 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x60, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0xff600000, 0x0, 0x0) [ 1716.149192][T14878] BPF:Unsupported flags [ 1716.176989][T14878] BPF:Unsupported flags 04:11:16 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380006, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xbd, 0x8080fffffffe) 04:11:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000040)={0x0, 0x65}, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x5db8076a5eac8633, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r6, &(0x7f0000000780)={0xb, 0x10, 0xfa00, {&(0x7f0000000640), r7, 0x3}}, 0x18) r8 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r4, 0xffffffffffffffff, r5, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000500)={r9, &(0x7f0000000480)=""/69}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4010641c, &(0x7f0000000240)={r9, &(0x7f00000002c0)=""/129}) ioctl$DRM_IOCTL_MODE_SETGAMMA(r5, 0xc02064a5, &(0x7f0000000200)={0x2, 0x2, &(0x7f0000000140)=[0x7, 0x5], &(0x7f0000000180)=[0x8, 0x80, 0x7, 0x4, 0x3f, 0x9, 0x0], &(0x7f00000001c0)=[0x0, 0x3, 0x6]}) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000280)=0x5, 0x4) r10 = getpid() sched_setscheduler(r10, 0x5, &(0x7f0000000380)) r11 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r10, 0xffffffffffffffff, r11, 0x0) waitid(0x2, r10, 0x0, 0x2, &(0x7f0000000540)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r8, 0xc0406619, &(0x7f0000000400)={{0x2, 0x0, @descriptor="b9e34275ae2d6a49"}}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000080)={0x0, 0xfffffff7}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={r12, 0x8000}, 0xc) 04:11:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x400000000000, 0x0, 0x0) 04:11:16 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:16 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x0, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1716.627631][T15096] BPF:Unsupported flags [ 1716.660402][T15096] BPF:Unsupported flags 04:11:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x60ffffffffff, 0x0, 0x0) 04:11:16 executing program 5: ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0xf, 0x5, 0x4}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x8000007, 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x80002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 04:11:16 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x770000000000, 0x0, 0x0) 04:11:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x7fffffffefff, 0x0, 0x0) [ 1716.873231][T15217] BPF:Unsupported flags [ 1716.885247][T15217] BPF:Unsupported flags 04:11:16 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x0, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:17 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380007, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xc0, 0x8080fffffffe) 04:11:17 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:17 executing program 5: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000001}, 0x0, 0x400, 0xfffffffe, 0x0, 0x800000008}, r0, 0xffffffffffffffff, r1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f00000001c0)={@empty}, &(0x7f0000000200)=0x14) r4 = accept(0xffffffffffffffff, &(0x7f00000002c0)=@nfc, &(0x7f0000000240)=0x80) r5 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r5, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) recvfrom(r4, &(0x7f0000000080)=""/42, 0x2a, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r5, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r8}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) bind$xdp(r1, &(0x7f0000000340)={0x2c, 0x3, r8, 0x33, r4}, 0x10) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r9, 0x6, 0x1c, &(0x7f0000000280)=0x9, 0x4) 04:11:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0xb70000000000, 0x0, 0x0) 04:11:17 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x0, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1717.583369][T15451] BPF:Unsupported flags [ 1717.628302][T15451] BPF:Unsupported flags 04:11:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xc3, 0x8080fffffffe) 04:11:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x20720000000000, 0x0, 0x0) 04:11:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x90710000000000, 0x0, 0x0) 04:11:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7259, 0x0) getdents(r1, &(0x7f0000000040)=""/1, 0x1) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:17 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:17 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x0, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1717.971071][T15581] BPF:Unsupported flags [ 1717.976044][T15581] BPF:Unsupported flags 04:11:18 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380008, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) write$capi20(r2, &(0x7f0000000000)={0x10, 0x2, 0x1f0, 0x0, 0xfa7, 0x101}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0xa0510000000000, 0x0, 0x0) 04:11:18 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0xec, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xc6, 0x8080fffffffe) 04:11:18 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x0, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x171101, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040)=0x100, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) [ 1718.543217][T15808] BPF:Unsupported flags [ 1718.558806][T15808] BPF:Unsupported flags 04:11:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x100000000000000, 0x0, 0x0) 04:11:18 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xc9, 0x8080fffffffe) 04:11:18 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1718.772839][T15924] BPF:Unsupported btf_header [ 1718.780264][T15924] BPF:Unsupported btf_header 04:11:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0xd01000000000000, 0x0, 0x0) 04:11:19 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380009, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x4e24, @broadcast}}) 04:11:19 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x3b, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x2900000000000000, 0x0, 0x0) 04:11:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xcc, 0x8080fffffffe) 04:11:19 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1719.429962][T16158] BPF:Unsupported btf_header 04:11:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xcf, 0x8080fffffffe) 04:11:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x3000000000000000, 0x0, 0x0) 04:11:19 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x69, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:19 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x262000, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000280)=0x9, 0x4) 04:11:19 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1719.727655][T16280] BPF:Unsupported btf_header [ 1719.749921][T16280] BPF:Unsupported btf_header 04:11:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40841, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_SET_BSS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r2, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@NL80211_STA_WME_MAX_SP={0xc, 0x2, "0e8b30279b058c7e"}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0xb2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x24004850) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:20 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x38000a, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xd2, 0x8080fffffffe) 04:11:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0xffefffffff7f0000, 0x0, 0x0) 04:11:20 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:20 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x0, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:20 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) r2 = syz_open_procfs(r0, &(0x7f0000000000)='net/ip6_tables_matches\x00') bind$tipc(r2, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x3, {0x2, 0x2, 0x3}}, 0x10) 04:11:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0xffffffffff600000, 0x0, 0x0) [ 1720.394453][T16515] BPF: (anon) type_id=2 bits_offset=0 [ 1720.418668][T16515] BPF: [ 1720.445615][T16515] BPF:Invalid member 04:11:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xa) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) write$UHID_CREATE(r3, &(0x7f0000000200)={0x0, {'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000000)=""/242, 0xf2, 0x6, 0x23e, 0x1, 0x0, 0x80000000}}, 0x120) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) 04:11:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x28a200, 0x0) ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0044306, &(0x7f0000000040)=0x8) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) [ 1720.517608][T16515] BPF: [ 1720.517608][T16515] 04:11:20 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xd5, 0x8080fffffffe) 04:11:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000000)={{0x2, 0x4e20, @empty}, {0x185, @multicast}, 0x20, {0x2, 0x4e21, @broadcast}, 'bond_slave_0\x00'}) [ 1720.724025][T16634] BPF:Unsupported section found [ 1720.763952][T16634] BPF:Unsupported section found 04:11:21 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x38000e, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:21 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x0, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000040)) 04:11:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") accept(0xffffffffffffffff, &(0x7f0000000000)=@l2tp6, &(0x7f0000000080)=0x80) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) 04:11:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xd8, 0x8080fffffffe) 04:11:21 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1721.370358][T16856] BPF:Unsupported section found [ 1721.382461][T16856] BPF:Unsupported section found 04:11:21 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0xfffffff8, 0x4, 0x4, 0x1000, 0x1, {}, {0x5, 0x0, 0xff, 0x7f, 0x9, 0x3f, "7b96d206"}, 0x8000, 0x3, @userptr=0x8, 0xfffffffb, 0x0, r2}) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f00000000c0)=0x4) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000080)={0x4}, 0x4) 04:11:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000040)={0x3ff, 0x4, 0x4, 0x100, 0x7fff, {}, {0x4, 0x2, 0xf9, 0x57, 0x90, 0x6, "66c6487c"}, 0x6fd, 0x2, @planes=&(0x7f0000000000)={0x80000001, 0x778f, @fd, 0x101}, 0x81, 0x0, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) 04:11:21 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:21 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x4000, 0x0) r1 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x100000001, 0x20101) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="110700f2ffffffffffff0400000008000300", @ANYRES32, @ANYBLOB], 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x10, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20040044) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x0, 0xfffffffffffff566, 0x8}) r4 = socket$netlink(0x10, 0x3, 0x4) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r5 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r5, 0x0, 0x0, 0x0, 0x0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r6, 0xffffffffffffffff, r7, 0x0) r8 = getpid() ioctl$SNDRV_TIMER_IOCTL_SELECT(r7, 0x40345410, &(0x7f0000000480)={{0xffffffffffffffff, 0x1, 0xeb7, 0x2, 0xd43}}) sched_setscheduler(r8, 0x6, &(0x7f0000000380)=0x100) r9 = getpid() sched_setscheduler(r9, 0x5, &(0x7f0000000380)) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r9, 0xffffffffffffffff, r10, 0x0) ioctl$SG_GET_PACK_ID(r10, 0x227c, &(0x7f00000004c0)) r11 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r8, 0xffffffffffffffff, r11, 0x0) r12 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x400) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r13, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x0, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r13, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={r13, 0xf801}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r12, 0x84, 0x7c, &(0x7f0000000200)={r13, 0x2fe, 0x8}, 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r11, 0x84, 0x70, &(0x7f0000000240)={r13, @in6={{0xa, 0x4e21, 0x3f, @loopback, 0x6}}, [0x0, 0x0, 0x2, 0x7, 0x5, 0x9, 0xffffffff80000000, 0x1ff, 0x5, 0xfff, 0x9, 0xf492, 0x7f, 0x100]}, &(0x7f0000000340)=0x100) ioctl$VIDIOC_QUERYMENU(r7, 0xc02c5625, &(0x7f0000000080)={0xffffff0e, 0x20, @value=0x3}) 04:11:21 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x0, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(r1, &(0x7f0000000380)='./file1/file0\x00', 0x0) renameat2(r1, &(0x7f0000000000)='./file1/file0\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x2) faccessat(r1, &(0x7f0000000000)='./file0\x00', 0x1a9, 0x1000) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000280), 0x4) [ 1721.719455][T16985] BPF:Unsupported section found [ 1721.734094][T16985] BPF:Unsupported section found 04:11:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7fffffff, 0x80000) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040)=0x7, 0x4) 04:11:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xdb, 0x8080fffffffe) 04:11:22 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x38000f, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:22 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000000)={0x4, 0xc, 0x4, 0x10000, 0x6f, {0x0, 0x7530}, {0x2, 0x1, 0xad, 0x4, 0xfa, 0x0, "7c2930ed"}, 0x200, 0x2, @userptr=0x8, 0x3, 0x0, r2}) setsockopt$CAIFSO_LINK_SELECT(r3, 0x116, 0x7f, &(0x7f0000000080)=0xb9, 0x4) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r2, 0xc034564b, &(0x7f00000000c0)={0x1, 0x30314247, 0x3, 0x7fffffff, 0x3, @discrete={0x7fffffff, 0x9}}) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:22 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) setsockopt$inet6_dccp_int(r2, 0x21, 0xc, &(0x7f0000000000)=0x6, 0x4) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x100, 0x0) ioctl$SNDRV_PCM_IOCTL_RESUME(0xffffffffffffffff, 0x4147, 0x0) 04:11:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xde, 0x8080fffffffe) [ 1722.444584][T17222] BPF:Unsupported section found 04:11:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000002440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000002480)=ANY=[@ANYBLOB="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"], 0x2234}, 0x1, 0x0, 0x0, 0x4000}, 0x8000000) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x88a40, 0x0) ioctl$VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f0000000040)={0xc, @raw_data="cad73b6d6ab1512a00aa0f510dc3872c02f3632da8f93300d4853b38316416784f9d369234d985fc5726c543521714caa4a37f91ddda39612520242c9b182cf51ee0e1e42c6fa9c36c8877e9451eb4695b750d1245176ba4a1f3e4782dd20bf9c5e8c84c9401a453d0c2fac619dd5f692504ee885c17be7e8f46620f37ad78832179787ebb34947bca78db703a702876ad2133d661a9fec1e89bfe952cef8cd967a01935f6d1236ed208b8ed493f73d28c4239b50198a46a4a64a3975b3b22780d77a0a670879b0b"}) r4 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TCXONC(r3, 0x540a, 0x1) getsockopt$inet_buf(r4, 0x0, 0x0, 0x0, 0x0) [ 1722.481806][T17222] BPF:Unsupported section found 04:11:22 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:22 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe1, 0x8080fffffffe) 04:11:22 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r1}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r1}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000000240)='/dev/btrfs-control\x00', r1}, 0x30) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r2, 0x0) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000200)={0x13, 0x10}, 0x18) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r3, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000080)={0x18, r4, 0x703, 0x0, 0x0, {0x9}, [@ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x18}, 0x1, 0xff000000}, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r5, 0xffffffffffffffff, r6, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x1c, &(0x7f0000000340)={@loopback, 0x0}, &(0x7f0000000480)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001840)=[{&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000600)=""/142, 0x8e}, {&(0x7f0000000540)=""/104, 0x68}, {&(0x7f00000006c0)=""/39, 0x27}, {&(0x7f0000001780)=""/159, 0x9f}], 0x5, &(0x7f0000002400)=""/4096, 0x1000}, 0x2100) sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f00000019c0)={&(0x7f0000000300), 0xc, &(0x7f0000001980)={&(0x7f00000018c0)={0xb8, r4, 0x0, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_STRSET_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}, @ETHTOOL_A_STRSET_HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x54}, 0x20000000) setsockopt$inet6_tcp_int(r2, 0x6, 0x24, &(0x7f0000000280)=0x7, 0x4) 04:11:22 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1722.982790][T17463] BPF:Unsupported section found [ 1722.988822][T17463] BPF:Unsupported section found 04:11:23 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380010, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) flock(r0, 0x7) 04:11:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/seq/timer\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r1, 0xc0305615, &(0x7f0000000100)={0x0, {0x4, 0x2}}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x180, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000080)={0x1, 0x756a5af8, 0x9, 0x0, 0x6, "fc8cef72d47af6b95204336c255b44adc3a28a"}) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x80818, 0x4) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r4, 0x0) fcntl$setpipe(r4, 0x407, 0x8) 04:11:23 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe2, 0x8080fffffffe) 04:11:23 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1723.377099][T17686] BPF:Unsupported section found [ 1723.395610][T17686] BPF:Unsupported section found 04:11:23 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = getpid() r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) accept$alg(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) r4 = socket$l2tp6(0xa, 0x2, 0x73) ioctl(r4, 0x50000, &(0x7f0000000000)="5e0b5171160d07e58f32fad056681412d25b77337362b20482149b857e0000000000") r5 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r5, 0x0, 0x0, 0x0, 0x0) 04:11:23 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:23 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) write$P9_RSETATTR(r2, &(0x7f0000000000)={0x7, 0x1b, 0x1}, 0x7) r3 = socket$inet_dccp(0x2, 0x6, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r4, 0xffffffffffffffff, r5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000040)={0x5, 0x2, {r1}, {r7}, 0x0, 0x80000000}) ioctl$SIOCAX25DELUID(r5, 0x89e2, &(0x7f0000000080)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, r8}) getsockopt$inet_buf(r3, 0x0, 0x0, 0x0, 0x0) 04:11:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) [ 1723.572617][T17802] BPF:Unsupported section found [ 1723.585109][T17802] BPF:Unsupported section found 04:11:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe4, 0x8080fffffffe) 04:11:24 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380011, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:24 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x70082, 0x0) write$midi(r1, &(0x7f0000000040)="cbeab52f95d66a1d858e705e44cdeb20453aac9f5960ba7238170720361739bbb290c467d3219f1dd0d0357dfcd44ce2f0772c253b7ac6b879bcae3e063a4daafb4bf9dd0224035d3954856c36a992c5be0c0e6e5df156ea053ef1fc8bb8cb93dc84cd392d4d2dcec7ddd83c6d6acf4230df900db87f2ea86a12a14caf7d11ec8ad2cb23b35a3196d5ad08b373e7", 0x8e) 04:11:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x44, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipvlan1\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xf}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0xec954fab286f28fd, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xc00c050}, 0x890) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r3, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000085}, 0x885) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r4, 0x0, 0x0, 0x0, 0x0) 04:11:24 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe5, 0x8080fffffffe) [ 1724.265924][T18048] BPF:Unsupported section found [ 1724.277106][T18048] BPF:Unsupported section found 04:11:24 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe7, 0x8080fffffffe) [ 1724.411780][T18166] BPF:Unsupported section found [ 1724.421342][T18166] BPF:Unsupported section found [ 1724.443491][T18168] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:11:24 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x51, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe8, 0x8080fffffffe) 04:11:24 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:24 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r4, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x284081, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r5, 0xc0905664, &(0x7f0000000240)={0x0, 0x0, [], @raw_data=[0xfffeffff, 0xa6000000, 0x80000001, 0x4010000, 0x4, 0x5, 0x6, 0x9, 0x7, 0x1ff, 0x43d, 0x4, 0x2, 0x6, 0x80000000, 0xff, 0xffff, 0xff, 0x8, 0x3a1f, 0x0, 0x200, 0x40, 0x4, 0xdb, 0x100, 0x80000001, 0x9, 0x10001, 0x2, 0x7, 0x7ff]}) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000140)=0x1c) getsockopt$inet_udp_int(r2, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$RDS_FREE_MR(r6, 0x114, 0x3, &(0x7f0000000080)={{0x9, 0x400}, 0x38}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r0}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r0}, 0xc) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1724.682189][T18283] BPF:Unsupported section found [ 1724.694176][T18283] BPF:Unsupported section found 04:11:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380048, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:25 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$key(0xf, 0x3, 0x2) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet(0xa, 0x801, 0x0) r0 = socket$inet(0xa, 0x801, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$key(0xf, 0x3, 0x2) pipe2(&(0x7f0000000180), 0x84800) fcntl$dupfd(r0, 0x0, r1) socket$inet6(0xa, 0x400000000001, 0x0) socket$packet(0x11, 0x2, 0x300) r2 = getpid() sched_setscheduler(r2, 0x6, &(0x7f0000000140)=0x5) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r4, 0xa, r5, 0xa) dup(r5) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') socket$inet6_udp(0xa, 0x2, 0x0) socket(0x10, 0x803, 0x0) pipe2(&(0x7f0000000280), 0x0) socket$netlink(0x10, 0x3, 0x0) getdents64(r6, &(0x7f0000000380)=""/87, 0x1f7) getdents64(r6, &(0x7f0000000080)=""/167, 0xa7) clone(0xc0280000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r7, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r7, 0x3c) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r7, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) 04:11:25 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x60, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:25 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001440)=ANY=[@ANYBLOB="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"], 0x1038) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) r2 = getpid() r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r4, 0x0) sendto$rose(r4, &(0x7f0000000180)="7efab9cb0c9eadef24bb08dbf8c55f63ea144bea97d8ac1cd05606e0954ce194134e3c2a4a921829d7a4353e422ebf3bb0a4969b8f58feb7a1fcbab18e7c8a1ae9b3111d419acd28beaea19d3a8c8359ddff559832653ae586ae0bda668e9b03f42a6f934763bcafe8a34b54dc474cfb6b1246dbd03b8287868970762c707e354d4bb8d0bce9", 0x86, 0x40, &(0x7f0000000240)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null]}, 0x40) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r5 = eventfd2(0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f00000002c0)={0x0, 0xffffffffffffff97, 0x0, 0xffff, 0x3, 0x4}) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xffffffff) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8810, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x4000, 0x0, 0xfffffffe, 0x9, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r6, 0x0) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x41000, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r8, 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f0000000080)=ANY=[@ANYBLOB="0400000000000000c9000000010000000000000000000000060000000700000000000000000000000000000000000000000000000000000008000000040000000000000000000000040000000100008000000000000000000000000000000000000000000000000004000000000000000000000000080000080000000000000000000000000000000000000000000076b20000000500000002000000000000000000000005000000000000001f000000000000000400000000000000040000000600000000000000"]) rt_tgsigqueueinfo(r2, r7, 0x24, &(0x7f0000000000)={0x41, 0x2, 0x3}) setsockopt$inet6_tcp_int(r1, 0x6, 0x24, &(0x7f0000000280)=0x2000009, 0x4) 04:11:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xea, 0x8080fffffffe) 04:11:25 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1725.494135][T18523] BPF:Unsupported section found [ 1725.518797][T18523] BPF:Unsupported section found 04:11:25 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1725.557336][T18525] IPVS: ftp: loaded support on port[0] = 21 04:11:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xeb, 0x8080fffffffe) 04:11:25 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000000)=0x7, 0x4) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) write(r0, &(0x7f0000000080)="e58bf6e0aefdc71ed64a0e3e9e5374c6d14e7fd4b31363ccae3341e470eb32d81e786a8dfc60aabc9fd9d3c55ab9fce29b0032225180622058072824821628367a", 0x41) 04:11:25 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1725.692423][T18634] BPF:Unsupported section found [ 1725.698201][T18634] BPF:Unsupported section found 04:11:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r1 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x8, 0x7452c0) getsockopt$rose(r1, 0x104, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = dup2(r0, r0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000040)={0x73622a85, 0x100}) 04:11:25 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1725.991435][T18762] BPF:Unsupported section found [ 1725.997473][T18762] BPF:Unsupported section found [ 1726.010580][ T966] tipc: TX() has been purged, node left! 04:11:26 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x38004c, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f0000000280)=0x9, 0x4) rt_sigaction(0x34, &(0x7f00000000c0)={&(0x7f0000000000)="c185f4ffffff04c4c27d5a79660f0ffda7104e0b3e65430f191fc40259909c05ccfd0000660f71f4970f71e69247dec9c46331229001000000db", 0x2, &(0x7f0000000040)="dfb70c0000002e66420f5dc736dc5a4b8f69f89583b98cb66966400ff2f1c4227922d68f49c0978921980000360f2c6f0ec4226db66299c4233d7d35d1204520de", {[0x6]}}, &(0x7f0000000180)={&(0x7f0000000100)="c4c3514ae20ec4a17850fdc4627d59f766470fea97feefffff440f7e426546d9ffc48161df9eed070000c46101fe078fe9109037660f2bb979000000", 0x0, &(0x7f0000000140)="8fc83ca2948505000000e6fbc4a1ff108ba9150000c4c2c5ae910f000000660fdf5481a50fea2ed18007000000c4c1dd57fa2e410ffe410f468015b2a40000c3"}, 0x8, &(0x7f0000000200)) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7f}, 0x0, 0x69, 0xfffffffe, 0x0, 0xffffffffffffffff, 0x20, 0x1}, 0x0, 0xffffffffffffffff, r1, 0x0) bind$rxrpc(r1, &(0x7f00000001c0)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) setsockopt$inet6_tcp_buf(r3, 0x6, 0x21, &(0x7f0000000400)="9813a6e404fc2a1673c1d0f507d299775876605e3f1bc1750df3f59025a726ade841d7b48d10039fde026e641fa17bd225fbe6252ca147d485ee2fe203553f65ca95052414d0c9e4b5608b5195de825e6c42750035c1954435a7b18d851ba694727d33f9d0b8208fd62cc8f5bcab1ba59069f31e708cb24bba2f19070b917bb38ab11ab0792cba1b35d5a21e4cede924d9b6a5cf05b6fa297d8f9a6efa1ef530436e2811ce82fa1fce891437bc357d3d5ff5bb2a169e9bda223b36264040a5303e55871e006bb97215", 0xc9) 04:11:26 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xee, 0x8080fffffffe) 04:11:26 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:26 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x1, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000080)={0x70002, 0x0, [0x900000000, 0xed7, 0x3, 0x10001, 0x26d, 0x5, 0x3ff, 0x800000000000]}) write$P9_RXATTRWALK(r1, &(0x7f0000000000)={0xf, 0x1f, 0x2, 0x46}, 0xf) sendmsg$NFT_MSG_GETFLOWTABLE(r2, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x17, 0xa, 0x101, 0x0, 0x0, {0x0, 0x0, 0x4}}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r4, 0x0, 0x0, 0x0, 0x0) [ 1726.493137][T18973] BPF:Unsupported section found [ 1726.502451][T18973] BPF:Unsupported section found 04:11:26 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x2821c0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x3) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) 04:11:26 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r4}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xf0, 0x8080fffffffe) 04:11:26 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x7ff, 0x1f, 0xa0, 0x1ff}, {0x8, 0x5, 0x3f, 0x86c}, {0x8, 0x60, 0x0, 0x7ff}, {0x0, 0x0, 0x7f, 0xcc3}, {0x1, 0x8, 0x3f, 0x8}]}) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) [ 1726.926032][T19107] BPF:Unsupported section found [ 1726.956900][T19107] BPF:Unsupported section found 04:11:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x7fff, 0x4) 04:11:27 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r4}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:27 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xec, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:27 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380058, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xf1, 0x8080fffffffe) 04:11:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f0000000000)=""/201) r3 = socket$inet_dccp(0x2, 0x6, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x121400, 0x0) setsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000140)=0x7f, 0x4) getsockopt$inet_buf(r3, 0x0, 0x0, 0x0, 0x0) r5 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x1f, 0x66880) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$team(0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x20, r7, 0x1, 0x0, 0x0, {0x1, 0x6c00000000000000}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r8, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) getpeername$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r8, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r11}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r12, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getpeername$packet(r14, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r12, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r15}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) r16 = getpid() sched_setscheduler(r16, 0x5, &(0x7f0000000380)) r17 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r16, 0xffffffffffffffff, r17, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r17, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in6=@empty}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000340)=0xe8) r18 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r18, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r20 = dup(r19) getpeername$packet(r20, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r18, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r21}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) r22 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r22, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r24 = dup(r23) getpeername$packet(r24, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r22, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r25}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f0000000380)) r27 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r26, 0xffffffffffffffff, r27, 0x0) getsockopt$inet_mreqn(r27, 0x0, 0x23, &(0x7f0000000400)={@multicast1, @multicast2, 0x0}, &(0x7f0000000440)=0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r30 = getpid() sched_setscheduler(r30, 0x5, &(0x7f0000000380)) r31 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r30, 0xffffffffffffffff, r31, 0x0) ioctl$sock_SIOCDELRT(r31, 0x890c, &(0x7f0000000500)={0x0, @vsock={0x28, 0x0, 0x2710, @host}, @ethernet={0x1, @multicast}, @xdp={0x2c, 0x8, 0x0, 0x3f}, 0x2, 0x0, 0x0, 0x0, 0x1, &(0x7f00000004c0)='veth0_to_bond\x00', 0x4, 0xffff, 0xff}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000680)=0xe8) r34 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r34, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r36 = dup(r35) getpeername$packet(r36, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r34, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r37}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) r38 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r38, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r40 = dup(r39) getpeername$packet(r40, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r38, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r41}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) r42 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r42, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r44 = dup(r43) getpeername$packet(r44, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r42, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r45}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) r46 = getpid() sched_setscheduler(r46, 0x5, &(0x7f0000000380)) r47 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r46, 0xffffffffffffffff, r47, 0x0) getpeername$packet(r47, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'wg1\x00', 0x0}) r50 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r50, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r52 = dup(r51) getpeername$packet(r52, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r50, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r53}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) r54 = getpid() sched_setscheduler(r54, 0x5, &(0x7f0000000380)) r55 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r54, 0xffffffffffffffff, r55, 0x0) accept$packet(r55, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000007c0)=0x14) r57 = getpid() sched_setscheduler(r57, 0x5, &(0x7f0000000380)) r58 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r57, 0xffffffffffffffff, r58, 0x0) getsockopt$inet_mreqn(r58, 0x0, 0x20, &(0x7f0000000800)={@empty, @remote, 0x0}, &(0x7f0000000840)=0xc) r60 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r60, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r62 = dup(r61) getpeername$packet(r62, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r60, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r63}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) r64 = getpid() sched_setscheduler(r64, 0x5, &(0x7f0000000380)) r65 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r64, 0xffffffffffffffff, r65, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r65, 0x29, 0x22, &(0x7f0000000880)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000980)=0xe8) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000001e00)={@multicast2, @broadcast, 0x0}, &(0x7f0000001e40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000001f40)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000002040)=0xe8) r69 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r69, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r71 = dup(r70) getpeername$packet(r71, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r69, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r72}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000002c00)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002bc0)={&(0x7f0000002c40)=ANY=[@ANYBLOB="140b0000", @ANYRES16=r7, @ANYBLOB="080029bd7000ffdbdf250100000008000100", @ANYRES32=r11, @ANYBLOB="380102803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r15, @ANYBLOB="c40002803c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000005000300050000000900040068617368000000004c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e670000000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004002000000008000100", @ANYRES64, @ANYBLOB="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", @ANYBLOB="f186688dba6c41a85e429b0f5eef8f78b5f9ef4555b7e7d3c764eaae4631686132af3bd6ff1f37c81cc5775ffc737d15189dd52195d67a7fb8bd87135bc5d9eabfbe1cd44486f55c5f7673658bb2ab02a06ea84f973ffb90c50947fcfe579167e9117d408970c91d624bd566c5c136a981b003c7eacc4fe383bbdac048de0628443b0ee93d5e31d6032859408eba5537dd33a86ad83d676286b77290398d4257133c78dd12bd2963767023475b0ed181fe7466226ad5bd02b30fa65628adfea25c93d848a9f49f3ef4da5b48f5424ece74777d7670f2c0dd894c440d38c29301c37b6478162e7ac881ccc7d28e18900ff08b40d2e87e985c0b", @ANYBLOB="3c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000000c0004000900000204000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000500000008000600", @ANYRES32=r25, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r28, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="900102803c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r29, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400a709000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000500000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400050000003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r32, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000500000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000080000008000100", @ANYRES32=r33, @ANYBLOB="bc00028040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000600000008000600", @ANYRES32=r37, @ANYBLOB="3c000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000b00040072616e646f6d00003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000001300000000000005000300060000000400040008000600", @ANYRES32=r41, @ANYBLOB="08000100", @ANYRES32=r45, @ANYBLOB="e001028040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400ffffffff08000600", @ANYRES32=r48, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400060000003c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000700000008000600", @ANYRES32=r49, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040040000000080007000000000064000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b000000340004000600408008000000070008032000000008000703008000000900000600000048ff0f80010000000008001ffb6b00000044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b000000140004000180030606000000000804c10000008008000100", @ANYRES32=r53, @ANYBLOB="740002803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r56, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004005000000008000100", @ANYRES32=r59, @ANYBLOB="64020280400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000000000008000600", @ANYRES32=r63, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000500000008000600", @ANYRES32=r66, @ANYBLOB="44000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000014000400060007050700000003000520070000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r67, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000400000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r68, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r72, @ANYBLOB="3c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000009000400686173680000000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000100000038000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300030000000800040001000000"], 0x33}, 0x1, 0x0, 0x0, 0x1}, 0x8000) [ 1727.614741][T19341] BPF:Unsupported section found [ 1727.633353][T19341] BPF:Unsupported section found 04:11:27 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r4}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r1, 0xc1004111, &(0x7f0000000040)={0x10000, [0x33, 0x0, 0x1000], [{0x80000000, 0x37e}, {0x7, 0xfffffffc, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x43}, {0xffffff7f, 0x0, 0x1, 0x1, 0x1}, {0x6, 0x38b1, 0x1, 0x0, 0x1}, {0x8, 0x1, 0x1, 0x1, 0x0, 0x1}, {0x1, 0x1, 0x0, 0x0, 0x1}, {0x2, 0x7a2}, {0xe0000000, 0x5}, {0x5, 0x3f, 0x0, 0x1, 0x1}, {0x8, 0x3f, 0x1, 0x1}, {0x3, 0xebd0, 0x1, 0x0, 0x1}], 0xfffff884}) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x5, &(0x7f00000001c0)=0x4) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r4, 0xffffffffffffffff, r5, 0x0) ioctl$SNDRV_PCM_IOCTL_PREPARE(r5, 0x4140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r6, 0xffffffffffffffff, r7, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r7, 0xae45, 0xfff) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) r9 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r8, 0xffffffffffffffff, r9, 0x0) ioctl$KVM_GET_LAPIC(r9, 0x8400ae8e, &(0x7f0000000400)={"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"}) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000140)) 04:11:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xf4, 0x8080fffffffe) 04:11:27 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = eventfd2(0x8, 0x801) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) 04:11:27 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") socket$inet_dccp(0x2, 0x6, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) getsockopt$inet_buf(r2, 0x0, 0x0, 0x0, 0x0) [ 1727.973956][T19477] BPF:Unsupported section found [ 1727.993436][T19477] BPF:Unsupported section found 04:11:27 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = dup(0xffffffffffffffff) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r4}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xf7, 0x8080fffffffe) 04:11:27 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1728.239314][T19594] BPF:Unsupported section found [ 1728.266263][T19594] BPF:Unsupported section found 04:11:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380060, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:28 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x2, 0x40000) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000040)={0x4003, 0x7fffffff, 0x81, 0x9}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r2, 0x0, 0x0, 0x0, 0x0) 04:11:28 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xfa, 0x8080fffffffe) 04:11:28 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = dup(0xffffffffffffffff) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r4}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1728.644251][T19820] BPF:Unsupported section found [ 1728.673980][T19820] BPF:Unsupported section found 04:11:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x610000, 0x0) r2 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(r2, &(0x7f0000000380)='./file1/file0\x00', 0x0) renameat2(r2, &(0x7f0000000080)='./file1\x00', r2, &(0x7f00000001c0)='./file0\x00', 0x2) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r4, 0x0) connect$netrom(r4, &(0x7f00000000c0)={{0x3, @bcast, 0x4}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) sync_file_range(r2, 0x5, 0x1, 0x0) 04:11:28 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xfd, 0x8080fffffffe) [ 1728.897966][T19938] BPF:Unsupported section found [ 1728.910767][T19938] BPF:Unsupported section found 04:11:28 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1729.046549][T20045] BPF:Unsupported section found 04:11:28 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = dup(0xffffffffffffffff) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r4}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1729.078934][T20045] BPF:Unsupported section found 04:11:29 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1729.304612][T20166] BPF:Unsupported section found [ 1729.311120][T20166] BPF:Unsupported section found 04:11:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x700, 0x8080fffffffe) 04:11:29 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380066, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:29 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:29 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r4}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1729.645151][T20378] BPF:Unsupported section found [ 1729.681191][T20378] BPF:Unsupported section found 04:11:29 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2101, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) r6 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r6, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getpeername$packet(r8, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r6, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r9}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) r10 = getpid() sched_setscheduler(r10, 0x5, &(0x7f0000000380)) r11 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r10, 0xffffffffffffffff, r11, 0x0) accept$packet(r11, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r13 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r13, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = dup(r14) getpeername$packet(r15, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r13, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r16}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) r17 = getpid() sched_setscheduler(r17, 0x5, &(0x7f0000000380)) r18 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r17, 0xffffffffffffffff, r18, 0x0) getpeername$packet(r18, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000200)={0x228, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [{{0x8, 0x1, r5}, {0x4}}, {{0x8, 0x1, r9}, {0xf4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x400}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0xe63}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r19}, {0x104, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x2000000}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x3ff, 0x8, 0x1, 0x4}, {0x5, 0x8, 0x5, 0x1}, {0xcf0a, 0xd0, 0xe0, 0x8}]}}}, {0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x4c, 0x4, [{0x101, 0x9, 0x6, 0x5}, {0xfff8, 0x20, 0x4, 0x101}, {0x6, 0x3, 0x20, 0xffffffff}, {0x80, 0x4e, 0x18, 0x800}, {0x9, 0x1, 0x9, 0x1}, {0x8, 0x1, 0x2, 0x2a0d}, {0x2, 0x1f, 0x0, 0xb2}, {0x80, 0x6, 0x7, 0x1}, {0x1, 0x3, 0xfa, 0x6}]}}}]}}]}, 0x228}, 0x1, 0x0, 0x0, 0x10}, 0x40) r20 = socket$netlink(0x10, 0x3, 0xb) ioctl(r20, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r21 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r21, 0x0, 0x0, 0x0, 0x0) 04:11:29 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x900, 0x8080fffffffe) 04:11:29 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r4}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1729.976745][T20497] BPF:Unsupported section found [ 1730.001443][T20497] BPF:Unsupported section found 04:11:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xa00, 0x8080fffffffe) 04:11:29 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x5100, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8202, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000040)=ANY=[@ANYBLOB="0200000000000000000000400900000001000000ffffffff080000000400000040000000000000000000000000000013000000800b00000000000000070000000800000002000000040400"/88]) [ 1730.319577][T20617] BPF:Unsupported section found [ 1730.339545][T20617] BPF:Unsupported section found 04:11:30 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r4}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x4, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000040)=0x1e) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r4, 0x0) ioctl$KVM_GET_REG_LIST(r4, 0xc008aeb0, &(0x7f0000000180)={0x1, [0xb9e]}) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r5 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r5, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_capability(r5, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0x200, 0x1}, {0x6, 0x2}]}, 0x14, 0x1) 04:11:30 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380068, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:30 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xd00, 0x8080fffffffe) 04:11:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") fcntl$setpipe(r0, 0x407, 0xfffffffffffffffb) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) 04:11:30 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, 0x0, &(0x7f0000000040)) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1730.738120][T20836] BPF:Unsupported section found [ 1730.801138][T20836] BPF:Unsupported section found 04:11:30 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x60580, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000040)={{0x4, @name="7441c1ff6bbe04e26511e0539c974e38fdf37a1c4444d1e85aaa78ef50ba190b"}, 0x8, 0x5, 0x1}) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xfffffffffffffff9, 0x42000) ioctl$SNDCTL_DSP_GETFMTS(r2, 0x8004500b, &(0x7f00000000c0)=0x785) 04:11:30 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x1200, 0x8080fffffffe) 04:11:30 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, 0x0, &(0x7f0000000040)) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1731.257506][T20964] BPF:Unsupported section found 04:11:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x80080, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000040)={0x2, 0xb, "0b52b79ee67e250bebc8e0"}) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f00000000c0)={0x6e, 0x8d5, 0x1, 0x6, 0x3, 0x7}) getsockopt$inet_buf(r2, 0x0, 0x0, 0x0, 0x0) [ 1731.286501][T20964] BPF:Unsupported section found 04:11:31 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x1b00, 0x8080fffffffe) 04:11:31 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1731.595736][T21083] BPF:Unsupported section found [ 1731.614490][T21083] BPF:Unsupported section found 04:11:31 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x38006c, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") socket$inet_dccp(0x2, 0x6, 0x0) r1 = getpid() r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x40101) bind$ax25(r2, &(0x7f0000000040)={{0x3, @null, 0x8}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @null, @bcast, @bcast]}, 0x48) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r3, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r4, 0xffffffffffffffff, r5, 0x0) getsockopt$inet_buf(r5, 0x0, 0x28, 0x0, 0x0) 04:11:31 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, 0x0, &(0x7f0000000040)) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) 04:11:31 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:31 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x1e00, 0x8080fffffffe) 04:11:31 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1731.920210][T21305] BPF:Unsupported section found [ 1731.937109][T21305] BPF:Unsupported section found 04:11:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x4b50badd, &(0x7f00000000c0)="080db5055e0b4ee03a022546c006f290e1937f50bbcfe847a071ff82891de72c54c39b09bd5492b27e27148f82b63ca4799bb19289d5534931d6a3f2557e56554c50c83bf4082ec50fe8ce0711a931d22f91fa30cd3bf3326abadf63594b4f3d09c6dfc71398fafbb7a2afd594d027d2836daf48ba61c2596f175427b0c5e9b1b88dd432ca906f4064209ca6b01904bbee517c") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) 04:11:31 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1732.167265][T21420] BPF:Unsupported section found [ 1732.184321][T21420] BPF:Unsupported section found 04:11:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) 04:11:32 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xec00, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:32 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1732.488409][T21540] BPF:Unsupported section found [ 1732.506353][T21540] BPF:Unsupported section found 04:11:32 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380074, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:32 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x2000, 0x8080fffffffe) 04:11:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket$inet(0x2, 0x2, 0x1) r3 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x400) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r4, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x0, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r4, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={r4, 0xf801}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000200)={r4, 0x2fe, 0x8}, 0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000000)={r4, 0x10001}, &(0x7f0000000040)=0x8) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r6, 0xffffffffffffffff, r7, 0x0) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) r10 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r10, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(r10, &(0x7f0000000380)='./file1/file0\x00', 0x0) renameat2(r10, &(0x7f0000000000)='./file1/file0\x00', r10, &(0x7f00000001c0)='./file0\x00', 0x2) ioctl$VIDIOC_QBUF(r7, 0xc058560f, &(0x7f0000000a80)={0x5, 0xa, 0x4, 0x1000, 0x10001, {r8, r9/1000+30000}, {0x5, 0x8, 0x6, 0x1f, 0x7f, 0x80, "e02cd793"}, 0x1, 0x2, @offset=0x6, 0x6, 0x0, r10}) sendmsg$NFT_MSG_GETTABLE(r11, &(0x7f0000000bc0)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x14, 0x1, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x9}}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x20000004) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000080)={r5, @in6={{0xa, 0x4e22, 0x7f, @mcast1, 0x7d31}}}, 0x84) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) r12 = getpid() sched_setscheduler(r12, 0x5, &(0x7f0000000380)) r13 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r12, 0xffffffffffffffff, r13, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r13, 0x12, 0x2, &(0x7f0000000480)=""/197, &(0x7f0000000180)=0xc5) 04:11:32 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xfffff, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:32 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:32 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000040)={0x3, [0x2, 0x4], 0x3}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000200)={0xe, {0x1, 0x56, 0x3f, 0x1000, "95c38d98914f80ccfcc849ea06695962ae5ac6000d686d2f06c4c9d3520c87d03e10dbddd09750f4a92782d83237720403b7a7f44a1554ef0afc658d687c8b5bc08fb52e558cc71e077514e4accb17dbd79bb96ecbf0ffc4866899b883d198cb89f05695c792e61bfa73a45f1f39a14751676e2e89aaa2b4a8b2efd3f0ad0e27f616073c2b00a5ff8047fab4e77b9662cbf6e6d99d76c8cfa8670cea8925b9b76572f8e4090831bcd45d7e05bfa162976f81565c3a4846bc0f3f0ba06168bcd1cf471475df3f27a26f40b3efa07392df124632d4ffcc4ab64402f110e745ab2ae8dc5a441263d15e9131547e95c8400a646343f94bd96605e4cc4714b803f03660a4689740276a1aa5e51bf23a199550498f62cf7188e50b2507029deeb9fc2f4ca59ea804804546a31a74ac73735912b7664443e856287f37d63997da4d7c4c018ef0eedce6e3adb2877a23b30c8a78659928dd53fd1196cab15a154672d7c9a2aa2583eefeae7639052ba3b3733ce131faa6491b04532db99a1c46f3b37f0b699fd67657f5326f271e4dcc6fd1b1911681018ceb0a2340a20d1781b655c3bd6848d588c43f07b793aa6cd25bcea86c988ba681eaafc28d9d41186ee0410ab763c513b7ebcbe6e5340cac40be531070710a236a5820a3d9a0fc2cab32ac1953661309bdc4ef236397479bf9a2480efbc75fd395ab3a02a804943c45ddd6bb8dadc61c155c8eb447ca501b31ac157c4527a86307516f17afcd5d624dcb0beac9d703e8c53d100b35f50a7550550f3a201eaa3de1e5a6286d99336165d9e9a114ef603c19e4e5d2cf06cc697133c703d34098ff2e4c28e97917dd4b1e6d4830203cf331ba2cd4c90d5e149c607e9fd4862469aa33ec5b2eb53b03d97db03a437bf10dd877e06bf8fd553c734f7e65b883c21193208bace53d6b8dabb549fa2d7220cbb05719b3282bb6b6f2c44cce309b5822b7a178c4048d1f2c62efa3f399325cee206e13d0cabc0142a038a882885c1ed1f49c618d808f9723e09dedcc7a068678464f6bfd1f24219bb01427c90fe4494ceca7338cbecbcba332251e5c00746ec044dd9edcf6d605839afbe6406e2a0e0423575da34bc486d6f07d9a68e74c8d3b1e4346781287ef804d03c15eebfc100ad8e89288c75038e61a5d96003a22fd78ef4f45b605b99fedb1f62d1af40577335987f34aeab69c4de1227424fd6378a8304056b6428e5e32cf863803987ab09ec3a34312dfef1560b18a1a7bcf212bc311afb431a2d1d0afaf4cf1094dfae13651c0cd09eb30d38ed34e9cfab2b911b2ff70066f5997c4e5b05fc1d472920b49a904552a49f3dd10cc38362497d3467ea5a59f273a3d924bd01563e0d5cb2c02373c7267fe84571d8994eb278df2fbf4484c9294fda8ade4ef506f9f5e9188870532598f3dc131381c676aeb86782c1ed5b1e73a44527638758df3c7c8980015422e8c606994181ef17a3cf1f7d1f021bb0e2344887fd13317afd0aad85856b1a67763ea51b3831c2c7fafdab151101ac79cd7b5ec5e97d3dfbda5a5fc0282d00e9a8a475f094edb328fcde9a7a1cc9448b515a891b507b87f8e37f16a250cdcb081b06d650fecc1809b9122cc707d986401b44f48d4fa8ab1069a549ceecb68a4f756dc9f3b0531158936921e3c5a1d5035a59fd9f2fd3d0007159fcef25111e14c99f0e8717510041ea7f2f4ae863d04d6d81e37a70779704ad80aaabc3df0b19201cedd75406bc88050a75bc7d8047a18a86b6454c0ca6d07faa3aa4f048f14d4f877d16935589a384a9c127f5d38df1ee582baf47824fc69359b87df9ae3bf4e75ebc7637fd92818818df92487218456ff571d6bd6b95699fdc54d16a3e4be1d9ca4d320a2b1d0057b4bb15fd19d001275820e724f34315448bebefa9efdc2fa299681b701c9f9fe19a6196bc3c6aead77801e648ce8d719d03b14b6a5f0eca658606c188bf73519f61e3df7602b20f7fac2f5559039c441f97c1fdd7b5580f6897b9f80bb14e74707d5779966bbb8eaae5b953f28b72843a42a989570b4a4448090567540de5f752b1302479b81513702db7f46a444963c22406ca54d49e148e8b80e4c08b8048ac6a72bd5804e9f65c3a3a0ad25f0b8ba899da13dfe2ac54721939b38e394190902ac5dbc0203ff1b43520f954ee6b85c0dbd2f1dc8073d34492e759804445d328dcd6fcd5d40895f76af2859af4fef8bf957582627bf5df6bdfedb75885f4d42c18ab8490aec3150b1994c800592013fa4d9dc3ae7d6d059a2b24440ab6c9c9c3fcf36eb1874aea9346de8f7ef7756ecc5e23f1a8005f53a0ee01537827e63140ac80d04d861fe10eae1e03d4ca2a705c4cf7794a807a283e14b767972bdb9741babce2ff742f257ab75da37539ad28dec04d7f969755542310d64e31a5b46f52c4ccc652ab969baec12455d2ebf6c976695380f244b0302a568eb6b0824e0275fefb0e93db14a9597308c08d7b9bf9fdf6295f73e2545f54163dea5de3b7aee4ca7d9fc5a4e5f6ae7fb859975e39b2fa9d09faecee34f990b2bc384a553055f4e016cb55bcddd155380d67c11758e353d378aacbd0fd28a2d532569c577cf3f32541e312ba1d8056222529c40f66748e56cdabcd81fc029c8820282d99fca4cdcb6593a73c6f5b5dc5da6bc65a8d5d237c6aed1cfd8c22394fbd168d01790d879be06c63b045bf5912b4cecf0d91760d958deb1e9967e9bb4bd0182ef1ca72250752e4832a81a1706f0bec5aea3110132daa56d2cb93d1bed2c2cdc004d98ec34066f9ac01722ccc25071f1ccf275173140027155165fc21b592ad15563d963b6a48c993a4443fdc49bbe7ca5cc66d9a47ecc2b3fbea8d31137b0471dbf01c67456fbfcb2f60ff351d7a3075c077e1e18e53d4ab0ff93dffb3d71c677d559c642ac183b30201b52748b7267c93c9027a0bba7b9fe3d15c6cd62cddf3516ff55dd680d0afa5d74962ecd004b597d3159dcd4911d5bf0e9fa99fe5a363059ff69f44229ddc0d83b037bd718516891fcd8090bd42141b0fa3ee452f5ab00c2db629fa6930b11583738d3bc5580b7bfa3892fd2e52e8699fb19f36da0d54c3e1bd9eb91a1e99d1ae72f34013e0614f15c4cfc2db0151f0202bcca4a306a314b3f50d169c5bee1db637189d6241c5357395ece7321f0a0b55230add887f46f2f067fdf3e45dad353274aa3fb977674fc699d332d3835a1dcc824493a1430395e41828473adc46e31165449ec6e04e2f04ceeca4b50657207384001b6bbbd63a3fcaa6ae44a67031aba7ff1419b9f85e46cbf5c7bbb3c873422c0bb60f67b8ca963ef1651a5e56b48d2adf75a6ba499f4b5dfb8735f4b2f4053b6fa0c72df86d36b7e01b6d1ec6cbb5ad0f51f97d019cb88a93a94f1f7c10f71472f3f5cbea56df14bda75c030ef1fc64ebfbbcf07208ff7189a2a53511ae3e3648cf8251af887ffd6dd4e0310d05e9f5e3b4609e0cbb3860145c54e79095d44afb1378317a6df3e3803556823dc14b8de1971079612061d77177f3a9497a4fef76d5a3ef534e42fb31dd5395cf4fcaae35cf9c477ce878fdfd8bdf02e7151efdb08a57e87931c1fba1362766addbbf4ce1508ffc3d44b60735c2ae0da7dab4c048076c86f527bdc81f53ae6107d95d4fa9172a787b0d8ba2eeb6d569f7e63ddd5d91c13f0035f482263e815f580ca32e75c79dc9b47f383076ee27de4a3131ce4e5a8a288639abb2936b37012413e34a48e9d14cfe604f184643e0082ecff9b560d66e50fa57292ca5552cf2218dc62e6d2a2a725fa35949106812fbe6d05e593b08d9a041d20e4d581a7344eae8f7911328c447f982ae1dbaa6f6c5f00b958385c967c393aca1d7b446ea30e514561c087ca88eca9a2b74743d877a9d3d7539d310f1c0758ee69bc1eab8a4cecceddd2b4c3daf6b5d76d5f850204bff6f0169e50fdce10b6e9607a7179a78d49588123dd46ab9378f0691ce8c477956ce078be194672310e139b31dd22e9c1b6e01dd5daa5921cc68bdaabf4162a87c5cfc582d2186717b7b658996d304729f3a5ad81d1709387ed6cfd7b509c1eb6d248ef7b2171aa16fa8976087b1ca6eb15ba6766d053ad8579b08986758619e21a797f355a4a5a7773e3af5c69afa6049da67f8d97a8056bf41232ee46108f56573a9d1d46c91d33ce5d25abe2ab669a0740b2ddee1b3133f9d2ff9c48e1f3648e0246731ea56bca5204a9e2917c5cd81a5b894d58f4679605c274580f3666641ec38c90ffe3882e599aed91bd040867c89925125800163d97500604e671fca52fd03369cbdaded37eb4ad4bae8812d41e954e52e55ade99c33ceba640bff3b0ea8d07335a605e5173b6296d7250e753a925bf923021dc85382b8bb3b018b68066b5d88b30199ac600f63ef7812d731f8470b3227b9790359e479530575d5fb97be281b52650f727a40d2611ddc606fc72c617048421347e615afcd3325bf7249762bee8dc99c2ff0156317ec05c969677ee7410a802d20a4f2d119ac9c04f25677a7c58a9aa9908cb3c3496d75b060f208921f997236565275265938e5f8f0aad2424988591a495ceb4fc3650b9f334a2c3a6d410327451cf44880d2092ff48d7b6b197b33e030d09978dc9aade587e4180a95f33a6088263ee2bf313ecc2766cae2dd69ff304335d7c2588ac1bbfab34a9e165f50f5976fd5f8f58bb1ae8138d76ceabe862931864e1b82f14e4ce45f64c4d8ffde34c07f42bfe6d45eafabb2afdc2f0a14d283473a1e8a95e3b64a34e43878c4e0a104f9e6e56c3f985ed690f9a0f04204aa7471fffc107aafeeaa911fc065efbd2e370170e290fd5555b73dcea85314af7524391fd8bdaf51c1dad05b537998d6fb5898adb012694eae45c663d704729101989c1a8c77ecb11e942cb14fc4dc93d328775c8b88432f512d8580f05436a413a5fee9d5ae0af344ba5c4158af5ec32161d46573a72bc6a9b0dad22f9011e6baae8347ea1f2bcc7969cee57434940b9aaf81f3b86d3da3a34b0b9de9eef2850dad7e088990e9f7987cab61f8b1cf1d126fe065d196e699f7f4ead7a1c000b61daac7aa64221d417f3036e17c3269f50f898dbd939c7657b48ec0882dc4d728511a6a2e1bdbc714e51c354500f1af0b78ac0847aa6cf1b5ae0947382ad52662cde8e034bb9044c0c590bfe5eecf45effe46b830ba502c79eafd536192f61bf5a235727417b9c5fbda905989b7cb652267c8a6f1cb03cf3ab9c8362dd4068b22836b57fc9d28254070a68cd1960ecdeba46b8d056d81fdb2bca65254cc9229ec164d7949cda964b39f1849f701389659fc09bb9eb708d3ca659e20783fd668eaf32187378d5face530013fc2232a204f176fa1646196ab20becfe176bb0edf4d9c2753454d25d2ee1495539dad836138db60229451c276d2f8435eedbb711ad9666f5b202936a275cd32212544f2d337fb2a9f102b363b4d360cbb91fae7765a35d023068a2e4a5bef9896db1e110f37b087595ced5d0a834c4bd718226af0ef5ebe73ca90352ebda06153d54e8a262c0a3dbee93a3751f341fe782cc09d556f217484c3c3abae695e3a52184a82c450c62178226aec1865978d4025a8c1e037b5af02c58c60e77584eebc7e96a8f72c378d423d58dcc0841711a03dc1e8036850166b8925e831dc6d4dc612cabc5f481327ce5beabb0eba6acce6f25a15d80b7e2519945c665a959535f973f1c8bd64338bcf3759e6ae5b2b067506c695cb21d7a37a2ddc4e47c9c4eb7"}}, 0x100c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r3, 0x0, 0x0, 0x0, 0x0) [ 1732.890648][T21758] BPF:Unsupported section found [ 1732.915506][T21758] BPF:Unsupported section found 04:11:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x10, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'netpci0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r4, 0xffffffffffffffff, r5, 0x0) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00') r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r7, 0xffffffffffffffff, r8, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, r6, 0xc09, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x120}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r8}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}]}, 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x4040001) 04:11:32 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x2400, 0x8080fffffffe) 04:11:32 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:32 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(0xffffffffffffffff, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0xfffffffffffffffd, &(0x7f0000000000)="cfe847a071000000000000417d0000000000000000") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x10, 0x0, 0x0) [ 1733.244418][T21881] BPF:Unsupported section found [ 1733.255364][T21881] BPF:Unsupported section found 04:11:33 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1733.514866][T21995] BPF:Unsupported section found [ 1733.533288][T21995] BPF:Unsupported section found 04:11:33 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380078, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:33 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(0xffffffffffffffff, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:33 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000)=0x80000000, 0x4) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r3, 0x0, 0x0, 0x0, 0x0) 04:11:33 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x2d00, 0x8080fffffffe) 04:11:33 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:33 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(0xffffffffffffffff, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1733.845614][T22211] BPF:Unsupported section found 04:11:33 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:33 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x3600, 0x8080fffffffe) [ 1734.262599][T22328] BPF:Unsupported section found [ 1734.277763][T22328] BPF:Unsupported section found 04:11:34 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, 0x0, 0x0, 0x0) 04:11:34 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:34 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x3f00, 0x8080fffffffe) [ 1734.486149][T22444] BPF:Unsupported section found [ 1734.493392][T22444] BPF:Unsupported section found 04:11:34 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1734.658214][T22549] BPF:Unsupported section found [ 1734.708052][T22549] BPF:Unsupported section found 04:11:34 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x38007a, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:34 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:34 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, 0x0, 0x0, 0x0) 04:11:34 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x4000, 0x8080fffffffe) 04:11:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10) ioctl(r0, 0x0, &(0x7f0000000040)="080db5055e0bcfe847a071") r1 = getpid() r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r3}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r3}, 0x30) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={r3}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=@mangle={'mangle\x00', 0x1f, 0x6, 0x940, 0x3f0, 0x710, 0x2d8, 0x0, 0x0, 0x870, 0x870, 0x870, 0x870, 0x870, 0x6, &(0x7f0000000100), {[{{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x21, 0x0, 0x7f, 0x0, 0x1b7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, [0x0, 0xff000000], [0xff000000, 0x0, 0xff, 0xff], [0x0, 0xffffffff, 0xffffffff, 0xff], 0x743, 0x640}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, [0xff000000, 0x1feffff00, 0x0, 0xff], [0xffffff00, 0x0, 0xffffff00, 0xff], 'geneve0\x00', 'vlan1\x00', {0xff}, {}, 0x6c, 0x1, 0x2, 0x22}, 0x0, 0x118, 0x178, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}, {0x6, 0x1, 0x1, [0x8, 0x46, 0x100, 0x6, 0x7, 0x7, 0xfffe, 0x5, 0x1000, 0x7f, 0x80, 0x101, 0x7, 0x1, 0x1000, 0x7f], 0x2}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x49, 0x98}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev={0xac, 0x14, 0x14, 0x1d}, [0xffffff00, 0xffffffff, 0xffffffff], 0x4e21, 0x4e22, 0x4e20, 0x4e23, 0x0, 0x3, 0x6, 0x81, 0xf5}}}, {{@ipv6={@local, @rand_addr="3e0824abe56b20fc4b7029c9712bfc2a", [0xff, 0xffffffff, 0xffffff00, 0xff000000], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth0_macvtap\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x2b, 0x7, 0x4, 0x10}, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x20, 0x1}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4=@remote, 0x40, 0x39, 0x2}}}, {{@uncond, 0x0, 0x2d8, 0x320, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @fd={0x2, 0x0, r4}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@mcast2, @ipv6=@empty, 0x21, 0x35, 0x200}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x3b, 0xa1, 0xff, 0x1, 0x9, @ipv4={[], [], @loopback}, @loopback, @mcast1, [0x0, 0xffffff00, 0xffffffff, 0xff], [0xff, 0xff000000, 0xffffffff, 0xff000000], [0xffffffff, 0xffffff00, 0xffffff00, 0xff000000], 0x80, 0x4}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x5}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x9a0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r5, 0x0) sched_setscheduler(0xffffffffffffffff, 0x3, &(0x7f0000000380)) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r6, 0xffffffffffffffff, r7, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@gettaction={0x68, 0x32, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@action_gd=@TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x18, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7fff}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0x10, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0xc, 0x3, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}]}, 0x68}, 0x1, 0x0, 0x0, 0x810}, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r8, 0x0) ioctl$VHOST_SET_FEATURES(r8, 0x4008af00, &(0x7f0000000000)=0x1000000) r9 = socket$inet_dccp(0x2, 0x6, 0x0) ptrace$setregset(0x4205, r1, 0x1, &(0x7f00000000c0)={&(0x7f0000000080)="183adc9e", 0x4}) getsockopt$inet_buf(r9, 0x0, 0x0, 0x0, 0x0) [ 1734.972193][T22768] BPF:Unsupported section found [ 1735.008351][T22768] BPF:Unsupported section found 04:11:35 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:35 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, 0x0, 0x0, 0x0) 04:11:35 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x4800, 0x8080fffffffe) 04:11:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpid() r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000140)={0xb384, 0x5, 0x4, 0x1000000, 0x9, {0x77359400}, {0x4, 0x1, 0x5, 0x3, 0x5, 0xff, "bbccacf6"}, 0x82, 0x6, @fd, 0x6, 0x0, 0xffffffffffffffff}) ioctl$SG_GET_VERSION_NUM(r4, 0x2282, &(0x7f0000000200)) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r5, 0x0) ptrace$setsig(0x4203, r1, 0x7, &(0x7f00000000c0)={0x28, 0x1, 0x3}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="02000000010001000000000002000700", @ANYRES32=r6, @ANYBLOB="045c7e690008000000000000"], 0x2c, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 1735.297205][T22883] BPF:Unsupported section found [ 1735.306505][T22883] BPF:Unsupported section found 04:11:35 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1735.490126][T22996] BPF:Unsupported section found 04:11:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0000a684000000000000000000") socket$inet_dccp(0x2, 0x6, 0x0) [ 1735.517269][T22996] BPF:Unsupported section found 04:11:35 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00), 0x0, 0x0) 04:11:35 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x3800fc, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:35 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x5100, 0x8080fffffffe) 04:11:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r3, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)={0x94, 0x3, 0x8, 0x201, 0x0, 0x0, {0x15d12af54449dd48, 0x0, 0x2}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x60}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_DATA={0x44, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_COOKIE_ECHOED={0x8, 0x3, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_SCTP_SHUTDOWN_SENT={0x8, 0x5, 0x1, 0x0, 0x10001}, @CTA_TIMEOUT_SCTP_HEARTBEAT_ACKED={0x8, 0x9, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_SCTP_SHUTDOWN_ACK_SENT={0x8, 0x7, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_SCTP_SHUTDOWN_ACK_SENT={0x8, 0x7, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_SCTP_SHUTDOWN_SENT={0x8}, @CTA_TIMEOUT_SCTP_SHUTDOWN_ACK_SENT={0x8, 0x7, 0x1, 0x0, 0x2033}, @CTA_TIMEOUT_SCTP_SHUTDOWN_ACK_SENT={0x8, 0x7, 0x1, 0x0, 0x6}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x8051}, 0x81) r4 = getpid() syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x8, 0x80) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r4, 0xffffffffffffffff, r5, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)='/\x93posix_acl_access\x00') r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r6, 0xffffffffffffffff, r7, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r7, 0x84, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000002c0)={0x9, 0x169, 0xfa00, {0xffffffffffffffff, 0x0, "000002", "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"}}, 0x110) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r8, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r5, 0x80045530, &(0x7f0000000000)=""/189) 04:11:35 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1735.954836][T23219] BPF:Unsupported section found [ 1735.980074][T23219] BPF:Unsupported section found 04:11:35 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00), 0x0, 0x0) 04:11:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a098") r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000200)={0x1c, 0x0, &(0x7f0000000100)=[@acquire_done, @release={0x40046306, 0x1}], 0x5b, 0x0, &(0x7f0000000140)="e56703d58dda81ec9e82ac2904b6cd388215d3393dc9129822ffa79521efb253471a89c703f648bfc7025928b9335932edd7effc5772c0d31f0822fcd2146fd8b7d042d753e81875a0d369949ed776a01d456c30dffc9d5a735256"}) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x238300, 0x0) r5 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x400) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r6, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x0, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r6, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={r6, 0xf801}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000200)={r6, 0x2fe, 0x8}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000280)={r6}, 0x8) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r7, 0xffffffffffffffff, r8, 0x0) getsockopt$bt_hci(r8, 0x0, 0x1, &(0x7f0000000000)=""/159, &(0x7f00000000c0)=0x9f) 04:11:35 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x20000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x5a00, 0x8080fffffffe) 04:11:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) [ 1736.332613][T23340] BPF:Unsupported section found [ 1736.361271][T23340] BPF:Unsupported section found 04:11:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x6300, 0x8080fffffffe) 04:11:36 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:36 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00), 0x0, 0x0) [ 1736.576988][T23458] BPF:Unsupported section found [ 1736.582746][T23458] BPF:Unsupported section found 04:11:36 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380103, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r2, 0xc040564b, &(0x7f0000000000)={0x4, 0x0, 0x200b, 0xd842, 0xffffffff, {0x8, 0x8001}, 0x1}) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r3 = socket$inet_dccp(0x2, 0x6, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSTI(r4, 0x5412, 0x6) getsockopt$inet_buf(r3, 0x0, 0x0, 0x0, 0x0) 04:11:36 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x6c00, 0x8080fffffffe) [ 1736.837395][T23673] BPF:Unsupported section found [ 1736.847463][T23673] BPF:Unsupported section found 04:11:36 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x51000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x7500, 0x8080fffffffe) 04:11:36 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xa) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000040)={0x8, 0x1000, {0x57, 0x7, 0x7ff, {0x8, 0x4}, {0x6, 0x1}, @rumble={0xff, 0x6}}, {0x54, 0x9, 0x8, {0x7, 0xff}, {0x6, 0x9}, @period={0x5b, 0x0, 0x6, 0x401, 0xff, {0x7, 0x0, 0x2, 0x82ec}, 0x2, &(0x7f0000000000)=[0x70c, 0x9]}}}) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) bind$bt_l2cap(r3, &(0x7f0000000240)={0x1f, 0x6, @none, 0x83f, 0x3}, 0xe) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r4, 0xffffffffffffffff, r5, 0x0) ioctl$SG_SET_COMMAND_Q(r5, 0x2271, &(0x7f0000000200)=0x1) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x7a1e4d6e9e9c497b}, 0x9820, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0x0) bind$alg(r7, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 1737.131958][T23793] BPF:Unsupported section found [ 1737.157573][T23793] BPF:Unsupported section found 04:11:37 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x60000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x178, 0x41d38b9659256604) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() syz_mount_image$nfs4(&(0x7f0000000180)='nfs4\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x9, &(0x7f00000007c0)=[{&(0x7f0000000240)="a645ca7654dbf1e9db3efd9b92db457af9044f84d03237dd1864aed5fa5778e21dd89c804277ccae48466a5af881429889d12a22ffdb64a99f9e614ca6ada369db87e816", 0x44, 0x2}, {&(0x7f00000002c0), 0x0, 0x5}, {&(0x7f0000000300)="254ca8b3935d50831ae85800aa3bbf6a530f47b229d08a72290552926dac0bd594ba1506bbcdf12787fd84cf704ca9e35299a9505e55536aae1ea93c1825f707d7bfa27fb802810de8b74c5000c48c10a9928bcdc3f219da7893fd1ba7f44ccae615e08a8e7619add834820ff5bec4acb4ed341ed4c2ea", 0x77, 0x9}, {&(0x7f0000000400)="926c271bfb68f392a9", 0x9, 0x5}, {&(0x7f0000000440)="4a72a862336a91f9a783c94caa23565b80e11d225772d8f56d180be6efd09b1da9fd10524230b88766f01e5eff1ac89c3d9bdea722a4136f7b29963661efc8aeb837b31dde17c6c236691389bc6d0770901eef7bda990dc4de28de8dddf56b77eee025e056e5380814f3e7bd2c3b1056f96a640ab0fe276036a3d2651cbbe61d3cd918fd7840a33b822f31e04dde4a21e1ec7901456e7b7337911e50c9eb28e1d6eb44bd337977a560b7cfcd69b0bf479c647e4875a69b1ea836d05842cb36714908e6fa789f888fa719643a2e9cc855c21365f602e528a13a08d64346aac96fc43926d94ce3758c7f95a6af4154f7", 0xef, 0x7}, {&(0x7f0000000540)="b23cffeb305de532a1eb6cb60bf81658bb9eac8ef324844eb065bfae8c99119861e7c8f50b1ab435fa5e3c27fc3ec926703263ef5de4aa32dac6773eb738af31cf26bbbb2f841a165affe7e97bdb7143bdaf2352937fcc21c1d03219c919eca914c2a6986756982172ab4cfaac5bca465588ea38c8378800b91b0f45e40814622d8f77c61eb2bbcc80b69cc3e1b8e6a2e7039f343f65406135e0218c5ee92fb01dbb9f30052b38c5c168f97d6cbc79121dc4b9a2ec16d10b84b2b3010e449997231644c204757b0c199bcf857a74f7a5ad08719ee15f3ab86f5ee96f558eae0cfcd913c202bc3ad8d8", 0xe9, 0x2d7}, {&(0x7f0000000640)="640d29d6b456d54558f33bdf07b167b306932a", 0x13, 0x2}, {&(0x7f0000000680)="07e3f63f05a7ad0ad99afe5799f34376ae78cf5b3cab94463f7484133c7669411766d48b7ac1418909365b294728233cddc9579c89e03c24dff4a0f19f722c2cec5783f3bab032186627fb20ed6b0f04774365d567c538c05d6d20100c42db7bfc847ea2bb456fe51279ee7cf28d691c04cda33cc3a1f61fb707231e62191f982738cdea948096251ecc8468", 0x8c, 0xd4}, {&(0x7f0000000740)="2c356aa1540810ee17d5a93c01f6725425b3bac19940365186e9f9475686d7fbec972fca0c3c837292d8e16429d2a037092c7f31b18c63130633902a721e06e4ac4403fe1a21d5ac38026ccecf51477f0945a34f9b85fab9743a17681a249fed4531", 0x62, 0x9}], 0x20008, &(0x7f0000000100)='$\x00') sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r5, 0xffffffffffffffff, r6, 0x0) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r7, 0xffffffffffffffff, r8, 0x0) r9 = getpid() sched_setscheduler(r9, 0x5, &(0x7f0000000380)) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r9, 0xffffffffffffffff, r10, 0x0) ioctl$KVM_GET_PIT2(r10, 0x8070ae9f, &(0x7f0000000900)) r11 = getpid() sched_setscheduler(r11, 0x5, &(0x7f0000000380)) r12 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfff}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r11, 0xffffffffffffffff, r12, 0x0) r13 = fcntl$getown(r12, 0x9) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff, 0x8000}, r13, 0xffffffffffffffff, r4, 0x0) ioctl$IMGETVERSION(r4, 0x80044942, &(0x7f0000000000)) getsockopt$inet_buf(r2, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r4, 0x80045700, &(0x7f00000000c0)) 04:11:37 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:37 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x7900, 0x8080fffffffe) [ 1737.431705][T23915] BPF:Unsupported section found [ 1737.440328][T23915] BPF:Unsupported section found 04:11:37 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x3801f4, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:37 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) timerfd_gettime(r3, &(0x7f0000000000)) 04:11:37 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x7e00, 0x8080fffffffe) 04:11:37 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:37 executing program 4: socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x40000000000007, &(0x7f00000001c0)="080db5055e0bcfe847a071") r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x9, 0x201, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x810}, 0x4) getpid() [ 1737.913826][T24139] BPF:Unsupported section found [ 1737.924818][T24139] BPF:Unsupported section found 04:11:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000200)={&(0x7f0000000100)="c09e1b1937619af12d5cbf4ab8e8ff09a4441505802f481dab47e9ab59405aa30bfd976420e29cb70bd54db6db9b32819b85b623e6dc703282fa0fd588297fad30eb4a20be22bdecc4bcebff140244b815f73e5a286e95a03cca5e048fe191158fc1714594010026cf9b186bad6c3105ae2b195741a7e4c730898f347a21a7bb28e848eabf7fc91e8e8ae8295c5481bd4fdcfb0f7a497b0fd45e94ba3adcb4faa9f87c7ef5251a562f2c0258431040a927f041dec89e6e35b5d587dd6050373c5330d7ceef461666a7582a2f790965fc38545a02d089a7ab4f4afd5526efa2badcd136e1cfc57872e83d59c06b", 0xed, 0x1}) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(r3, 0xc00464be, &(0x7f0000000240)={r4}) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:37 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:37 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1738.123645][T24257] BPF:Unsupported section found [ 1738.129619][T24257] BPF:Unsupported section found 04:11:38 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x8700, 0x8080fffffffe) 04:11:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r4, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r5, 0xffffffffffffffff, r6, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r7}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r3, r6, 0x0, 0xe, &(0x7f00000000c0)='@eprockeyring\x00', r7}, 0x30) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff, 0x3}, r8, 0xffffffffffffffff, r2, 0x0) r9 = getpid() sched_setscheduler(r9, 0x5, &(0x7f0000000380)) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r9, 0xffffffffffffffff, r10, 0x0) r11 = openat$cgroup_procs(r10, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bind$alg(r6, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha256-generic)\x00'}, 0x58) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r11, &(0x7f0000000040)={0x8}) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r12 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r12, 0x0, 0x0, 0x0, 0x0) 04:11:38 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1738.446565][T24377] BPF:Unsupported section found [ 1738.452656][T24377] BPF:Unsupported section found 04:11:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380218, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:38 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x80, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000040)=0xfffff000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000080)=0x1) 04:11:38 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) 04:11:38 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:38 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x9000, 0x8080fffffffe) 04:11:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r4, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r5, 0xffffffffffffffff, r6, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x1, 0x7, 0x4, 0x1000, 0x8, {r1, r2/1000+30000}, {0x2, 0x0, 0x7e, 0x81, 0x4, 0x81, "df258f1d"}, 0x9, 0x1, @planes=&(0x7f0000000040)={0x4, 0x7ffffffc, @fd=r4, 0xfff}, 0x20, 0x0, r6}) ioctl$KVM_SIGNAL_MSI(r7, 0x4020aea5, &(0x7f0000000100)={0x0, 0x2000, 0x9, 0x3, 0x7fffffff}) [ 1738.864705][T24597] BPF:Unsupported section found [ 1738.881507][T24597] BPF:Unsupported section found 04:11:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r3, 0x0, 0x0, 0x0, 0x0) 04:11:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) socket$inet(0x2, 0x2, 0x5) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x3f, &(0x7f0000000000)=0xc518, 0x4) 04:11:38 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xec000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpid() r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000000200)=[@in6={0xa, 0x4e20, 0x1f, @local, 0x800}, @in6={0xa, 0x4e23, 0xfffffb3b, @loopback, 0x101}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e21, 0x20, @mcast1, 0x100}, @in6={0xa, 0x4e22, 0xfff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}], 0xa0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r4, 0x0) setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, &(0x7f0000000000), 0x4) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x10080, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, &(0x7f0000000080)={0xb2b, 0xfff, 0xba34, 0x6e, 0x7f, 0x1, 0xff}, 0xc) setpriority(0x2, r2, 0xd4) r6 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r6, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r6, 0xc02064b9, &(0x7f0000000180)={&(0x7f0000000100)=[0x5], &(0x7f0000000140)=[0x0, 0x0], 0x1, 0x2, 0xb0b0b0b0}) 04:11:38 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) [ 1739.223304][T24725] BPF:Invalid section offset [ 1739.240712][T24725] BPF:Invalid section offset 04:11:39 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380240, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x9900, 0x8080fffffffe) 04:11:39 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff0f00, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x404}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x10, 0x3f5, 0x100, 0x70bd25, 0x25dfdc00, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0xcc003}, 0x4c2) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r4, 0xffffffffffffffff, r5, 0x0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r6, 0xffffffffffffffff, r7, 0x0) ioctl$VIDIOC_DQBUF(r7, 0xc0585611, &(0x7f00000002c0)={0x3, 0xb, 0x4, 0x200000, 0x80000001, {0x77359400}, {0x1, 0x1, 0x4, 0x1f, 0x1, 0x5, "e12d5f19"}, 0x2, 0x1, @fd=r2, 0x6, 0x0, r5}) r9 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x400) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r10, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x0, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r10, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={r10, 0xf801}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r9, 0x84, 0x7c, &(0x7f0000000200)={r10, 0x2fe, 0x8}, 0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r8, 0x84, 0x75, &(0x7f0000000140)={r10, 0x3}, &(0x7f0000000200)=0x8) ioctl$KVM_HYPERV_EVENTFD(r5, 0x4018aebd, &(0x7f00000000c0)={0x1, r2, 0x1}) ioctl$TUNSETGROUP(r2, 0x400454ce, r3) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r11 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r11, 0x0, 0x0, 0x0, 0x0) r12 = socket$key(0xf, 0x3, 0x2) ioctl$sock_inet_SIOCSIFPFLAGS(r12, 0x8934, &(0x7f0000000080)={'syzkaller0\x00', 0x3}) 04:11:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x20000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000380)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x7, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x500, 0x0, 0x0) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000040)=0x2257) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:39 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0) [ 1739.829043][T24957] BPF:Invalid section offset 04:11:39 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1, &(0x7f0000000280)=0x9, 0x4) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x12803, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r2, 0x4038564f, &(0x7f0000000040)={{0x0, @name="e16672cfce6de812c80faf5756d7a27b5026c53bd7fc79bfb3f8386c159bedd6"}, 0x8, 0x7ff, 0x6f0}) 04:11:39 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff00, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xa200, 0x8080fffffffe) 04:11:39 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f0000000200)={0x9, @capture={0x1000, 0x1, {0x50, 0x6}, 0x1, 0x7ff}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r3 = socket$inet_dccp(0x2, 0x6, 0x0) sendmsg$NFT_MSG_GETGEN(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x401, 0x0, 0x0, {0x7, 0x0, 0x9}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x840}, 0x8080) getsockopt$inet_buf(r3, 0x0, 0x0, 0x0, 0x0) [ 1740.043097][T25070] BPF:Invalid section offset [ 1740.050514][T25070] BPF:Invalid section offset 04:11:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x20000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000380)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x7, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x500, 0x0, 0x0) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000040)=0x2257) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000000)={0x4, 0x0, [{0x83b, 0x0, 0x4}, {0xb79, 0x0, 0x7}, {0x38b, 0x0, 0x9}, {0x3bf, 0x0, 0x100000000}]}) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000740)=0x14, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000780)={0x2, 0xbf, "824ae360c0f498d868880cd24265130cb3e17d44c087226c170c86fa1c027ad9b00534cfe8ac92d8686f6ae4a0f37139dfe7e1bed784ccd1f7e0c40aa8c6ce823b849f557027f925ca7b2c3a4a0d485aac5c7a3d3fbccc68e0fa9d4c1579ed6cacefa39ef91a2eca59817c813fd900336cbdb7d86f46a46d782478a043515e8bae90163990e67ee06d6f8503a2af3c45e337542dae3e27fd7ed29bb7135a3b9621a7a4bdd806b90066b0856f89a4951738c2ae7b98119515351fa00659ec34"}) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:40 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380300, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:40 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:40 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xab00, 0x8080fffffffe) 04:11:40 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40841, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0x1, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000000)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x33}}, {0x6, @broadcast}, 0x14, {0x2, 0x4e21, @loopback}, 'veth0_to_bond\x00'}) 04:11:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x20000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000380)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x7, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x500, 0x0, 0x0) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000040)=0x2257) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) [ 1740.820299][T25310] BPF:Unsupported section found [ 1740.841351][T25310] BPF:Unsupported section found 04:11:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000280)=0x9, 0x4) r1 = getpid() r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) ioctl$sock_ifreq(r3, 0x8918, &(0x7f0000000080)={'rose0\x00', @ifru_mtu=0x3}) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r4, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x4) 04:11:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) ioctl$KDENABIO(r3, 0x4b36) 04:11:40 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x6c00, 0x8080fffffffe) 04:11:40 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x51, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:40 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xb400, 0x8080fffffffe) 04:11:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x401, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) [ 1741.229666][T25434] BPF:Section overlap found [ 1741.235162][T25434] BPF:Section overlap found 04:11:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x6300, 0x8080fffffffe) 04:11:41 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") socket$inet_dccp(0x2, 0x6, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) syz_open_procfs(r1, &(0x7f0000000000)='net/l2cap\x00') r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_QUERYCTRL(r2, 0xc0445624, &(0x7f0000000040)={0x7f, 0x5, "9e1f472413becd6159308313b4a592e357cbe01b32d7613acc63b64c7fb10ed9", 0x2, 0x8001, 0x5, 0x5, 0x4}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r4, 0x0) getsockopt$inet_buf(r4, 0x0, 0x30, 0x0, 0x0) 04:11:41 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380301, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:41 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:41 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xbd00, 0x8080fffffffe) 04:11:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x24, 0x0, 0x0) [ 1741.795938][T25664] BPF:Total section length too long [ 1741.816532][T25664] BPF:Total section length too long 04:11:41 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0xb, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x10802) fsconfig$FSCONFIG_SET_BINARY(r1, 0x2, &(0x7f0000000040)='\x00', &(0x7f0000000080), 0x0) [ 1741.940726][T25781] BPF:Section overlap found [ 1741.946167][T25781] BPF:Section overlap found 04:11:41 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x51, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000040)={0x2, 0x80000001, {0xffffffffffffffff}, {0xee01}, 0x3, 0x1}) syz_open_procfs(r3, &(0x7f0000000080)='net/ip6_mr_vif\x00') 04:11:41 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xc000, 0x8080fffffffe) 04:11:41 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x7ff, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) [ 1742.173709][T25895] BPF:Unsupported section found [ 1742.179268][T25895] BPF:Unsupported section found 04:11:42 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x98, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1742.411374][T26012] BPF:Invalid section offset [ 1742.416900][T26012] BPF:Invalid section offset [ 1742.444808][T26056] BPF:Unsupported section found 04:11:42 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x3803e8, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x400, 0x0) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x400) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r3, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x0, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r3, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={r3, 0xf801}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000200)={r3, 0x2fe, 0x8}, 0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000040)={r3, 0x1, 0x3, [0x3ff, 0x9, 0x7]}, &(0x7f0000000080)=0xe) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:42 executing program 4: socket$netlink(0x10, 0x3, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r0 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(r0, &(0x7f0000000380)='./file1/file0\x00', 0x0) renameat2(r0, &(0x7f0000000000)='./file1/file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x2) ioctl(r0, 0xbffffffe, &(0x7f00000001c0)="0000000000400000ecff00") r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$nfc_raw(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x1, 0x1, 0x6}, 0x10) socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_buf(r1, 0x0, 0x2e, 0x0, 0x0) 04:11:42 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x2, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:42 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xc300, 0x8080fffffffe) 04:11:42 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:42 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000080)={r3, 0x1}) 04:11:42 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xc600, 0x8080fffffffe) [ 1742.832436][T26240] BPF:Unsupported section found [ 1742.835691][T26242] BPF:Unsupported section found [ 1742.838329][T26240] BPF:Unsupported section found 04:11:42 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x6, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, &(0x7f0000000040)={0x7}) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x109001, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f00000000c0)={0x36, 0x7fffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) accept$unix(r3, &(0x7f0000000180), &(0x7f0000000200)=0x6e) 04:11:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket$inet(0x2, 0x2, 0x1) r3 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x400) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r4, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x0, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r4, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={r4, 0xf801}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000200)={r4, 0x2fe, 0x8}, 0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000000)={r4, 0x10001}, &(0x7f0000000040)=0x8) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r6, 0xffffffffffffffff, r7, 0x0) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) r10 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r10, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(r10, &(0x7f0000000380)='./file1/file0\x00', 0x0) renameat2(r10, &(0x7f0000000000)='./file1/file0\x00', r10, &(0x7f00000001c0)='./file0\x00', 0x2) ioctl$VIDIOC_QBUF(r7, 0xc058560f, &(0x7f0000000a80)={0x5, 0xa, 0x4, 0x1000, 0x10001, {r8, r9/1000+30000}, {0x5, 0x8, 0x6, 0x1f, 0x7f, 0x80, "e02cd793"}, 0x1, 0x2, @offset=0x6, 0x6, 0x0, r10}) sendmsg$NFT_MSG_GETTABLE(r11, &(0x7f0000000bc0)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x14, 0x1, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x9}}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x20000004) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000080)={r5, @in6={{0xa, 0x4e22, 0x7f, @mcast1, 0x7d31}}}, 0x84) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) r12 = getpid() sched_setscheduler(r12, 0x5, &(0x7f0000000380)) r13 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r12, 0xffffffffffffffff, r13, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r13, 0x12, 0x2, &(0x7f0000000480)=""/197, &(0x7f0000000180)=0xc5) 04:11:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) write$cgroup_int(r2, &(0x7f0000000000)=0x7, 0x12) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r3, 0x0, 0x0, 0x0, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r4, 0xffffffffffffffff, r5, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r5, 0x0, 0x2d, &(0x7f0000000040)={0x21b, {{0x2, 0x6e20, @empty}}}, 0x88) [ 1743.099613][T26364] BPF:Total section length too long 04:11:43 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380500, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:43 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xc900, 0x8080fffffffe) 04:11:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x2f, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f0000000000)=0x4) 04:11:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket$inet(0x2, 0x2, 0x1) r3 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x400) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r4, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x0, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r4, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={r4, 0xf801}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000200)={r4, 0x2fe, 0x8}, 0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000000)={r4, 0x10001}, &(0x7f0000000040)=0x8) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r6, 0xffffffffffffffff, r7, 0x0) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) r10 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r10, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(r10, &(0x7f0000000380)='./file1/file0\x00', 0x0) renameat2(r10, &(0x7f0000000000)='./file1/file0\x00', r10, &(0x7f00000001c0)='./file0\x00', 0x2) ioctl$VIDIOC_QBUF(r7, 0xc058560f, &(0x7f0000000a80)={0x5, 0xa, 0x4, 0x1000, 0x10001, {r8, r9/1000+30000}, {0x5, 0x8, 0x6, 0x1f, 0x7f, 0x80, "e02cd793"}, 0x1, 0x2, @offset=0x6, 0x6, 0x0, r10}) sendmsg$NFT_MSG_GETTABLE(r11, &(0x7f0000000bc0)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x14, 0x1, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x9}}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x20000004) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000080)={r5, @in6={{0xa, 0x4e22, 0x7f, @mcast1, 0x7d31}}}, 0x84) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) r12 = getpid() sched_setscheduler(r12, 0x5, &(0x7f0000000380)) r13 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r12, 0xffffffffffffffff, r13, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r13, 0x12, 0x2, &(0x7f0000000480)=""/197, &(0x7f0000000180)=0xc5) 04:11:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000280)=0xb, 0x4) 04:11:43 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x9, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000380)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x400) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r3, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x0, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r3, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={r3, 0xf801}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000200)={r3, 0x2fe, 0x8}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000003c0)={r3, 0x20}, 0x8) setsockopt$inet6_tcp_int(r0, 0x6, 0x18, &(0x7f0000000280)=0xcdf, 0x4) [ 1743.865415][T26584] BPF:Total section length too long [ 1743.877408][T26584] BPF:Total section length too long 04:11:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xc600, 0x8080fffffffe) 04:11:43 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x3b, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:43 executing program 4: openat$audio1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio1\x00', 0x319000, 0x0) r0 = socket$netlink(0x10, 0x3, 0x15) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x64000, 0x0) pidfd_send_signal(r1, 0x24, &(0x7f0000000080)={0x24, 0xffff}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) getsockopt$inet_buf(r3, 0x0, 0x0, 0x0, 0x0) 04:11:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x1200, 0x8080fffffffe) 04:11:43 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xcc00, 0x8080fffffffe) [ 1744.242010][T26709] BPF:Total section length too long [ 1744.266705][T26709] BPF:Total section length too long 04:11:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380600, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) r4 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dri/renderD128\x00', 0x102, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r4, 0x80386433, &(0x7f0000000400)=""/221) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r5) sched_setattr(r2, &(0x7f00000001c0)={0x38, 0x5, 0x0, 0xffffffd2, 0x3, 0x3, 0xd7, 0xff, 0xffff, 0x8}, 0x0) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r7, 0xffffffffffffffff, r8, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r8, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, 0x3f7, 0x20, 0x70bd25, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r6, 0x0) recvfrom$rxrpc(r6, &(0x7f00000000c0)=""/190, 0xbe, 0x20002040, &(0x7f0000000180)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x12}, 0x7fff}}, 0x24) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x20000, 0x0) ppoll(&(0x7f0000000000)=[{r9, 0xa4c7}, {r0, 0x2}, {0xffffffffffffffff, 0xa203}], 0x3, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)={[0xc4a1]}, 0x8) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:44 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x7ffffffd, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x444000, 0x0) r3 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x400) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r4, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x0, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x400, 0x0, 0x25dfdbfb, {}, [""]}, 0x1c}}, 0x20000010) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r5, 0x100, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r4, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={r4, 0xf801}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000200)={r4, 0x2fe, 0x8}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000040)={r4, 0x1ff}, 0x8) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) 04:11:44 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xfd, 0x8080fffffffe) 04:11:44 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xcf00, 0x8080fffffffe) [ 1744.791747][T26937] BPF:Total section length too long [ 1744.821267][T26937] BPF:Total section length too long 04:11:44 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000040), 0x2) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0xffffffffffff7656, &(0x7f0000000000)="080db500000000e847a07104ddc3a56fe48fd2775adc037500cc65bb81") socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r3, 0x0, 0x0, 0x0, 0x0) 04:11:44 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:44 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xd200, 0x8080fffffffe) 04:11:44 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe1, 0x8080fffffffe) 04:11:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x600000, 0x0) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x400) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r3, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x0, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)=ANY=[@ANYRES32=r3, @ANYBLOB="5700000081a3a51b1c30e8e0ae2ede5285251f147fa8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8605bd1b57afc02d1528c5c8328"], &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={r3, 0xf801}, &(0x7f0000000140)=0x8) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r4, 0xffffffffffffffff, r5, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xe9, "32620e2fc5bd5fc93ef2f7b5025b3ad37a8f8d51dd7e87f1adf52d9eac8777055f70481678ceab0708bcfd8cef2dafd7a8600d5b5ce445e8334f530c4517401fb573707ade56748fc1eb3eb87859319de2c595098b69cc419022691a2b4c930294fad1166e7a2698a5351421819e8e3896a569105f366fa1e103d3dc70f716babf9b60d08753ff2401be4c00aa8c15b3436ed5385ccab24b66f341bc0adf7885ab07a5e8b610e1de8ddae3c8ddaf9e9378cac45a55541797d83b6a82dc683a026806c24c5dc4f91b01ddad4b1001d33553b4375836add3f20cea962c4926e6b3d74cf262910319256e"}, &(0x7f0000000180)=0xf1) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000200)={r3, 0x2fe, 0x8}, 0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000040)={r3, 0x6, 0x3, [0x2, 0x0, 0x6]}, &(0x7f0000000080)=0xe) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001340)='/dev/vsock\x00', 0x200040, 0x0) ioctl$IMGETDEVINFO(r6, 0x80044944, &(0x7f0000001380)={0x6}) r7 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r7, 0x0, 0x0, 0x0, 0x0) [ 1745.319482][T27063] BPF: (anon) type_id=2 bits_offset=0 [ 1745.354896][T27063] BPF: [ 1745.371177][T27063] BPF:Invalid member [ 1745.391987][T27063] BPF: [ 1745.391987][T27063] 04:11:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) 04:11:45 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380700, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0xe, &(0x7f0000000400)=""/214, &(0x7f0000000200)=0xd6) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r4, 0x0) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, &(0x7f00000000c0), &(0x7f0000000140)=0xc) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r7}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', r7}) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) r9 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r8, 0xffffffffffffffff, r9, 0x0) ioctl$EXT4_IOC_SETFLAGS(r9, 0x40086602, &(0x7f0000000180)=0x1) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) 04:11:45 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x2, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:45 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xd500, 0x8080fffffffe) 04:11:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xd5, 0x8080fffffffe) [ 1746.003385][T27296] BPF:[1] UNION [ 1746.054743][T27296] BPF:size=0 vlen=1 [ 1746.081049][T27296] BPF: [ 1746.132255][T27296] BPF:Invalid name [ 1746.169762][T27296] BPF: [ 1746.169762][T27296] 04:11:46 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xd800, 0x8080fffffffe) 04:11:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x2, 0x1, &(0x7f0000000280)=@raw=[@jmp={0x5, 0x1, 0x5, 0x0, 0x4, 0x20, 0x4}], &(0x7f00000002c0)='GPL\x00', 0x70, 0xbb, &(0x7f0000000300)=""/187, 0x41100, 0x4, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0x10, 0x10000, 0x80}, 0x10}, 0x78) fstat(r2, &(0x7f0000000500)) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) r3 = getpid() r4 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x81, 0x10000) sync_file_range(r4, 0x10000, 0x5, 0x4) sched_setscheduler(r3, 0x1, &(0x7f0000000140)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) r6 = getpid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x1000, 0x6}, 0x0, 0x0, 0xfffffffe, 0x3, 0xffffffffffffffff, 0xfffffffe}, r6, 0xffffffffffffffff, r5, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000080)={0xa00000, 0x7a, 0xb43e, r5, 0x0, &(0x7f0000000040)={0x990af5, 0x3f, [], @p_u32=&(0x7f0000000000)=0x8}}) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) getsockopt$inet_int(r7, 0x0, 0x5, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 04:11:46 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x3, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:46 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xcf, 0x8080fffffffe) 04:11:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x121000) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000040)) [ 1746.617388][T27421] BPF:[1] UNION [ 1746.626988][T27421] BPF:size=0 vlen=1 [ 1746.710624][T27421] BPF: [ 1746.748794][T27421] BPF:Invalid name 04:11:46 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xbd, 0x8080fffffffe) [ 1746.770285][T27421] BPF: [ 1746.770285][T27421] 04:11:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) getsockopt$inet_buf(r1, 0x0, 0x21, 0x0, 0x0) 04:11:46 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380900, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:46 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xdb00, 0x8080fffffffe) 04:11:46 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x4, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x18880, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000080)={0x0, @remote, @multicast1}, &(0x7f00000000c0)=0xc) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$inet_dccp(0x2, 0x6, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x8480) getsockopt$inet_buf(r2, 0x0, 0x25, 0x0, 0x0) [ 1747.149547][T27648] BPF:[1] UNION [ 1747.218479][T27648] BPF:size=0 vlen=1 04:11:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000040)=ANY=[@ANYBLOB="17985c7387"]) r2 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r2, 0x0, 0x0, 0x0, 0x0) [ 1747.253322][T27648] BPF: [ 1747.269615][T27648] BPF:Invalid name [ 1747.306884][T27648] BPF: [ 1747.306884][T27648] 04:11:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xbd, 0x8080fffffffe) 04:11:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) 04:11:47 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xde00, 0x8080fffffffe) 04:11:47 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x5, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1747.625361][T27775] BPF:[1] Invalid name_offset:5 [ 1747.631785][T27775] BPF:[1] Invalid name_offset:5 04:11:47 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x6, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") socket$inet_dccp(0x2, 0x6, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0x5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r6 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r6, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getpeername$packet(r8, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r6, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r9}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r5, 0x400, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x6}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r9}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x8040}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_buf(r2, 0x0, 0x2e, 0x0, 0x0) 04:11:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x13) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) [ 1747.842023][T27885] BPF:[1] Invalid name_offset:6 [ 1747.851301][T27885] BPF:[1] Invalid name_offset:6 04:11:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380a00, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:47 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe100, 0x8080fffffffe) 04:11:47 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x7, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1748.088396][T28101] BPF:[1] Invalid name_offset:7 [ 1748.110227][T28101] BPF:[1] Invalid name_offset:7 04:11:48 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x8, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x770000, 0x0, 0x0) 04:11:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket(0xb, 0x1, 0x3) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_delroute={0x44, 0x19, 0x800, 0x70bd25, 0x25dfdbfe, {0x2, 0x10, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x8, 0x1800}, [@RTA_DST={0x8, 0x1, @broadcast}, @RTA_FLOW={0x8, 0xb, 0x87a}, @RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @typed={0x14, 0x66, 0x0, 0x0, @ipv6=@rand_addr="25886804d9ad19e9a3d60162dd53b8fa"}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) r2 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x104c0, 0x0) write$tun(r3, &(0x7f0000000040)={@void, @val={0x7, 0x4, 0x4de, 0xbee8, 0x3ff, 0xfddb}, @mpls={[{0x7}, {0xfa, 0x0, 0x1}], @ipv4=@icmp={{0x34, 0x4, 0x0, 0x6, 0x12d, 0x68, 0x0, 0x7, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, {[@generic={0x89, 0xa, "1fece4cd66831015"}, @noop, @timestamp_prespec={0x44, 0xc, 0x88, 0x3, 0x5, [{@rand_addr=0x5, 0x9fb1}]}, @ssrr={0x89, 0x27, 0x60, [@broadcast, @local, @rand_addr=0x3, @rand_addr=0x12, @broadcast, @broadcast, @rand_addr=0x2, @remote, @rand_addr=0x4]}, @noop, @generic={0x83, 0xe, "233f181f8d2b0ad36ff2eb18"}, @timestamp_prespec={0x44, 0x1c, 0x90, 0x3, 0x7, [{@broadcast, 0x1}, {@loopback, 0x6}, {@dev={0xac, 0x14, 0x14, 0xd}, 0xff}]}, @noop, @timestamp_addr={0x44, 0xc, 0x3d, 0x1, 0x5, [{@dev={0xac, 0x14, 0x14, 0x2d}, 0xfff}]}, @timestamp_addr={0x44, 0x44, 0xb3, 0x1, 0x6, [{@dev={0xac, 0x14, 0x14, 0x3e}, 0x57cc}, {@multicast2, 0xffffff0a}, {@remote, 0x800}, {@broadcast}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x7579277a}, {@remote, 0x4}, {@multicast1, 0xfff}, {@multicast1, 0x80}]}]}}, @dest_unreach={0x3, 0xf, 0x0, 0x0, 0xfd, 0x9, {0x14, 0x4, 0x2, 0x2b, 0xd2f8, 0x67, 0x8000, 0x8, 0x29, 0x9, @loopback, @multicast2, {[@rr={0x7, 0xf, 0x7c, [@multicast1, @local, @rand_addr=0x1]}, @timestamp_addr={0x44, 0x2c, 0x60, 0x1, 0x0, [{@broadcast, 0x8}, {@empty, 0x7f}, {@dev={0xac, 0x14, 0x14, 0x3f}, 0x4}, {@dev={0xac, 0x14, 0x14, 0x27}, 0xa4}, {@remote, 0x8001}]}]}}, "2b5e00c4b5"}}}}, 0x13f) [ 1748.236820][T28209] BPF:[1] Invalid name_offset:8 [ 1748.288563][T28209] BPF:[1] Invalid name_offset:8 04:11:48 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe200, 0x8080fffffffe) 04:11:48 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0xa, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000080)='SMC_PNETID\x00') sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="00012dbd7008fcdbdf25030000000500040002006b64"], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r4, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r5, 0xffffffffffffffff, r6, 0x0) setsockopt$CAIFSO_REQ_PARAM(r6, 0x116, 0x80, &(0x7f0000000400)="c70a2a8f092d094627fd3b76a49d891f2d4cb7a9c576a77106a4fc7535071b4a381d4beb82cd4d65ad5164f350179ad78028d127dff7cbf5b126fe071acd27ef6c9ac958352d90119b1174e4f7d44b576476d3026b0ae14c3184ec1afa8d82", 0x5f) write$sndseq(r6, &(0x7f0000000280)=[{0x45, 0x2, 0x6, 0x8, @time={0x8, 0x7fff}, {0x80}, {0x22, 0x2}, @quote={{0x1f, 0x9d}, 0x101}}, {0x2, 0xc4, 0xff, 0x1, @time={0x1ff, 0xfffff001}, {0x7f, 0x8}, {0x2, 0x7}, @time=@tick=0x7ff}, {0x9, 0x3, 0x1b, 0x9, @tick=0xff, {0x83, 0x6}, {0x81, 0x9}, @raw8={"9d570ce579b346a597bb0a7c"}}, {0xfe, 0x2, 0x1, 0x3f, @tick=0x7, {0x1f, 0x3f}, {0x9}, @ext={0x7e, &(0x7f0000000200)="5c8910285cf26d2d671bcc1f8b01ad56f03394b5b2db1061a99ff24675cf5c9cb9653dbf52cd4ce83acbc612875684732faf57d68e772b8f86ad224ed2968f647bb0b270212f4d7b3d19b9cef84d3dfaee6bf434fa03ffad9069ecfcd862a36b1163e7c8539d199595f382b306635577c238d9766251c0762ce8420395e3"}}, {0x7f, 0x4, 0x1, 0x1f, @time={0xe9, 0x6}, {0x3, 0x7}, {0x76}, @addr={0x8, 0x79}}, {0x1, 0x1f, 0xf7, 0x10, @tick=0x99aa, {0x2, 0x40}, {0x2c, 0x1f}, @raw8={"e8031c1fe602f804dc3bcb68"}}, {0x8, 0x7, 0xff, 0x20, @tick=0x80000000, {0xd1, 0x4}, {0x4, 0x7}, @note={0x7, 0x9, 0x80, 0xff, 0x80}}], 0xc4) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000009, 0x40010, r4, 0xb7baf000) getsockopt$inet_buf(r2, 0x0, 0x0, 0x0, 0x0) [ 1748.507844][T28323] BPF:[1] Invalid name_offset:10 [ 1748.543132][T28323] BPF:[1] Invalid name_offset:10 04:11:48 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x0, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) 04:11:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xcb48, 0x9, &(0x7f0000001580)=[{&(0x7f0000000140)="e6f5a041d75f647649a058637cbfa16a1d0444740829ea82161bdbf8afbfcc8dd5fbe64ecbd74385f6960815e2beb9c679f73841a9a4ea8624c5ae8ea5289f4477784daaaf61823089353e9b00e3f66fdf57214658ebc726b699a4d0", 0x5c, 0x7a6}, {&(0x7f0000000200)="63ec8ee4862ded8e09ac3ee2ebf24f12ce83d2aae31f89f5b71d26c04ec3f47b117dbc059f6bd7a9386e730bd24057ee5cec9f84f6aeb07238192b53faa937caa10fabc2161153fa88fc23fa83b4924b8af14a01755a34e5ae801f4b4515bc92e4a095cc58e3bdfafe98e9d78863e6af3f2c", 0x72, 0x100000000}, {&(0x7f0000000280)="4f707150bbf0c0954c91fc8419b2f98646cbbc9546001d02a2cd91d0fbf8bb9e35c539e2996a1924f02e16874d27346e15de87b215d67f6ced7ce3b14f61797f0d6a7a67f562cc65b0fd0a96da6615f07b799cccf90a033a6a52841cd840c4b81da995a2daa5b31163cf7e8fb7d63dfd5dd166bbddca2c461bb2d06f0aed16cbfd67c83362356e6052fb", 0x8a, 0x1}, {&(0x7f0000000340)="9079ae2f5509d8005c35bd7549e33483f75d834d8dc994014308c2a973c88fc5e08569c7925c7bb61424c811abffb7f9d61efe04dafd1641086f145d0b005570b228", 0x42, 0x1}, {&(0x7f00000003c0)="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", 0x1000, 0x1f}, {&(0x7f00000013c0)="fad2e0e9ca3890c9c9b3a3c30c7b085603998a224eadfb18616c5b9aaecfd31ee09d7bd243866ad7c96cf79826a8acee9d4863923c96f498a8cc2345892d3f334e1291f02ca1380a1c28", 0x4a, 0x8}, {&(0x7f0000001440)="3a46f317aefecf3c2aa185a72fea87fa65c2ab1e34047b9009d399485571cb26826aebbc77caa004d325a7272be68fb312bab77f6e0fdac519ea5b2ca58a259cbe3e27cc93f7afdba2bd23e72a760c69445e", 0x52, 0x2}, {&(0x7f00000014c0)="9fc88f094bf42cddc1c34382825f37acab555d27646d98095a1fa67d16589e76cc6b2e2a3b906f5309b07b24dfe8c65ae854a8cf6d539feeb77e46a81d3908832c2a3a458a8df52f5af8", 0x4a, 0xfffffffffffffa6b}, {&(0x7f0000001540)="069383461025442e09aecec2a949dee115f591fc77fdd5b71804c794a427c96de425070d7d042ba816", 0x29, 0x200}], 0x200080, &(0x7f0000001780)=ANY=[@ANYBLOB='dots,nodots,usefree,euid<', @ANYRESDEC=r3, @ANYBLOB=',euid=', @ANYRESDEC=r5, @ANYBLOB="0000633b40557aadcf6884695c8af283b2f7362d634fcea51ccb2d0d62a7e66b4095f77181e6807a6aaec3f1edc5392e318b497abafdbdb5a4117b7834633490fe58944721785ca78b23b061759161b5c9406a32531a34d216960efa27744ab733ba69fab061dd043bfedacc7338bee5b7d08b828781dc93138970312c7a23"]) 04:11:48 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x48, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380e00, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:48 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe400, 0x8080fffffffe) 04:11:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x0, 0xe, &(0x7f0000000040), &(0x7f0000000200)=0x4) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="28000000f70301002bbd7000fbdbdf2507000000070000002e2f66696c65302e2f66696c6530000015fbe0abab29de4cae55b57805369157bda806b529a8f1f3f00fa8ef656b10a1099610a46fdf6040c543eb98553053b8ef03310b9919ec64229d3290f18841076a3f41a2dc58d6197700f04d5095aa355bb0b78c37cc913b4ce1472252d913668610236c8f63d2e2c3180dff521a2192327c5c574d91058e6d8142eb2f1335fe520c7ec6ed92d7e552962f4f03"], 0x28}, 0x1, 0x0, 0x0, 0x41}, 0xc0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) gettid() 04:11:48 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x4c, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x48, 0x8080fffffffe) [ 1749.058126][T28658] BPF:[1] Invalid name_offset:76 04:11:48 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe500, 0x8080fffffffe) [ 1749.133006][T28658] BPF:[1] Invalid name_offset:76 04:11:49 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x51, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0, &(0x7f0000000080)) write$FUSE_ATTR(r2, &(0x7f00000000c0)={0x78, 0x0, 0x8, {0x4, 0xe36, 0x0, {0x5, 0x2, 0x5, 0x6, 0x2, 0x0, 0x8c2b, 0x80, 0x81, 0x3f, 0x7, 0xee00, r4, 0x7fffffff, 0x1}}}, 0x78) r5 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r5, 0x0, 0x0, 0x0, 0x0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r6, 0xffffffffffffffff, r7, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r8, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) getpeername$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) r12 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r12, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getpeername$packet(r14, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r12, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r15}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) r16 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r17) write$P9_RGETATTR(r10, &(0x7f0000000280)={0xa0, 0x19, 0x2, {0x710, {0x8, 0x0, 0x1}, 0x0, r17, r3, 0x401, 0x401, 0x2, 0x3, 0x1, 0x5, 0x8000, 0x100, 0x61, 0x10001, 0x4, 0x6, 0x9, 0x7, 0x1}}, 0xa0) sendmmsg(0xffffffffffffffff, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x2, r15, 0x4000}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) sendmsg$TCPDIAG_GETSOCK(r7, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="c0010000120028052bbd7000fedbdf251f0306324e204e2000f30b008000000000007f000050de00100000040006000000d58cbbff9215d907343f4fb3987219181615fbe80c22f89325692a47662473d6148901ff0144a5949bd1d1a43c4649b153b85dfabc8371f75d374cec6df065d624ff8bdc836ae464216d7b59450f960b3c8a27c874dbff90fa75c11b92f6c4cd1fbae8ae6e5319f8b72bc469c80b", @ANYRES32=r11, @ANYBLOB="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"], 0x1c0}, 0x1, 0x0, 0x0, 0x4008804}, 0x4048009) [ 1749.399154][T28780] BPF:[1] Invalid name_offset:81 04:11:49 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe700, 0x8080fffffffe) 04:11:49 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x60, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:49 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe500, 0x8080fffffffe) [ 1749.622343][T28891] BPF:[1] Invalid name_offset:96 [ 1749.656549][T28891] BPF:[1] Invalid name_offset:96 04:11:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5f, 0x2) ioctl$VFIO_IOMMU_UNMAP_DMA(r1, 0x3b72, &(0x7f0000000040)={0x18, 0x3, 0x2, 0x3}) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r2, 0x0, 0x0, 0x0, 0x0) 04:11:49 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380f00, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:49 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe800, 0x8080fffffffe) 04:11:49 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x68, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r2, 0x200, 0x70bd28, 0x25dfdbff, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xe8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xff}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x40}]}, 0x50}, 0x1, 0x0, 0x0, 0x804}, 0x5) [ 1750.124185][T29113] BPF:[1] Invalid name_offset:104 04:11:49 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x2d, 0x8080fffffffe) [ 1750.228103][T29113] BPF:[1] Invalid name_offset:104 04:11:50 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xea00, 0x8080fffffffe) 04:11:50 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x6c, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getpeername$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x10) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x400) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r3, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x0, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r3, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={r3, 0xf801}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000200)={r3, 0x2fe, 0x8}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={r3, 0x2, 0x10}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100)={r4, 0x200}, &(0x7f0000000140)=0x8) [ 1750.594365][T29232] BPF:[1] Invalid name_offset:108 04:11:50 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x12, 0x8080fffffffe) 04:11:50 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x74, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) ioctl$VFIO_GET_API_VERSION(r3, 0x3b64) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000000)={&(0x7f0000ffc000/0x3000)=nil, 0x0, 0x3, 0x81, &(0x7f0000ffc000/0x4000)=nil, 0x768}) r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r4, 0x0, 0x0, 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x406, 0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r6, 0xffffffffffffffff, r7, 0x0) ioctl$SNDRV_PCM_IOCTL_LINK(r7, 0x40044160, &(0x7f00000000c0)=0x7) getsockopt$IPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) [ 1750.914264][T29349] BPF:[1] Invalid name_offset:116 [ 1750.926940][T29349] BPF:[1] Invalid name_offset:116 04:11:50 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xeb00, 0x8080fffffffe) 04:11:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x381100, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="010a00000006000000001ff82d0cd7c0e333ed3744f67ef3bf603a639b8419ae25f4fa37f11bb6e7f7c1064c4eb1f822b785ae3a8712fd53e1f105d11aa97ebf7427875dba952571720b48b00d5f4e924039b5c917760cf98b7809073c74c981a32644f3a5bf2da31e9b397383c56c10890e959b4c2cb4e27da52ff4a3bdca579e41526863239bb0445fa88f4f30e2e4070a8be4dcc990194f86bfe681273b87a876172c08803c389c81f89b733c9ef31be66286a0516dcd759f701d36"], 0x14}}, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r5, 0xffffffffffffffff, r6, 0x0) ioctl$sock_ifreq(r6, 0x8970, &(0x7f0000004940)={'netpci0\x00', @ifru_addrs=@xdp={0x2c, 0xb, 0x0, 0x19}}) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000004a00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000049c0)={&(0x7f0000004980)={0x40, r4, 0x800, 0x70bd2c, 0x25dfdbff, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x6}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1a, 0x4}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0xffffffffffffffff}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4044840}, 0x240408c0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8471b97") r8 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r8, 0x0, 0x0, 0x0, 0x0) 04:11:51 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x7a, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:51 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x8080fffffffe) [ 1751.322027][T29571] BPF:[1] Invalid name_offset:122 04:11:51 executing program 4: r0 = getpid() r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000080)) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r4, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="080db52449e82fa071a937a34966a843387daefb5d0823c250ddc43db3b9751c58e3ac1b7dc939a74cf6c625a0b4d49f112a02415524826796738a1a08de87209671c5ba9e14d18133d2e5007d4918a38a92") accept4(r2, &(0x7f0000000180)=@in={0x2, 0x0, @remote}, &(0x7f0000000200)=0x80, 0x40800) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r5, 0xffffffffffffffff, r6, 0x0) ioctl$TUNSETTXFILTER(r6, 0x400454d1, &(0x7f0000000140)={0x1, 0x3, [@empty, @empty, @empty]}) socket$key(0xf, 0x3, 0x2) r7 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r7, 0x0, 0x0, 0x0, 0x0) ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000240)) restart_syscall() 04:11:51 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0xec, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:51 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xee00, 0x8080fffffffe) 04:11:51 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055ea071f0fdfcbb1c3317a0dcdcbe7c339a691bac23199a2de069dc4b775db31be0577071de9dfc18d7613fe9378fa8b3ba18c938e0a72089f740dc5a7d02395ce0cf82dc5cca66bcfbcc76dbaad16f4ea76f83c52743e261ac717757fc043b6d9a2a4e2602bab86dae5dc82ec5719f3d0ed26514959da2b9af5b01c5b07a716ddd9f573a2de5850b896111915ceb69998f0bd2e1279716e958ff6a5886295919a8add162aafd9664c56fb389b31b96f4d579769cb6979d9314db584e5228e6ecd50a0dc46f3c25f2524ac6f9246c1b4372eda4f58da348e1badc1ec07208c3c9828b728d4311cd1846027b989aa07935af90eac16537ac76ee1fdcddadc95520ea044805639040fb93043346b00cc6faf264d54d47c63b95f71aa5e432d154897148fdf9af19be8265f6cfe23b30db2080f653a010ba4725d4044d3f0a32c40bdadcf48f2fb8c1b106132c259b37dd1e7cea6176ca5cf7ac572276521bce52135e") r2 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r2, 0x0, 0x0, 0x0, 0x0) 04:11:51 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xf0ff, 0x8080fffffffe) [ 1751.896753][T29690] BPF:[1] Invalid name_offset:236 04:11:51 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x300, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS64(r2, 0x80984120, &(0x7f0000000040)) [ 1752.165520][T29801] BPF:[1] Invalid name_offset:768 [ 1752.179523][T29801] BPF:[1] Invalid name_offset:768 04:11:52 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x500, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1752.310253][T29980] BPF:[1] Invalid name_offset:1280 [ 1752.322976][T29980] BPF:[1] Invalid name_offset:1280 04:11:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x381802, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x8080fffffffe) 04:11:52 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x600, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:52 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xf100, 0x8080fffffffe) [ 1752.617823][T30120] BPF:[1] Invalid name_offset:1536 04:11:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x6, 0x400) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) socket(0x200000000000011, 0x3, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r4, 0xffffffffffffffff, r5, 0x0) setsockopt$packet_int(r5, 0x107, 0xb, &(0x7f0000000100)=0x734, 0x3) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') pipe(&(0x7f00000003c0)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) pipe(&(0x7f0000000000)) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x80000002, 0x0) creat(&(0x7f0000000300)='./file1\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/cpuinfo\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) 04:11:52 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x700, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:52 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xf400, 0x8080fffffffe) [ 1752.948579][T30239] BPF:[1] Invalid name_offset:1792 [ 1752.972749][T30239] BPF:[1] Invalid name_offset:1792 04:11:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 04:11:52 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0xa00, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1753.179169][T30350] BPF:[1] Invalid name_offset:2560 [ 1753.185937][T30350] BPF:[1] Invalid name_offset:2560 04:11:53 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x2000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) socketpair(0x4, 0x800, 0x40, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x800) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) [ 1753.436420][T30461] BPF:[1] Invalid name_offset:8192 04:11:53 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xf700, 0x8080fffffffe) 04:11:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x382000, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:53 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:53 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x4800, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000000)={0xf3, 0x5, 0x4, 0x2, 0x3, {0x0, 0x2710}, {0x5, 0x0, 0x20, 0x75, 0x1, 0x1f, "c843fb46"}, 0x6, 0x3, @offset=0x9, 0xad, 0x0, r0}) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r4, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r7}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r8, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) getpeername$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r8, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r11}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="01040004000c0001800880410009000000ce9bb117691a6ab92ab376f439c80000004d00", @ANYRES32=r7, @ANYBLOB="1400018008000100", @ANYRES32=0x0, @ANYBLOB="0800030001000000280001800800030002000000140002006970365f76746930000000000000000008000100", @ANYRES32=r11, @ANYBLOB="d75c38d481ddf57569548b90c7e8c9d4c001000000c4ddf381f1d3713d0f71e7d1b16ab8cecc65d0e2b9f3f187dea73ca996a88bc0c597af5e6997e72ed76e40f7a1298576d5bae4a5935a9b1c4ed852a408e9c10fc5b840a6ed643e6b95877a9d"], 0x5c}}, 0x20000000) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000080)={0x10}) r12 = socket$inet_dccp(0x2, 0x6, 0x0) r13 = getpid() sched_setscheduler(r13, 0x5, &(0x7f0000000380)) r14 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r13, 0xffffffffffffffff, r14, 0x0) r15 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r15, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = dup(r16) getpeername$packet(r17, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r15, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r18}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) bind$can_j1939(r14, &(0x7f0000000280)={0x1d, r18, 0x0, {0x1, 0xf0, 0x2}, 0xfe}, 0x18) getsockopt$inet_buf(r12, 0x0, 0x0, 0x0, 0x0) [ 1753.768334][T30677] BPF:[1] Invalid name_offset:18432 [ 1753.810807][T30677] BPF:[1] Invalid name_offset:18432 04:11:53 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x4c00, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:53 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xfa00, 0x8080fffffffe) 04:11:53 executing program 3 (fault-call:19 fault-nth:0): socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0) [ 1753.990600][T30793] BPF:[1] Invalid name_offset:19456 [ 1754.009948][T30793] BPF:[1] Invalid name_offset:19456 04:11:53 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x5100, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1754.162971][T30905] FAULT_INJECTION: forcing a failure. [ 1754.162971][T30905] name failslab, interval 1, probability 0, space 0, times 0 [ 1754.213228][T30909] BPF:[1] Invalid name_offset:20736 [ 1754.239028][T30909] BPF:[1] Invalid name_offset:20736 [ 1754.280061][T30905] CPU: 1 PID: 30905 Comm: syz-executor.3 Not tainted 5.6.0-rc1-syzkaller #0 [ 1754.288920][T30905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1754.299073][T30905] Call Trace: [ 1754.302423][T30905] dump_stack+0x11d/0x187 [ 1754.306830][T30905] should_fail.cold+0x5/0xf [ 1754.311362][T30905] __should_failslab+0x82/0xb0 [ 1754.316142][T30905] should_failslab+0x5/0xf [ 1754.320602][T30905] kmem_cache_alloc_node+0x35/0x680 [ 1754.325880][T30905] ? tomoyo_supervisor+0x170/0xc90 [ 1754.331077][T30905] __alloc_skb+0x8d/0x360 [ 1754.335430][T30905] alloc_skb_with_frags+0x8f/0x3e0 [ 1754.340615][T30905] ? ima_match_policy+0x643/0xac0 [ 1754.346738][T30905] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1754.352690][T30905] sock_alloc_send_pskb+0x4df/0x510 [ 1754.357938][T30905] ? __read_once_size+0x52/0x110 [ 1754.362894][T30905] ? __rcu_read_unlock+0x66/0x2f0 [ 1754.368047][T30905] packet_sendmsg+0x1751/0x3ac0 [ 1754.372925][T30905] ? aa_label_sk_perm+0x7e/0xd0 [ 1754.377793][T30905] ? aa_sk_perm+0x1cd/0x590 [ 1754.382307][T30905] ? tomoyo_socket_sendmsg_permission+0xb1/0x212 [ 1754.388656][T30905] ? aa_sock_msg_perm.isra.0+0x99/0x130 [ 1754.394227][T30905] ? packet_getsockopt+0x660/0x660 [ 1754.399358][T30905] sock_sendmsg+0x98/0xc0 [ 1754.403721][T30905] ____sys_sendmsg+0x207/0x4c0 [ 1754.408540][T30905] ___sys_sendmsg+0xb5/0x100 [ 1754.413144][T30905] ? __rcu_read_unlock+0x66/0x2f0 [ 1754.418177][T30905] ? __fget_files+0xa2/0x1c0 [ 1754.422795][T30905] __sys_sendmmsg+0x10e/0x310 [ 1754.427494][T30905] ? __sb_end_write+0xbc/0x100 [ 1754.432274][T30905] ? vfs_write+0x10b/0x380 [ 1754.436715][T30905] ? fput_many+0xe2/0x130 [ 1754.441054][T30905] ? fput+0x20/0x30 [ 1754.444944][T30905] __x64_sys_sendmmsg+0x60/0x80 [ 1754.449893][T30905] do_syscall_64+0xc7/0x390 [ 1754.454434][T30905] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1754.460406][T30905] RIP: 0033:0x45c479 [ 1754.464311][T30905] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1754.483948][T30905] RSP: 002b:00007f49db88ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1754.492371][T30905] RAX: ffffffffffffffda RBX: 00007f49db88f6d4 RCX: 000000000045c479 [ 1754.500351][T30905] RDX: 0000000000000001 RSI: 0000000020004f00 RDI: 0000000000000013 [ 1754.508333][T30905] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 1754.516312][T30905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 04:11:54 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xfd00, 0x8080fffffffe) 04:11:54 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x6000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1754.524305][T30905] R13: 00000000000008d2 R14: 00000000004cb36d R15: 0000000000000000 04:11:54 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = open$dir(&(0x7f0000000300)='./file1\x00', 0x3578c1, 0x0) mkdirat(r0, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(r0, &(0x7f0000000380)='./file1/file0\x00', 0x0) renameat2(r0, &(0x7f0000000000)='./file1/file0\x00', 0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x5) ioctl(r0, 0x6, &(0x7f00000001c0)="080db5055e0bcfe847a071") epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)={0x60000005}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0xa0080, 0x0) sendmmsg$alg(r1, &(0x7f00000048c0)=[{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="a0ef952eaa7df23915b772fe2f0478a0262ee471506bff3eff5e6e329476b293da397cb695c97d1e6043bd3067a23ea1a81e22feb919acf91422eacaf55544b83ee103b458e60647eaeee6f48c6ef7c3292878f1e33a5bcbfd3f3522cac59ae9b7a5526a28ab5319cd5e7e6dc7f51e67002354b118ac7a33a8ddb45f26053b1757d81826acd58f40f5bc473a178787d47748e7634426182a", 0x98}, {&(0x7f0000000200)="a3f516ef193918a75c3d73080a9bccd30a2909311716059ee615eaa6d379914d677e74d7aaecb1173a83a8197c9868d6c2505c317adaef27ef8c2ba8c430bb094a68fc0b17e191e2658cfa8ece3ca0732296ed81ae20b1d4b181047024b5faf2b9a9a43fec6e366e6da6385fa785039f183873d09cca9662ecd7d6706bfa00853c6eb01f313a928788245a63178e73458da660f7f378f9fd73fd41b6b3042fb8d1c6ecb4af72324ac29b6839067280dc8f335ffe732362375a79eb8f5fd320190ca2c9c4ba7077c5e3865609fcedd20e9d", 0xd1}, {&(0x7f0000000180)}, {&(0x7f00000003c0)="deaeeb69f3cf945807b4eaeaa663a298b3daad0a0f0d19fb239abb99e9d40054aebfc692dad6", 0x26}, {&(0x7f0000000400)="ce41b9dc3f5cc10f00c5c9da9758465a9e0c70f4c04966570b13aee4c9c374aeca8e73699b77dc289752037afe0ab80b6700b04384b7927315566fac0aaabb0855735b4862ee98a7e7f1294662b4be5522cf6aa652733186021bbd800fa81a40e4a4aeff31635129d5e22dff6268", 0x6e}, {&(0x7f0000000480)="5025780f9cfc1eb26399b19a6faae8dba75f550aeee57cd7", 0x18}, {&(0x7f00000004c0)="e806a8e8b66575116808f73328182a65c324132b35a064252a02b1317465c0af035097370ec8faff29491ca6e33e413ee88ae98ce36aacf79e63b890e2d76b25a516451f48111a6aeae854e9164f8594095b5c05a313eeb979", 0x59}], 0x7, &(0x7f00000005c0)=[@iv={0x80, 0x117, 0x2, 0x68, "87541252896e57298c4f81c4966df45a04232f03c518f0ff5127b5030906a6cddac5c5a695fb3c397c0667d4b3f23a2094d7d68e682563a759ac669cd180b667c7b22842e275c0acdb6abfcc8e4143cc3723dcbf18316c3bc89b5ccfb820ebe5b0a1c7f2f620dcfa"}, @assoc={0x18, 0x117, 0x4, 0x1bd}, @iv={0x30, 0x117, 0x2, 0x15, "86614a39bf83e06b1a8ec47523c71cdc7c246aedd5"}, @op={0x18}, @iv={0xa0, 0x117, 0x2, 0x88, "0178f3b67cf88d28cf64c0b436a15a7c164a03456d3938d8d930fa16d50802fe7189a310f250b3708cf3f9ea5cbf23a6f8a2639835c222221346dcd663b278d6e565fd4250e0b307e66d5fb8894c1c9ee8c3eb2a02c4573a48c235c5a468b848d61fa69b828df9314ba57d6fdd0e70b39c237da1e9ab040be1327201c6d9b52e1b8c83ca234f5b0b"}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x345b4611}], 0x1f8}, {0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="9fcb672b4f6dc0b1985ef182713927db3593e71a5cc987a242b3bf1a65fe959cee572cb46ec5424ce2940f42eed85e34d562f049a67d5751bc8a2b4d4b0ea08f8a93febb9ccb9cfddd697cd3a6526378b18d043b9553da51f59589650459bc096e42713c914d9089a1676254a5b322990ddcfedb895b5f66f1f9d005dbcbd0dfa655d9aa64e8d9f134dc60a7ee32c5b3d6505ceb4bb17c34192f461e85a4e0fad57388c7a0d1224009c067285cf2b1cbeb049e3d107d81dee5c5d0ed7e90", 0xbe}, {&(0x7f0000001880)="493cd65888ded582978262633eea4c593bee263638104464294ab8", 0x1b}], 0x3, &(0x7f0000001900)=[@iv={0x100, 0x117, 0x2, 0xea, "7109c8fa897bcf28564f688bdd846b3ed75d4f7a0afa16885eaa26f17197d6a46fa1e263897bd5b5404e88c3a990f295dd165c6d18ea7243d9ac0c4b64db4fd82cc3622e7e3fc9ab7e1190cf17e37dffdb77f20abe11a4ac7c977ea443e0bd16c646b395743a3d429e9dc94c5476fd1d1a231ab4a9c9ba688c74f79634975b6ddc1880526b7ff9066922fbd6b37a22c598e59d440cdbc8507cf96982dbe782365d9c803f8c0fadbfbc5a1ebcbfe739fba147fb9f177711aea1b1c60588202e1d3be53967cf451cb6dc444df4ad0450145a0100de0be4cf8537879890ed3f421376da1176fe5ff891f2d8"}, @iv={0xb8, 0x117, 0x2, 0x9d, "3fd8611ecbf299d694197ac3e180ad51558af4c7f343eb3f62612acaf3fb5d556d1e434df9475c9cacaab68c6283ce265940b9e1b1f7f53c35cb506c0a6a5b8c7e9c172b21ddb27b0a7918cb52284495ac22739e1b632c566b0a4ec8e6d7678b3463c64f9b377e08a30fd30fcc0bc655a9ee06d59d29347ddb08f850ba77aca90452b3445f7963192f00c1045326370af44264486990da654127acebfd"}], 0x1b8, 0x11}, {0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f0000001ac0)="20cf209173a2d14f7906abe091ee70d8926bd1c8b7b0497380041ad8904999d80d0769be4c497a38b73e13989cf5e18e8147042a7e3aae3259d13814b9c4daa51be19e09fd1b46c251eb4e9168ad4c32d9dc3bba2afa1c41ee003571dcef58c897cda4d22e4395b10c83b3cb8b0a707a21b113466027a5e6e013a5c0205991a8495098db572be1a60aeeca699da56d12dfe8553499125ddef6f22f78d421fb9c3eeb9a0728a8c8d8ee84aabc87fea1fb7a2e911290eee810", 0xb8}, {&(0x7f0000001b80)="7371bb945506f46c3e06b31fd4cf1796c1fad8cc66237757e84ac0e7c5642517332e946367a277abe94480a8c25426c302deefe541108d16cfc8fd8a1f7ba4d7a8c4d7840159f74911fac1425706ea686047bf", 0x53}, {&(0x7f0000001c00)="b09f3774f0a1adc76b116af2359aec6f101015a875c710b934998e12ce8c3775d654be354966955bd1f2bc61575d6d0279dd39c1daa78b4bd923a493b3cb44c817b8528420e0dfa8ef305b6d31fdc82c435f16a1ad317add6f3fc28089af1423b68a63ba683e37f90822cb429cb9122ce8b79c668e45e1cb197a75053c106eed964545e0a83f3ba80bcdd54e6d2aa49a77794274dc26d3b908682dd7ccb3ed74403a3747000ae6a4e01d8150a07865ddfbdce3671be2b004dec093d6d3e55f490251c2ab24f66dce17", 0xc9}, {&(0x7f0000001d00)="a58e58c9a6467e418a79c9775b1a5369fae5d0710dd23868e097d4e432d83f0c5807b09339d2ab7cea71283bdfd12d14cf264de8305fd4465e8892f33e6970045792687dd477f4e162f7774af1a08f45fa2eeba6e7bdb919fb280b703298b3bd1290918b9c0e5fb278adafffebac", 0x6e}, {&(0x7f0000001d80)}, {&(0x7f0000001dc0)="b0994fa3ed1d2ec42ee11953c66beb13e9a82bf455705ae553cfc249dd098f33fe0c17c7eb20b17ef747cf0b1a62bc1c8c74d6ad35a1f6760da0bfc0242b3b5a301235d615c19fb2042d343ae0e22b4f8b9f4360276a9027f69c35829aa00381d532a43d901d15d3ee7944", 0x6b}, {&(0x7f0000001e40)="4bba1913697bdcb2176957aba88cc11b9a16f1413d0b0d01c2c3a99ee0ed677b2eb0e1dea8ed8ccb005b988111d8dcb76e401edbe0919f6970bba6d4ee75649623bb0c15fae130b986588eef5f3dae5482de254c629a65fb0bfc8e5342e8a8252d41546e6588653358aa8a006348d0bdb6e0d5bdc1b4c8275b9c6224ce23a962d16252d10139c2be7d32333577a2a253a01ea26c", 0x94}], 0x7, &(0x7f0000001f80)=[@iv={0x68, 0x117, 0x2, 0x54, "d6947030838a5d41b5c29311e54424192c8e28d9ac77359cb2201c1c950337c5f7bec1f8e4ca79a04313b48c8ffcdae51786599e9851d893704aaa1f13cafdc769c902171e912eb53769d40f7da00d78d6a8c1e7"}], 0x68, 0x8804}, {0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000002000)="62cc47e0ecd4516e0afb8413b1facecc44b701447dcdd2b914ac1f8c23ee4545d44782ce8da8cc51eecddc3e1ea41dfdd668c5f527be512cc8730b286ecf7e028052e5ba614fbcb772227824d3acbb29510b63f5445cfbeb175d6675104000b613327dba09b47e7d15ffeabd222916ce086e2f92161a8a7fd2016f1ebd6f09d7", 0x80}, {&(0x7f0000002080)="2654ff4c2e929eb7b7b58ec90879d3de348b39e2d196a2b00b7242cfaa52e7daf04ee8c0ce64d3082604a84056d0728ea08908f299783862829d937f6c15f50a13a6027f140c4e28658603bc26cf71605efd2db0b59b6c0d7dca436c2e", 0x5d}, {&(0x7f0000002100)="a1d0fd22cdc3cae873c1c88b1b67fdde4e870cc12dac643b59effb8853f03893eb33d179d49bec664f1a9be76f1095ca53f8b4c0721f88f2cbe2bc1430896044761a2a0373af8ab9bf4be31270812e77940364bd8df0a0d20a725884ff2826f3653988e6bbbdef6aa85df1691f060227175e9fe0", 0x74}, {&(0x7f0000002180)="11f269f0dc4f740c24775fbf39ae0280b5111e9c021c502a23bef714c17f40d8a9889e0f9191fdb9500e3b03a7557f2d9af130954bc1456aa53807e59eb69e4e448ca62bf25f", 0x46}], 0x4, &(0x7f0000002240)=[@assoc={0x18, 0x117, 0x4, 0x20}, @iv={0x80, 0x117, 0x2, 0x6b, "b0f1242c310d2653e84dbbd961625c69ed51658312c7fc06126e25f122c263e6e6633d22f6cac7d55bcaa66fa9b04d34aaad1ef832c3326036ef6f33cda042f46de6c0ce477fe0782c39baf618a17ce4f14b1678a9b2a0e299f20651c591ca82c8a8ff888ceab40850667d"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0xc8, 0x117, 0x2, 0xb1, "e8b1d9de088443bc4c05a07825815466081dd18f203a3ecd7077f383c26202a49e3666e16913e15d9b69767acb5a5da9aa6c2ed1899cc9ecce3d47bcb2c472cceb4ee214ecaf0dead55159c2ed37bd20077651a14431794e5a210cd80064e2d663d3f8b166c365af4d1c16c82cbb0c67f9c3ae78cd8c2f6fc98b5609c1af98cc132b240688c39c11d9167218386154446b8f2b24502b5781f9be6441e06b660556aaeb16dad16563bbc31f85857fbb59d4"}], 0x178, 0x2000c0c0}, {0x0, 0x0, &(0x7f0000002880)=[{&(0x7f00000023c0)="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", 0xfd}, {&(0x7f00000024c0)="b104f769b8240366d827ab8ab30791ce5dde5cd2ca96bbd6de60754384", 0x1d}, {&(0x7f0000002500)="e8456ab5cf8bb617f4d4fff05ca792758acc2e4f03504e17fa258d01172e15c13f57b4bf5a74ec812fd31c7b81fb14d6ed3082e67b6f0dfb286dacc99c77d8a3527ec5c35d37cec5fdfe1a39d5cfa79763f713531e6887df30935353a1452e1e5335daccf360b109807cc6bc599e74d94b1d333b94aa", 0x76}, {&(0x7f0000002580)="6e32134042bdd4686f6352da0da60a1514a0cc96a3bbbfb6749a6bbcd010f781edbfc69af2e37e5b66a1bcbeb284ca9f162aa7f0e6786df7baecb1502f31b35273bab1adf612c635b840a2314bbb5dd7347c0e87d0e8c0b9eb8a282bcfa7904b9fc2522c7979a17f", 0x68}, {&(0x7f0000002600)="9d8e6d102db09dc5ca1422aee9c42f1b7040e8a077b13e1ea2ec69e612c86e88f71ac21358d81eda8464af2a7b3eef56ccaa5c1b7bb0981e75e1274ecf5e7fd32d1be0e0582186cf81e91ed44e03d7d2dd229676df74fb7de15df9c7fde007e935e8b216813a5185dd213bf1dcfa27fd912770c9648bfe58defaf3efb3ecfe5d90c73dbb4a6f479b82ff4763dc48c87a5eaae9157c4cb08e27826dad296e6642119f639aeb92c7b57ffdd46d52adec22f4664fad0bae6e8b82e2f1392958f12059", 0xc1}, {&(0x7f0000002700)="8443c4822c104690cd3da5f91e61b5f52f794bb7094980acef59708e8c18db53e1c63bd7ed2cf87a0db7032d0efd936087b0485e6744e3bd23bec6f22541f3f8e69bbee9db4d2a35d70df8a5a99e42b6fe", 0x51}, {&(0x7f0000002780)="79c53ff04cb700729d16a8860acf9b48f9ac011ab063577512dca49b6d5a87ee5e624837e2aab8583af746aec1b614e4dc0af83707e28441b40ed9c7f1c7e2da419707cfd8456c8ff6e1886e9e8affae84732b56a55ab3d180f1be9176f67dd5c9a197233647b0f789473f649e637c5a0071707dbbe13c02addede37e0d7705fc998c087ba910722ee4a2c18e999c7328a3c585adeac54e2b21f9a8c08975b642c58a026eb18704a59c22c4dab25e8445a297955313dac0f88e18a2be5d89765c75b2f9ac6a70a985ad06b3672f636a456", 0xd1}], 0x7, 0x0, 0x0, 0x60008001}, {0x0, 0x0, &(0x7f0000002980)=[{&(0x7f0000002900)="277dde0222039a31be2a83c3353874e5a66259dbbfcc869b79c9b7572e69e2cc2834d4b7f23237ab396850a1cfcafbfac480483e0c7237d3f00589c1ce3a7bd0e9690ebf462301236cd3e428e188924d8309415e55ac784284a422d0221e07778e8cadee6445f0940760ddd0de82001fdda8a19bee", 0x75}], 0x1, &(0x7f00000029c0), 0x0, 0x10}, {0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000002a00)=':', 0x1}], 0x1, &(0x7f0000002a80)=[@assoc={0x18, 0x117, 0x4, 0x1ff}, @assoc={0x18, 0x117, 0x4, 0x7ff}, @iv={0xf0, 0x117, 0x2, 0xdc, "3bb5691d8ebf375967a7f249e86c0f8a9263e54585c10b8ce516a98f8303563be5968aca65351cc65a1c398567497d2013150272c98c90d8a97ec63e4e182c412f9a3cd7c59cd49a2d731a640fbe0ce38e21684343e5e88223845d26c42a4b393065a6a59d8610d589c85979ee18520ed793fe458a611358e3b3ffc1f35c2cf223de832dbe87bdb8a9288e69225099c34173e8190c24995b18e03d1d389f21901cc8f5697c22abc2359c6e7537877feed61d1387552ec12c1848d053a20346c0ea5ef8251bda6f2e0c6ce58f898a84853a294dc012d81c945b600672"}], 0x120, 0x80}, {0x0, 0x0, &(0x7f0000004100)=[{&(0x7f0000002bc0)="9c0909a27689f5878fde7271f0842f6482b1aebc1b7fd874e89424712a1b5efc345fc622607c6a77f655b0fe3c41e98a50b74454f7215ac6cef35f968b949b1cbbdaa8b1eeb6167b89f6ac134330", 0x4e}, {&(0x7f0000002c40)="8b80c4d10a9f49b22e2af455037e38afcbd40e7d31481bb6fd7cac0b", 0x1c}, {&(0x7f0000002c80)="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", 0x1000}, {&(0x7f0000003c80)="2cd32be84bfbacd02555561a1583c17da47d0a7d4b8b9651d5c26196f981ac04588ae3e9c2f93899b9450c05627f5d3d263e22a1bf2fd627531f5d0361221ce90b2907882eeeedc61c2c7a934eadf6115a8d1c462fb0671f805024b35d869d3126cb4333786aece8ec66814c8f23e5d5397d7bdfd3e771e82c3b8821e61ec896bccd19a1d40d96eb0f70b52ed0cac6a66da8f0e79ba7c1dcee0660686226121235f935ef9e34b13aa4c6b7b84edfe966833b9df51c19029f991ade83ebdf562742b41f48", 0xc4}, {&(0x7f0000003d80)="6fbd32a4923fd078b48321cd2e6513c4", 0x10}, {&(0x7f0000003dc0)="4240f1c9d78ef5a5c0b1ff1981af9bb14a34ada798750db9c0e4f40778bfb56288517bcea93318969c0ddefe379d00eabbc592525a9acd865840672d6b3152b84f210565d2ddf0d752325441783698922ffb6dad583bf9779e5d028fdf8b2672313efcccac059fff409a41939524", 0x6e}, {&(0x7f0000003e40)="4b32c4d52c2f83c4cc67cee8b9357b4fe6672e9cdafe2fe7754ee4b15dc7802ae234becc6cfeab2c2c8779b8f9cf13a74d6e85b45a12a80b0ed765a1897d78a970a8bb9559d40f88160fb2cdb4b11df1c81f4ff3554de99dd520d6b5900940bdf180bfb8eb6a22058556975c339599926baeff0ae0824428606847d4e8d14c2f77e7c5bc2ee9634cf977c5836c2f29185b38f5eccdc92ef8413eda181da31200a2da", 0xa2}, {&(0x7f0000003f00)="9f0e329b1888c92291328067cf071ee96eb7b495653cde33ef578ecd19ebed7fc5b82eeab6a5c0740a0dffb1104f92313b", 0x31}, {&(0x7f0000003f40)="3b5eddf9483cb934de7aa60c31e3f14bb3620a6ef7f04f528bb0a92581063ebee8a02c1d3201c22e3941a8853dee2327a40efb4ebe91ca4301bd8801005a6b10c8149f0d0e8b96656a28ab415708ac3201e436862029162363e1c225f6e295ee26c013713fdb1809cdccc2db983449cb3ead8df4a8da7c0a93c5a5a083db98b705fd78eae12bb0407516604de36a30cc", 0x90}, {&(0x7f0000004000)="35e12ef41a771ef0deb7ad557df04280489917e6228f94d4435efe23fc47d92f0023596e1695b05c79fb020521060eb193dde558e925ff9c5975ba1593e9ffb70724037a62c9ede3c52bd4fdd1d0cac36de849ebcf47b96da1250cadd1ae67dc774dcddb7aad70122f33e401e1d6c7157ea7afa03e8289041653085b1ba3ffc1d7688b7cabfdb5099bb1f294f1653511a61f4124fcfa2426b6df41eb32c56060e27fbb523efde374c01cdafc0225dbabfb3879565c965b585687589ad23d3346f1c65dad9bca3c069c18aa3a0074791bce194f2483d1bc1cbc9d943f977e054c3ae4701a14d67ad162dad9ce8b5ed3d135b54b26afce", 0xf6}], 0xa, &(0x7f00000041c0)=[@assoc={0x18, 0x117, 0x4, 0x3}, @assoc={0x18, 0x117, 0x4, 0x1}, @assoc={0x18, 0x117, 0x4, 0x9}], 0x48, 0x20000041}, {0x0, 0x0, &(0x7f0000004740)=[{&(0x7f0000004240)="8ae3daddf7a93b505c416455a744eee7eb690cfb62e863ad79ccca17d12a093088841914d3d4c363b0cead78381854ea43128f356a9e90c148e1f5fb2281d84de7305a53682cfd58077bb499ce519aefe54d6d15188250adc47d45c23f6a9efc9380dd78a75a3345a8bf0ad8346e56cd444b4a99f5bc1d64e9682e577b8de7a8a9e48dad7a2e57a3d89fa9f403180e956e94d6516ea3934f3a0e886b29ea6239794ac5b2a8e64fb609382b67ac298c93833de8d6311a2d8f2e80918b167049377f0af6ee637ee713be68a2b0347ae29ec3db522838aa227e3ba69f54557fff0f51fe0173995a2290c77f8f276c576a", 0xef}, {&(0x7f0000004340)="57701424fbc43afd967d401b5349662afde063e7be05e6cc2f740a9c6980d120d2009d0a1a7b2c744b32216a1f871c35344aa8f0dd0c87f5d75ddc76cb8d0c203c1f124cbfa48f610f238e9966385473df16bd60d371ef3cfc6c19136090fb3cae4b96e975976fed9d442ea395f8ed094ab5ee488374073393da729ce49aff98a1e48759ee102a00a92fd7d0c7cc8859", 0x90}, {&(0x7f0000004400)="adc3416763cbf7455e52127da7b65e773d9c3fecc36ef1ad70b933a21b6685b94a1be11d158836dc3c1a961e7a2c9b7abd65f765a976adf0b03fdf9bde588cd6f2f1951aab2b8f411f0cfb2a14fb5b2374250754e3649cd45b30c2dfae0d1888988da2398de59c37c9401ce94d01274e45565b091edb2683c5aef24ac96294a45a16c221e79960b946b76bf3a12b71597fb5d7550b4f003127", 0x99}, {&(0x7f00000044c0)="11b85005e944ffec468822acf3cdfa61eac0931e7a", 0x15}, {&(0x7f0000004500)="aea4a6c5ce4aefd4b520c10dc8fb25d4a1797e3580f7e30333f2904da21e897d0065d5b1a402eb73d619a5f4d139d1d8d44345881c8a8062fa04ac9d52f5fc41d14a64057ccd6c1e18ad75b84abc9edfd778e2472cba0b", 0x57}, {&(0x7f0000004580)="49d12a6e0c235d5fee791dac3a43d8fb1e8a7596a4bba05d3d43485f9e810f307f0709f8df5e63d8c8a17a38ad16fcf3d3f6ad020db76f82aa1c477e842be5774e48f456dafe4903a61c28c8b5e0b7c1758a7b18fda6fed868b4e3f09e56b6007cbb1ce8c7b0c2f90e879a03b966ae00a90d9efb60933586884f0f58312f32a094afd1e94542b373afd1037e3675ea", 0x8f}, {&(0x7f0000004640)="41927440f7bc847b13c51be1683af1fa286880a58b9bdea1ac021ef9625e59ee400aed12e7d611fd2fc0797f2b2534e6098c35236a1fba9a88c95e0e001355770ba80455ac7570711a24d40b45d6b7b00f4d6546240664b0a7a4a6b59745ac9c7b5e7df2182e27dbd10ad98d5a38bfc277ee4b00effa077bae640e7ebe2e4caaa59c5d481fc97901d9ada876f2249108000c059259e58ce0d8404da7cbc41fc78a7eff13f13d4b6485143845b8e07a2de4be2c0d609e597be31307dd0a1911fc0c36be3eca4148056f3b465d961539b326ba04c115f086d86d1693babd3bb9c7d6fd06dd39f9d54aa1302134934a7a66", 0xf0}], 0x7, &(0x7f00000047c0)=[@assoc={0x18, 0x117, 0x4, 0x8}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x88, 0x117, 0x2, 0x6d, "43b5cfddfea84a7045b4031548e758a59491dfacd6a4caef80c28988caa20d8a28d3a8e1c8eb6cfa89ac9e449b140bed0d59d6ac210a43e2c0ca8ffcccae1dbccbd90151f3bd0039726dd52de3fd10a5aca697ca213ae6c496dca0f40e39acce46b3587da20591752a6326c20e"}], 0xd0, 0x4000}], 0x9, 0x44800) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x20) r2 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r2, 0x0, 0x0, 0x0, 0x0) [ 1754.675834][T31129] BPF:[1] Invalid name_offset:24576 04:11:54 executing program 3 (fault-call:19 fault-nth:1): socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0) 04:11:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x383075, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:54 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xfff0, 0x8080fffffffe) 04:11:54 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x6800, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x12) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) [ 1754.933274][T31245] FAULT_INJECTION: forcing a failure. [ 1754.933274][T31245] name failslab, interval 1, probability 0, space 0, times 0 [ 1754.989040][T31245] CPU: 0 PID: 31245 Comm: syz-executor.3 Not tainted 5.6.0-rc1-syzkaller #0 [ 1754.997762][T31245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1755.007819][T31245] Call Trace: [ 1755.011369][T31245] dump_stack+0x11d/0x187 [ 1755.015794][T31245] should_fail.cold+0x5/0xf [ 1755.020325][T31245] __should_failslab+0x82/0xb0 [ 1755.025101][T31245] should_failslab+0x5/0xf [ 1755.029537][T31245] kmem_cache_alloc_node_trace+0x37/0x610 [ 1755.035359][T31245] ? memcg_kmem_put_cache+0x77/0xc0 [ 1755.040576][T31245] ? debug_smp_processor_id+0x3f/0x129 [ 1755.046062][T31245] ? kmem_cache_alloc_node+0x1bb/0x680 [ 1755.051545][T31245] __kmalloc_reserve.isra.0+0x43/0xd0 [ 1755.056936][T31245] __alloc_skb+0xbe/0x360 [ 1755.061294][T31245] alloc_skb_with_frags+0x8f/0x3e0 [ 1755.066429][T31245] ? ima_match_policy+0x643/0xac0 [ 1755.071510][T31245] ? cgroup_rstat_updated+0xbb/0x1f0 [ 1755.076849][T31245] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1755.082762][T31245] sock_alloc_send_pskb+0x4df/0x510 [ 1755.088009][T31245] ? __read_once_size+0x52/0x110 [ 1755.092969][T31245] ? __rcu_read_unlock+0x66/0x2f0 [ 1755.098021][T31245] packet_sendmsg+0x1751/0x3ac0 [ 1755.102898][T31245] ? retint_kernel+0x10/0x1b [ 1755.107504][T31245] ? aa_label_sk_perm+0x7e/0xd0 [ 1755.112365][T31245] ? aa_sk_perm+0x1cd/0x590 [ 1755.116890][T31245] ? aa_sock_msg_perm.isra.0+0x2d/0x130 [ 1755.122455][T31245] ? aa_sock_msg_perm.isra.0+0x99/0x130 [ 1755.128018][T31245] ? packet_getsockopt+0x660/0x660 [ 1755.133155][T31245] sock_sendmsg+0x98/0xc0 [ 1755.137501][T31245] ____sys_sendmsg+0x207/0x4c0 [ 1755.142292][T31245] ___sys_sendmsg+0xb5/0x100 [ 1755.146975][T31245] ? __rcu_read_unlock+0x66/0x2f0 [ 1755.152072][T31245] ? __fget_files+0xa2/0x1c0 [ 1755.156695][T31245] __sys_sendmmsg+0x10e/0x310 [ 1755.161400][T31245] ? __sb_end_write+0xbc/0x100 [ 1755.166177][T31245] ? vfs_write+0x10b/0x380 [ 1755.170607][T31245] ? fput_many+0xe2/0x130 [ 1755.174963][T31245] ? fput+0x20/0x30 [ 1755.178790][T31245] __x64_sys_sendmmsg+0x60/0x80 [ 1755.183661][T31245] do_syscall_64+0xc7/0x390 [ 1755.188252][T31245] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1755.194149][T31245] RIP: 0033:0x45c479 [ 1755.198058][T31245] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1755.217844][T31245] RSP: 002b:00007f49db88ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1755.226267][T31245] RAX: ffffffffffffffda RBX: 00007f49db88f6d4 RCX: 000000000045c479 [ 1755.234244][T31245] RDX: 0000000000000001 RSI: 0000000020004f00 RDI: 0000000000000013 [ 1755.242225][T31245] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 1755.250222][T31245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1755.258222][T31245] R13: 00000000000008d2 R14: 00000000004cb36d R15: 0000000000000001 04:11:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x41d60d57, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x7, 0x2}, 0x0, 0x0, &(0x7f0000000340)={0x3, 0xb, 0x7d92, 0x7}, &(0x7f0000000380)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x401}}, 0x10) r5 = open(&(0x7f0000000500)='./file0\x00', 0x506a907a9f5951da, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x14, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9c, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0x0, 0x7, 0xa, 0xb, 0x50, 0xfffffffffffffff0}, @jmp={0x5, 0x0, 0xb, 0x5, 0x7, 0xfffffffffffffff4}, @generic={0x5, 0x1, 0x1, 0x7, 0x42}, @map={0x18, 0x8, 0x1, 0x0, r2}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x3, 0xd2, &(0x7f00000000c0)=""/210, 0x41000, 0x8, [], 0x0, 0x2e5cea264f20247, r3, 0x8, &(0x7f0000000240)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x0, 0xffffffff, 0x1}, 0x10, r4, r5}, 0x78) r6 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r6, 0x0, 0x0, 0x0, 0x0) 04:11:55 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x6c00, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:55 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x1517f, 0x8080fffffffe) 04:11:55 executing program 3 (fault-call:19 fault-nth:2): socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0) [ 1755.581698][T31367] BPF:[1] Invalid name_offset:27648 04:11:55 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = getpid() creat(&(0x7f0000000000)='./file0\x00', 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) ioctl(r1, 0x3, &(0x7f00000001c0)="080db51a5e0bcfe847a071") r2 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r2, 0x0, 0x0, 0x0, 0x0) [ 1755.624325][T31367] BPF:[1] Invalid name_offset:27648 04:11:55 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x7400, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1755.757016][T31583] BPF:[1] Invalid name_offset:29696 [ 1755.763247][T31583] BPF:[1] Invalid name_offset:29696 04:11:55 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x7a00, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:55 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x383f00, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:55 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xa0000, 0x8080fffffffe) [ 1755.962609][T31693] BPF:[1] Invalid name_offset:31232 04:11:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="0b6c72058a2baa89640977109bd95c8bb42aed759fa0096ab915cc8f784b52e019e1fbd9464e1084608f05292bb7011217c85ac9ed", @ANYRES16=r1, @ANYBLOB="080029bd7000fbdbdf250a0000001400038005000800dd000000080003000200000020000180080005000300000014000300e0000002000000000000000000000000080004002fda02600c000380080001000200000008000600f7ffffff0c00018006000100020000000c000280060002004e20000008000600060000001c000380080001000100000006000400040000000600040040000000"], 0xa0}, 0x1, 0x0, 0x0, 0x20000044}, 0x20000010) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r5, 0xffffffffffffffff, r6, 0x0) write$binfmt_misc(r6, &(0x7f00000000c0)={'syz1', "9b7486db94bfd6d6180eee4d3963688a4e54c2e2590de7c9840d1810"}, 0x20) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r4, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r4, 0xc040564a, &(0x7f0000000080)={0xd060, 0x0, 0x2012, 0xc2400000, 0x1, 0x8, 0x20}) getsockopt$inet_buf(r2, 0x0, 0x0, 0x0, 0x0) [ 1755.993009][T31693] BPF:[1] Invalid name_offset:31232 04:11:55 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0) 04:11:55 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0xec00, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x30602, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r4, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[r1, r4, 0xffffffffffffffff]}, 0x3) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) [ 1756.268434][T31815] BPF:[1] Invalid name_offset:60416 04:11:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000080)=0x9, 0x4) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) sendmsg$nl_generic(r3, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000840)={0x4f8, 0x40, 0x400, 0x70bd25, 0x25dfdbff, {0x1c}, [@nested={0x266, 0x22, 0x0, 0x1, [@generic="e277e053644f333a103fd3cdcf48d805491dc8f058428d1ba0aa64737a887196fd6ebd20d6298b4cc8ffed11ca81382d381c20a166666ee9ed1ec48b61d8fe91ddebd41aecb3c2ec45c70392a9721b1bb3274e5672d2dff9be8758c458b1db9c30a0be5f941b102cc6accf7599584358b241ec0572e0fd246702f6e26b92bdd8668cf8c406e810663835a04ea23832843633b5619cabcbbecc8fc9a75f26575e969879658b24e6c3959607ff68d2ba5e560e7ca0d0b441fa579faa139f7de603fedbadb42ffb215581e1c3d5ba0a232018b0159766dca16dcac7436c5381194a8fdbaff8f4808a06e8", @typed={0x7c, 0x42, 0x0, 0x0, @binary="e0459c780fccd498be696f93eb878d8f164807fe5fc331a3725eb59329ce8c794218c3ceb1478953eeaa374ce42959a3c8c38cb72acff4a58ed939097a974f6047c04b55cca03d4a40dab29ae6b79032350f71eff8dd9a1b6bb7bc7a00ba348c9526b600d2aec4b2db2bab9b4b8589acf3fe2b01bac5d1b1"}, @generic="be1ef3262c933efb9953044257a2080c597bab9ac9b2140da00853348d10eb2406a64ec50045cbb6b9384eec6a8404b9c5d3223214d1d022070abb3600038993496fb2c7507bbd3e814b26c2c486585278cb096a4b8e009601b64375334652a2c61d2d40b5187c2b0852d70919cdcca3eff35f567a789e52e2a6dffda549f6b87e7f99f5b03f74973ca618745214", @generic="0b78cf6a43f4eb9cfabe7ca23047ecbd6267fd55c96680703f2928fc870b9d6546c2f793e8dd93aaa52c9f869afa12b710773678736cf18b06d351b2f6a83961c38f9c51a137605a4f0f98a3a83d043440f05b3d56acedea79a3c69ea55c779b88f1e559f111118192812304b1e468"]}, @nested={0x4, 0x75}, @typed={0x14, 0x23, 0x0, 0x0, @ipv6=@local}, @nested={0x243, 0x27, 0x0, 0x1, [@typed={0x17, 0x68, 0x0, 0x0, @str='/dev/btrfs-control\x00'}, @generic="4ce1c00785382b071c46f5120e8f587acc636d129d342951a804ced87d41690ef6e47f061c399a3e7d3eea6870f5028de321d5330cacde9a8a2415501c51b2cc56f4103b9e04005951900b2138452e1c8906065503df8f31e30abddb73d50b9e3c0eeb2fb06af88e10db2d11649b9395af993b63a62f229a7291621fab4a474346fa334b1d9fbbb2fdad9f9900b2a4d716f9aeb8d12ad5c1af05f7c07e5bd2f2de3372f80d13dcb142082b14616e0bf819b87f2c8e30ca934a", @typed={0x4, 0x65}, @generic="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"]}, @typed={0x8, 0x34, 0x0, 0x0, @uid=r5}, @typed={0x17, 0x7e, 0x0, 0x0, @str='/dev/btrfs-control\x00'}]}, 0x4f8}, 0x1, 0x0, 0x0, 0x4010}, 0x4008001) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={r6, 0x80000}) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r7, 0xffffffffffffffff, r8, 0x0) r9 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x3b2f, 0x200000) write$P9_RFLUSH(r9, &(0x7f00000001c0)={0xfffffffffffffea9, 0x6d, 0x1}, 0x7) 04:11:56 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0) [ 1756.348452][T31815] BPF:[1] Invalid name_offset:60416 04:11:56 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x1000000, 0x8080fffffffe) 04:11:56 executing program 4: rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r0 = socket$netlink(0x10, 0x3, 0x0) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'system.', 'selinu\xf8\x00'}, &(0x7f0000000100)='\\vmne\x01\x80wlan1/\x00', 0xe, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) 04:11:56 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0xfffff, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:56 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) sendmsg$nl_crypto(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)=@get={0xf0, 0x13, 0x300, 0x70bd2a, 0x25dfdbff, {{'blake2b-384\x00'}, [], [], 0x2000, 0x400}, [{0x8, 0x1, 0x3}, {0x8, 0x1, 0x1000}]}, 0xf0}, 0x1, 0x0, 0x0, 0x400c801}, 0x24004840) [ 1756.710932][T31940] BPF:[1] Invalid name_offset:1048575 [ 1756.787741][T31940] BPF:[1] Invalid name_offset:1048575 04:11:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x384000, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x124, 0x3, 0x1, 0x201, 0x0, 0x0, {0x1, 0x0, 0x1}, [@CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x4}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x6}, @CTA_LABELS={0xc, 0x16, 0x1, 0x0, [0x8001, 0x1]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}, @CTA_SEQ_ADJ_ORIG={0x4c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x8577}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x7f}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x2}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xffffffff}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x401}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x2}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xdc0a}]}, @CTA_SEQ_ADJ_REPLY={0x14, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x80000001}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xfff}]}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'sip-20000\x00'}}, @CTA_TUPLE_ORIG={0x78, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x6000000}, 0x8040) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) 04:11:56 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x2000000, 0x8080fffffffe) 04:11:56 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000000)={0x5, 0x6, 0x1001c, "d5fdbcc6333dbb83873c86da3c7f416552c8c602743824d1a13e1d8710b708a62a7ab58d242ad3591b1f01f33dbf898d06b475b7be5df9eb5e43bb28", 0x2, "edf6057bbebcaf6224d5ec940124eb8c4f305d2424be9f226de9c4a50abfd98dfaaa5ad3000000000000dd0300", 0x841c1c018761ec63}) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f0000001640)=ANY=[@ANYBLOB="03000000000000000500000003000000000000000000000006d800000000000000000000000000000000080000000100010093020000000000000000000000000000faffffffffffffff0180000000000000777300000000000005000000001000000300000002000000000000000000000091d8000001000000060000000900"/146]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000013c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001700)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) writev(r1, &(0x7f0000001600)=[{&(0x7f0000001400)="bfbcd4edfce4d967b694e6120bb2538f5e88facd80a25a7961d17e6a79c773baa99038d5794c4c7f7ed0cdb2c474c8b080865d91b61722bd9a7fb38b58d72dde44ccb12966666102710cde209b28a054cc4fc1138f3d0ccd964ff20cc428314bec3e40549944f98fdba775a867724ec29d360485276978fd4ea0ab3c58e98c698b5f9acc49642ed1d507a13acd77aa2a0ff257e9220f4e468d8c4cd5bbec6f0d748820008ffc2d60ee02ee575b1770f93bc74c295d6d5f79b2e8cb9e4af95d0f6a916b1866755d3b03781fb45c1a72efef29588ec84878", 0xd7}, {&(0x7f0000001500)="dd96b37a32a8f8cfe83c9d22da48b299dd2f58d93454465f8ebff98b9e95513909c82d6dce9e93c905bd353d187df3a64ce6728b5fe09ca4b4379ba7b35dfe2557c733b80fac5f7e6693ac3088961489c7623d789f0eda3598a90ce48e2a8686f2fd4e7341b5cdb339931b5432ea3d5b9c8820b9424fd32606b07a1b9abab10349c9653259d201c055e66fba45adb2d9b8686ae2a6df3ca2d1ee00881ee6288523038409d0b3e00ae966f4bec35d2d1987b5c97807dfc2ffd5a883c4e765f40deb105cc3fbe11cce6d2fb240", 0x3a}], 0x2) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f0000001740)={0x0, 0x9}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/timer_list\x00', 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={&(0x7f00000000c0)="959f359671e2cf0462552ebe97e2aeff75991d3e568bf3caa750e9e1cd0671fca04c0def9bda1db262038e94d1ae1569d3e4693057b3486b4ad1211ce93f09c62c6c0941001f8bc3021341c4db7ffba9ed8fdf7411fd76f98e1bc871754466ef0a6654e28218a3d1a1e541f6b758560d76cb394289bb2d7fbf3b96f978fdc629a838c7e1f24ff9c3bbd03356636a740ffc276e473a87dee47c0ef1589c7eef1d113d31165400676c0e35c33a9f034596be1fe5ac29c555622531b6744f80ee4b510f93607819192c28", &(0x7f00000002c0)=""/244, &(0x7f00000003c0)="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", &(0x7f00000001c0)="ca6307792783bc0ef516b73e6fc681d4768fe0", 0x3, r4}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:56 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x4, r5}, 0x80, 0x0}}], 0x1, 0x0) 04:11:56 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0xffffff, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:56 executing program 5: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x200, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) [ 1757.172839][T32169] BPF:[1] Invalid name_offset:16777215 [ 1757.208138][T32169] BPF:[1] Invalid name_offset:16777215 04:11:57 executing program 5: recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/107, 0x6b}, {&(0x7f0000000140)=""/245, 0xf5}, {&(0x7f00000002c0)=""/223, 0xdf}, {&(0x7f0000000240)=""/31, 0x1f}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/77, 0x4d}], 0x6}, 0x2) bind$vsock_stream(r0, &(0x7f00000005c0)={0x28, 0x0, 0x2711, @my=0x0}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x48000, 0x0) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x112216e9) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:57 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x4000000, 0x8080fffffffe) 04:11:57 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x1000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000002c0)=@security={'security\x00', 0xe, 0x4, 0x350, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x4, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x0, 0x6, 0x3}, {0x1, 0x1, 0x2}, {0x1, 0x6}, 0x7, 0x7}}}, {{@ipv6={@rand_addr="c0698e5bad9a8e6606a36791fa208000", @rand_addr="731e81b410e759c0a13af8f868726cf9", [0x0, 0x0, 0xff, 0xffffff00], [0xff, 0xff, 0xffffff00, 0xff000000], 'gre0\x00', 'caif0\x00', {0xff}, {0xff}, 0xff, 0x3f, 0x5, 0x40}, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x7, 0x677f000}}}, {{@ipv6={@empty, @rand_addr="3fc5d455961b6c84074cbfc7c03d5930", [0xffffffff, 0x0, 0x0, 0xff000000], [0x0, 0xffffffff], 'veth1_vlan\x00', 'hsr0\x00', {}, {0xff}, 0x4, 0x4, 0x1, 0x62}, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x2, 0x1}, {0x2, 0x0, 0x1}}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b0) [ 1757.528586][T32293] BPF:[1] Invalid name_offset:16777216 [ 1757.541462][T32293] BPF:[1] Invalid name_offset:16777216 04:11:57 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0xe, r5}, 0x80, 0x0}}], 0x1, 0x0) 04:11:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x384002, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:57 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x7000000, 0x8080fffffffe) 04:11:57 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x2000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1, 0x28) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) [ 1757.934232][T32516] BPF:[1] Invalid name_offset:33554432 04:11:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)=0x40000) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x1, 0x5, [0x972e, 0x5, 0x1, 0x5, 0x0]}, &(0x7f0000000040)=0x12) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000080)={r3, 0xb1, "2924bb8b7f1cb78d318400b445f0c3e28f8c71b37b09ac1a986cd375eb2cc504c156c95a7c47d6d735d82d388beed5fa716ed554b64a4e6706796788b201c21dcb0c8d20528673dae14704508ef1aac1fa1c1e09f1b523f6b2860ab12a38629f2914aa8bd72e8c5a11f5d9e61fb7646246579b81f5000622dee959640140a931b9190f78ae7c85388f2a4136b7a25944678f3bc878e3b87af629130770824612c1e0c1034a1739572109cc86c77bdbca4e"}, &(0x7f0000000140)=0xb9) 04:11:57 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x3000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:58 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x9000000, 0x8080fffffffe) [ 1758.271855][T32640] BPF:[1] Invalid name_offset:50331648 [ 1758.299963][T32640] BPF:[1] Invalid name_offset:50331648 04:11:58 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x11, r5}, 0x80, 0x0}}], 0x1, 0x0) 04:11:58 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x4000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x402c0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000040)={0xa, 0x5, 0x7, 0xa, &(0x7f00000002c0)=[{}, {}, {}, {}, {}]}) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:58 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xd000000, 0x8080fffffffe) [ 1758.447379][T32752] BPF:[1] Invalid name_offset:67108864 [ 1758.457978][T32752] BPF:[1] Invalid name_offset:67108864 04:11:58 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x5000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1758.689197][ T404] BPF:[1] Invalid name_offset:83886080 [ 1758.706868][ T404] BPF:[1] Invalid name_offset:83886080 04:11:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x384800, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r1 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x7ffffffc, 0x200) r2 = getpid() ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f00000001c0)) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPP(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, r4, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @dev={[], 0xd}}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @random="4bcbfc0f9e4c"}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x11}}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}]}, 0x4c}}, 0x4001) 04:11:58 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x10000000, 0x8080fffffffe) 04:11:58 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x6000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:58 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x36, r5}, 0x80, 0x0}}], 0x1, 0x0) [ 1758.946223][ T617] BPF:[1] Invalid name_offset:100663296 [ 1758.964123][ T617] BPF:[1] Invalid name_offset:100663296 04:11:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x1c7d9, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x60502, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r2, 0x8008551d, &(0x7f00000002c0)=ANY=[@ANYBLOB="a042004004000058371753a8a8878d07"]) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000600)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000640)={0x24, r3, 0xc18, 0x70bd26, 0x25dfdbfe, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x2}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xffff0001}]}, 0x24}, 0x1, 0x0, 0x0, 0x408c0}, 0x1) r4 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r4, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r7}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) r9 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) r10 = getpid() sched_setscheduler(r10, 0x5, &(0x7f0000000380)) r11 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r10, 0xffffffffffffffff, r11, 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r12, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r13, @ANYBLOB="110700f2ffffffffffff0400000008000300", @ANYRES32, @ANYBLOB], 0x1c}}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r11, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r13, 0xba9ebf960d977bba, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x48000) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r8, 0xffffffffffffffff, r9, 0x0) write$P9_RCLUNK(r9, &(0x7f0000000200)={0x7, 0x79, 0x1}, 0x7) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000280)={0x1c, r3, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x0) r14 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r14, 0x0, 0x0, 0x0, 0x0) 04:11:58 executing program 5: prctl$PR_SVE_GET_VL(0x33, 0x6c14) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) 04:11:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x200, &(0x7f00000001c0)='\x00'/11) socket$inet_dccp(0x2, 0x6, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r3 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(r3, &(0x7f0000000380)='./file1/file0\x00', 0x0) renameat2(r3, &(0x7f0000000000)='./file1/file0\x00', r3, &(0x7f00000001c0)='./file0\x00', 0x2) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x60870ee1, 0xb, 0x4, 0x4, 0xffffff00, {r1, r2/1000+30000}, {0x3, 0x2, 0x80, 0xff, 0x5, 0x3, "fd6415d7"}, 0x40, 0x1, @planes=&(0x7f0000000040)={0x1f, 0x8, @userptr=0x8, 0x7}, 0xffff, 0x0, r3}) getsockopt$inet_buf(r4, 0x0, 0x11, 0x0, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x0, 0x0) setsockopt$TIPC_GROUP_LEAVE(r5, 0x10f, 0x88) 04:11:58 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200600, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000040)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:11:59 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x7000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x12000000, 0x8080fffffffe) 04:11:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(r1, &(0x7f0000000380)='./file1/file0\x00', 0x0) renameat2(r1, &(0x7f0000000000)='./file1/file0\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x2) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000000)="c0a3149220bb3459112fee4f95ad7609fa148936503b839e57a81bb266b954ae55ceb3238f0a3feb06904e6c1d7bae2325e730a97d353130c34bc5fdebac8f762d3e9aa8d947f2112eda94bbbe1e81341c60e4ce7f393d3224cd96006fa5e1848df86043df00f2eeab313f", 0x6b}, {&(0x7f0000000080)="1bf45a7b06d8d8152ee079b13d00641a6b865b9132d44aae71c940c75aeab385448cbd522e68ad8af534261f10f56b5bf34af80f5fad10f9bb7ee68f3beda4c3b56c35a13f479557a4dd3c44ff907cec1ee6ae43ec3300b04f768e4c22839f9aa852d1afb812415c89f0be24b302728c943099c0d9b08d9a7d79e74d08663054228baeeb9041d3d6adf1e79011f2f4d047015f505d9092d45271dcd89515a121f2635f5a199de80c837faba5011bf85c59ebca2a863f0a73b61496dd76023f236ef4f16f6db4b4", 0xc7}], 0x2) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) [ 1759.296746][ T754] BPF:[1] Invalid name_offset:117440512 [ 1759.303568][ T754] BPF:[1] Invalid name_offset:117440512 04:11:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x384c00, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:11:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x1c7d9, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x60502, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r2, 0x8008551d, &(0x7f00000002c0)=ANY=[@ANYBLOB="a042004004000058371753a8a8878d07"]) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000600)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000640)={0x24, r3, 0xc18, 0x70bd26, 0x25dfdbfe, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x2}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xffff0001}]}, 0x24}, 0x1, 0x0, 0x0, 0x408c0}, 0x1) r4 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r4, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r7}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) r9 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) r10 = getpid() sched_setscheduler(r10, 0x5, &(0x7f0000000380)) r11 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r10, 0xffffffffffffffff, r11, 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r12, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r13, @ANYBLOB="110700f2ffffffffffff0400000008000300", @ANYRES32, @ANYBLOB], 0x1c}}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r11, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r13, 0xba9ebf960d977bba, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x48000) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r8, 0xffffffffffffffff, r9, 0x0) write$P9_RCLUNK(r9, &(0x7f0000000200)={0x7, 0x79, 0x1}, 0x7) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000280)={0x1c, r3, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x0) r14 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r14, 0x0, 0x0, 0x0, 0x0) 04:11:59 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x8000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:59 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x5ee, r5}, 0x80, 0x0}}], 0x1, 0x0) 04:11:59 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) r2 = syz_open_pts(r1, 0x220000) ioctl$KDGETLED(r2, 0x4b31, &(0x7f00000002c0)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r4, 0xffffffffffffffff, r5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, &(0x7f0000000140)={@rxrpc=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @rand_addr=0x6}}, {&(0x7f0000000000)=""/206, 0xce}, &(0x7f0000000100), 0x41}, 0xa0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(r5, 0xc01c64ad, &(0x7f0000000300)={0x10001, 0x0, 0x20, 0x4, 0x1ff, 0xccec, 0xfffffff8}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x2000000000}, 0x40040, 0x0, 0xfffffffe, 0x4, 0xffffffffffffffff}, r6, 0xffffffffffffffff, r7, 0x0) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000000200)=0x0) ptrace$cont(0x20, r8, 0x10000, 0xf2c1) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) ioctl$KDGETMODE(r7, 0x4b3b, &(0x7f0000000240)) 04:11:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x1b000000, 0x8080fffffffe) [ 1759.809931][ T988] BPF:[1] Invalid name_offset:134217728 04:11:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x1e000000, 0x8080fffffffe) 04:11:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f0000000000)=0x9, 0x4) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x41, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r3, 0x2) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) [ 1759.861249][ T988] BPF:[1] Invalid name_offset:134217728 04:11:59 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0xa000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:11:59 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x5000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1760.035985][ T1111] BPF:[1] Invalid name_offset:167772160 [ 1760.050422][ T1111] BPF:[1] Invalid name_offset:167772160 04:11:59 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xd000000, 0x8080fffffffe) [ 1760.085790][ T1124] BPF:[1] Invalid name_offset:83886080 04:12:00 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0xe00, r5}, 0x80, 0x0}}], 0x1, 0x0) 04:12:00 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x20000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:00 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x8, &(0x7f0000000000)=0x8, 0x4) 04:12:00 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x20000000, 0x8080fffffffe) 04:12:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x385800, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:00 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x1000000, 0x8080fffffffe) [ 1760.713128][ T1365] BPF:[1] Invalid name_offset:536870912 04:12:00 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x1100, r5}, 0x80, 0x0}}], 0x1, 0x0) 04:12:00 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x24000000, 0x8080fffffffe) 04:12:00 executing program 4 (fault-call:10 fault-nth:0): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:00 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x48000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) r3 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(r3, &(0x7f0000000380)='./file1/file0\x00', 0x0) renameat2(r3, &(0x7f0000000000)='./file1/file0\x00', r3, &(0x7f00000001c0)='./file0\x00', 0x2) dup2(r2, r3) [ 1761.049011][ T1495] FAULT_INJECTION: forcing a failure. [ 1761.049011][ T1495] name failslab, interval 1, probability 0, space 0, times 0 [ 1761.064646][ T1495] CPU: 1 PID: 1495 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1761.073266][ T1495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1761.083326][ T1495] Call Trace: [ 1761.086668][ T1495] dump_stack+0x11d/0x187 [ 1761.091017][ T1495] should_fail.cold+0x5/0xf [ 1761.095538][ T1495] __should_failslab+0x82/0xb0 [ 1761.100293][ T1495] should_failslab+0x5/0xf [ 1761.104706][ T1495] kmem_cache_alloc_trace+0x26/0x5f0 [ 1761.110088][ T1495] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1761.115980][ T1495] alloc_pipe_info+0xf3/0x3d0 [ 1761.120660][ T1495] splice_direct_to_actor+0x4b8/0x540 [ 1761.126097][ T1495] ? apparmor_file_permission+0x35/0x40 [ 1761.131642][ T1495] ? security_file_permission+0x86/0x270 [ 1761.137315][ T1495] ? generic_pipe_buf_nosteal+0x20/0x20 [ 1761.142877][ T1495] do_splice_direct+0x152/0x1d0 [ 1761.147770][ T1495] do_sendfile+0x396/0x810 [ 1761.152207][ T1495] __x64_sys_sendfile64+0xb8/0x140 [ 1761.157320][ T1495] do_syscall_64+0xc7/0x390 [ 1761.161842][ T1495] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1761.167793][ T1495] RIP: 0033:0x45c479 [ 1761.171769][ T1495] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1761.191379][ T1495] RSP: 002b:00007fb2f9cddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1761.199798][ T1495] RAX: ffffffffffffffda RBX: 00007fb2f9cde6d4 RCX: 000000000045c479 [ 1761.207763][ T1495] RDX: 0000000020000240 RSI: 0000000000000005 RDI: 0000000000000005 [ 1761.215736][ T1495] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1761.223700][ T1495] R10: 02008000fffffffe R11: 0000000000000246 R12: 0000000000000006 [ 1761.231665][ T1495] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000000 [ 1761.279879][ T1509] BPF:[1] Invalid name_offset:1207959552 [ 1761.304578][ T1509] BPF:[1] Invalid name_offset:1207959552 04:12:01 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x4c000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:01 executing program 5: getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000000)=""/187, &(0x7f00000000c0)=0xbb) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) getsockopt$IP_SET_OP_GET_BYNAME(r2, 0x1, 0x53, &(0x7f0000000100)={0x6, 0x7, 'syz2\x00'}, &(0x7f0000000140)=0x28) setsockopt$inet6_tcp_int(r0, 0x6, 0x1, &(0x7f0000000280)=0x7fff, 0x4) 04:12:01 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x2d000000, 0x8080fffffffe) 04:12:01 executing program 4 (fault-call:10 fault-nth:1): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:01 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x3600, r5}, 0x80, 0x0}}], 0x1, 0x0) [ 1761.451768][ T1625] BPF:[1] Invalid name_offset:1275068416 [ 1761.458470][ T1625] BPF:[1] Invalid name_offset:1275068416 [ 1761.648256][ T1720] FAULT_INJECTION: forcing a failure. [ 1761.648256][ T1720] name failslab, interval 1, probability 0, space 0, times 0 [ 1761.688678][ T1720] CPU: 1 PID: 1720 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1761.697306][ T1720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1761.707352][ T1720] Call Trace: [ 1761.710652][ T1720] dump_stack+0x11d/0x187 [ 1761.714999][ T1720] should_fail.cold+0x5/0xf [ 1761.719526][ T1720] __should_failslab+0x82/0xb0 [ 1761.724349][ T1720] should_failslab+0x5/0xf [ 1761.728846][ T1720] __kmalloc+0x54/0x640 [ 1761.733050][ T1720] ? kmem_cache_alloc_trace+0x1e1/0x5f0 04:12:01 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x386000, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:01 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x51000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:01 executing program 5: r0 = getpid() r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000200)={0xffffff81, 0xb, 0x4, 0x1000, 0x3, {0x0, 0x7530}, {0x3, 0x2, 0x12, 0x7, 0x7, 0x5, "8667b557"}, 0xffff, 0x2, @userptr=0x8, 0xd1, 0x0, 0xffffffffffffffff}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x28d07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x2000000000}, 0x428, 0x3, 0xfffffffe, 0x0, 0xffffffffffffffff, 0xffffffff}, r0, 0xfffffffffffffffb, r4, 0x0) r5 = accept4$ax25(r4, &(0x7f0000000000)={{0x3, @null}, [@rose, @null, @bcast, @bcast, @default, @default, @netrom]}, &(0x7f0000000080)=0x48, 0x800) accept4$ax25(r5, &(0x7f00000000c0)={{0x3, @rose}, [@null, @bcast, @rose, @default, @rose, @remote, @rose]}, &(0x7f0000000140)=0x48, 0x800) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r4, 0xc01c64ae, &(0x7f00000001c0)={0x4, 0x1, 0x6, 0x7f, 0xffa, 0x10000, 0xef8}) pipe(&(0x7f0000000380)={0xffffffffffffffff}) getsockopt$inet_udp_int(r7, 0x11, 0xa, &(0x7f00000003c0), &(0x7f0000000400)=0x4) setsockopt$inet6_tcp_int(r6, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) r9 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r8, 0xffffffffffffffff, r9, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(r9, 0x3b71, &(0x7f0000000180)={0x20, 0x1, 0x20, 0x3, 0x1}) [ 1761.738609][ T1720] ? alloc_pipe_info+0x205/0x3d0 [ 1761.743565][ T1720] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1761.749479][ T1720] alloc_pipe_info+0x205/0x3d0 [ 1761.754257][ T1720] splice_direct_to_actor+0x4b8/0x540 [ 1761.759645][ T1720] ? apparmor_file_permission+0x35/0x40 [ 1761.765207][ T1720] ? security_file_permission+0x86/0x270 [ 1761.770843][ T1720] ? apic_timer_interrupt+0xa/0x20 [ 1761.775964][ T1720] ? generic_pipe_buf_nosteal+0x20/0x20 [ 1761.781585][ T1720] do_splice_direct+0x152/0x1d0 [ 1761.786455][ T1720] do_sendfile+0x396/0x810 [ 1761.790896][ T1720] __x64_sys_sendfile64+0xb8/0x140 [ 1761.796080][ T1720] do_syscall_64+0xc7/0x390 [ 1761.800602][ T1720] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1761.811356][ T1720] RIP: 0033:0x45c479 [ 1761.815271][ T1720] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1761.834843][ T1862] BPF:[1] Invalid name_offset:1358954496 [ 1761.834877][ T1720] RSP: 002b:00007fb2f9cddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1761.834893][ T1720] RAX: ffffffffffffffda RBX: 00007fb2f9cde6d4 RCX: 000000000045c479 [ 1761.834903][ T1720] RDX: 0000000020000240 RSI: 0000000000000005 RDI: 0000000000000005 [ 1761.834912][ T1720] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1761.834930][ T1720] R10: 02008000fffffffe R11: 0000000000000246 R12: 0000000000000006 [ 1761.865258][ T1862] BPF:[1] Invalid name_offset:1358954496 [ 1761.872958][ T1720] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000001 04:12:01 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:12:01 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x36000000, 0x8080fffffffe) 04:12:01 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x60000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200000, 0x0) getsockname$netrom(r1, &(0x7f0000000080)={{0x3, @bcast}, [@bcast, @null, @bcast, @netrom, @remote, @bcast, @null, @bcast]}, &(0x7f0000000100)=0x48) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e24, @rand_addr=0xa4}, @in6={0xa, 0x4e22, 0x24, @mcast1, 0x6}], 0x3c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:12:01 executing program 4 (fault-call:10 fault-nth:2): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) [ 1762.119889][ T1981] BPF:[1] Invalid name_offset:1610612736 [ 1762.148697][ T1981] BPF:[1] Invalid name_offset:1610612736 04:12:02 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0xee05, r5}, 0x80, 0x0}}], 0x1, 0x0) 04:12:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000fee000/0x11000)=nil, 0x11000, 0x2000000, 0x110, r2, 0x10000000) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r4, 0x0) ioctl$TIOCMBIC(r4, 0x5417, &(0x7f0000000000)=0x80000001) 04:12:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x3f000000, 0x8080fffffffe) 04:12:02 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x68000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1762.363501][ T2094] FAULT_INJECTION: forcing a failure. [ 1762.363501][ T2094] name failslab, interval 1, probability 0, space 0, times 0 [ 1762.387689][ T2094] CPU: 0 PID: 2094 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1762.396931][ T2094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1762.406992][ T2094] Call Trace: [ 1762.410285][ T2094] dump_stack+0x11d/0x187 [ 1762.414602][ T2094] should_fail.cold+0x5/0xf [ 1762.419094][ T2094] __should_failslab+0x82/0xb0 [ 1762.423852][ T2094] should_failslab+0x5/0xf [ 1762.428256][ T2094] __kmalloc+0x54/0x640 [ 1762.432482][ T2094] ? iter_file_splice_write+0x120/0x830 [ 1762.438128][ T2094] iter_file_splice_write+0x120/0x830 [ 1762.443557][ T2094] ? page_cache_pipe_buf_release+0xf0/0xf0 [ 1762.449360][ T2094] direct_splice_actor+0x97/0xb0 [ 1762.454306][ T2094] splice_direct_to_actor+0x22f/0x540 [ 1762.460712][ T2094] ? generic_pipe_buf_nosteal+0x20/0x20 [ 1762.466269][ T2094] do_splice_direct+0x152/0x1d0 [ 1762.471154][ T2094] do_sendfile+0x396/0x810 [ 1762.475603][ T2094] __x64_sys_sendfile64+0xb8/0x140 [ 1762.480710][ T2094] do_syscall_64+0xc7/0x390 [ 1762.485235][ T2094] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1762.491188][ T2094] RIP: 0033:0x45c479 [ 1762.496334][ T2094] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1762.515927][ T2094] RSP: 002b:00007fb2f9cddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1762.524336][ T2094] RAX: ffffffffffffffda RBX: 00007fb2f9cde6d4 RCX: 000000000045c479 [ 1762.532306][ T2094] RDX: 0000000020000240 RSI: 0000000000000005 RDI: 0000000000000005 [ 1762.540304][ T2094] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1762.548301][ T2094] R10: 02008000fffffffe R11: 0000000000000246 R12: 0000000000000006 [ 1762.556340][ T2094] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000002 [ 1762.655400][ T2107] BPF:[1] Invalid name_offset:1744830464 [ 1762.688294][ T2107] BPF:[1] Invalid name_offset:1744830464 04:12:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x386600, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x9f467e8a6a77b751, &(0x7f0000000280)=0x9, 0x4) 04:12:02 executing program 4 (fault-call:10 fault-nth:3): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:02 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x6c000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x40000000, 0x8080fffffffe) [ 1762.934703][ T2320] FAULT_INJECTION: forcing a failure. [ 1762.934703][ T2320] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1762.966268][ T2329] BPF:[1] Invalid name_offset:1811939328 [ 1762.977433][ T2320] CPU: 1 PID: 2320 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1762.986062][ T2320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1762.996272][ T2320] Call Trace: [ 1762.999648][ T2320] dump_stack+0x11d/0x187 [ 1763.004073][ T2320] should_fail.cold+0x5/0xf [ 1763.008602][ T2320] __alloc_pages_nodemask+0xcf/0x310 [ 1763.013913][ T2320] alloc_pages_current+0xca/0x170 [ 1763.018995][ T2320] __page_cache_alloc+0x17f/0x1a0 [ 1763.024053][ T2320] pagecache_get_page+0x251/0x700 [ 1763.029110][ T2320] ? __read_once_size+0x2f/0xd0 [ 1763.034077][ T2320] ? apic_timer_interrupt+0xa/0x20 [ 1763.039191][ T2320] grab_cache_page_write_begin+0x56/0x80 [ 1763.044877][ T2320] simple_write_begin+0x4e/0x270 [ 1763.049822][ T2320] generic_perform_write+0x13a/0x320 [ 1763.055115][ T2320] __generic_file_write_iter+0x240/0x370 [ 1763.060763][ T2320] generic_file_write_iter+0x294/0x38e [ 1763.066261][ T2320] do_iter_readv_writev+0x4a7/0x5d0 [ 1763.071463][ T2320] do_iter_write+0x137/0x3a0 [ 1763.076073][ T2320] vfs_iter_write+0x56/0x80 [ 1763.080644][ T2320] iter_file_splice_write+0x530/0x830 [ 1763.086044][ T2320] ? page_cache_pipe_buf_release+0xf0/0xf0 [ 1763.092017][ T2320] direct_splice_actor+0x97/0xb0 [ 1763.096978][ T2320] splice_direct_to_actor+0x22f/0x540 [ 1763.102374][ T2320] ? generic_pipe_buf_nosteal+0x20/0x20 [ 1763.107920][ T2320] do_splice_direct+0x152/0x1d0 [ 1763.112774][ T2320] do_sendfile+0x396/0x810 [ 1763.117224][ T2320] __x64_sys_sendfile64+0xb8/0x140 [ 1763.122342][ T2320] do_syscall_64+0xc7/0x390 [ 1763.126862][ T2320] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1763.132743][ T2320] RIP: 0033:0x45c479 [ 1763.136723][ T2320] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1763.156319][ T2320] RSP: 002b:00007fb2f9cddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1763.165000][ T2320] RAX: ffffffffffffffda RBX: 00007fb2f9cde6d4 RCX: 000000000045c479 [ 1763.172979][ T2320] RDX: 0000000020000240 RSI: 0000000000000005 RDI: 0000000000000005 04:12:03 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0) 04:12:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) [ 1763.180942][ T2320] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1763.188931][ T2320] R10: 02008000fffffffe R11: 0000000000000246 R12: 0000000000000006 [ 1763.196899][ T2320] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000003 04:12:03 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000004}, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x1}, r2, 0xffffffffffffffff, r1, 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x7, 0x200680) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r7, 0xffffffffffffffff, r8, 0x0) r9 = getpid() sched_setscheduler(r9, 0x5, &(0x7f0000000380)) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r9, 0xffffffffffffffff, r10, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000400)={r10}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r11, 0x800448d2, &(0x7f00000006c0)={0x4, &(0x7f0000000440)=[{}, {@fixed}, {@none}, {}]}) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x44, r6, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipvlan1\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xf}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r6, 0xec954fab286f28fd, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xc00c050}, 0x890) sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r6, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="5d95f35af6ba20062a8f558963bdb9ed"}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x880}, 0x4000804) setsockopt$inet6_tcp_int(r1, 0x6, 0x7, &(0x7f0000000280)=0x9, 0x4) [ 1763.274062][ T2329] BPF:[1] Invalid name_offset:1811939328 04:12:03 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x48000000, 0x8080fffffffe) [ 1763.381515][ T2446] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1763.406591][ T2446] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:03 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x74000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000000)={'veth0_to_batadv\x00', {0x2, 0x4e22, @remote}}) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) [ 1763.534316][ T2458] BPF:[1] Invalid name_offset:1946157056 [ 1763.541403][ T2458] BPF:[1] Invalid name_offset:1946157056 04:12:03 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x7a000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1763.705864][ T2574] BPF:[1] Invalid name_offset:2046820352 [ 1763.718740][ T2574] BPF:[1] Invalid name_offset:2046820352 04:12:03 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x386800, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:03 executing program 4 (fault-call:10 fault-nth:4): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:03 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x4}, 0x80, 0x0}}], 0x1, 0x0) 04:12:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, r2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r4, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xb0, r4, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x56}]}, @TIPC_NLA_MEDIA={0x70, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x43104e95}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc00}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004810) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) 04:12:03 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x51000000, 0x8080fffffffe) 04:12:03 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0xec000000, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1763.927997][ T2800] BPF:[1] Invalid name_offset:3959422976 [ 1763.954076][ T2800] BPF:[1] Invalid name_offset:3959422976 04:12:03 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0xffff0f00, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1764.069525][ T2802] FAULT_INJECTION: forcing a failure. [ 1764.069525][ T2802] name failslab, interval 1, probability 0, space 0, times 0 [ 1764.092477][ T2802] CPU: 0 PID: 2802 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1764.101107][ T2802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1764.111195][ T2802] Call Trace: [ 1764.114578][ T2802] dump_stack+0x11d/0x187 [ 1764.118934][ T2802] should_fail.cold+0x5/0xf [ 1764.123508][ T2802] __should_failslab+0x82/0xb0 [ 1764.128282][ T2802] should_failslab+0x5/0xf [ 1764.132700][ T2802] __kmalloc+0x54/0x640 [ 1764.136869][ T2802] ? iter_file_splice_write+0x120/0x830 [ 1764.142444][ T2802] iter_file_splice_write+0x120/0x830 [ 1764.147887][ T2802] ? page_cache_pipe_buf_release+0xf0/0xf0 [ 1764.153710][ T2802] direct_splice_actor+0x97/0xb0 [ 1764.158667][ T2802] splice_direct_to_actor+0x22f/0x540 [ 1764.164100][ T2802] ? generic_pipe_buf_nosteal+0x20/0x20 [ 1764.169662][ T2802] do_splice_direct+0x152/0x1d0 [ 1764.174567][ T2802] do_sendfile+0x396/0x810 [ 1764.179029][ T2802] __x64_sys_sendfile64+0xb8/0x140 [ 1764.184258][ T2802] do_syscall_64+0xc7/0x390 [ 1764.188845][ T2802] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1764.194781][ T2802] RIP: 0033:0x45c479 [ 1764.198678][ T2802] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1764.218300][ T2802] RSP: 002b:00007fb2f9cddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1764.226723][ T2802] RAX: ffffffffffffffda RBX: 00007fb2f9cde6d4 RCX: 000000000045c479 [ 1764.234709][ T2802] RDX: 0000000020000240 RSI: 0000000000000005 RDI: 0000000000000005 [ 1764.242748][ T2802] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1764.250727][ T2802] R10: 02008000fffffffe R11: 0000000000000246 R12: 0000000000000006 [ 1764.258703][ T2802] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000004 04:12:04 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x5a000000, 0x8080fffffffe) 04:12:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x283941, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_REG(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="010a00000006000000001ff82d0cd7c0e333ed3744f67ef3bf603a639b8419ae25f4fa37f11bb6e7f7c1064c4eb1f822b785ae3a8712fd53e1f105d11aa97ebf7427875dba952571720b48b00d5f4e924039b5c917760cf98b7809073c74c981a32644f3a5bf2da31e9b397383c56c10890e959b4c2cb4e27da52ff4a3bdca579e41526863239bb0445fa88f4f30e2e4070a8be4dcc990194f86bfe681273b87a876172c08803c389c81f89b733c9ef31be66286a0516dcd759f701d36"], 0x14}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000840)=0xe8) r7 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r7, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getpeername$packet(r9, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r7, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r10}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="b2ab61cd1a82dbc522c3a58725c6", 0xe}], 0x1}}], 0x1, 0x0) accept$packet(r1, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e40)=0x14) r12 = getpid() sched_setscheduler(r12, 0x5, &(0x7f0000000380)) r13 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r12, 0xffffffffffffffff, r13, 0x0) accept$packet(r13, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000f80)=0x14) sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000001080)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001040)={&(0x7f0000000fc0)={0x50, r5, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8000}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r11}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r14}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008040) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'ip6_vti0\x00', 0x8000}) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000280)=0x9, 0x4) [ 1764.292143][ T2920] BPF:[1] Invalid name_offset:4294905600 [ 1764.308242][ T2920] BPF:[1] Invalid name_offset:4294905600 04:12:04 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0xffffff00, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:04 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0xe}, 0x80, 0x0}}], 0x1, 0x0) [ 1764.436265][ T3034] BPF:[1] Invalid name_offset:4294967040 [ 1764.443028][ T3034] BPF:[1] Invalid name_offset:4294967040 04:12:04 executing program 4 (fault-call:10 fault-nth:5): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) [ 1764.717708][ T3150] FAULT_INJECTION: forcing a failure. [ 1764.717708][ T3150] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1764.732832][ T3150] CPU: 1 PID: 3150 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1764.741450][ T3150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1764.751510][ T3150] Call Trace: [ 1764.754845][ T3150] dump_stack+0x11d/0x187 [ 1764.759286][ T3150] should_fail.cold+0x5/0xf [ 1764.763811][ T3150] __alloc_pages_nodemask+0xcf/0x310 [ 1764.769122][ T3150] alloc_pages_current+0xca/0x170 [ 1764.774252][ T3150] __page_cache_alloc+0x17f/0x1a0 [ 1764.779357][ T3150] pagecache_get_page+0x251/0x700 [ 1764.784415][ T3150] ? __read_once_size+0x2f/0xd0 [ 1764.789271][ T3150] grab_cache_page_write_begin+0x56/0x80 [ 1764.794906][ T3150] simple_write_begin+0x4e/0x270 [ 1764.799876][ T3150] generic_perform_write+0x13a/0x320 [ 1764.805167][ T3150] __generic_file_write_iter+0x240/0x370 [ 1764.810821][ T3150] generic_file_write_iter+0x294/0x38e [ 1764.816710][ T3150] do_iter_readv_writev+0x4a7/0x5d0 [ 1764.821911][ T3150] do_iter_write+0x137/0x3a0 [ 1764.826544][ T3150] vfs_iter_write+0x56/0x80 [ 1764.831046][ T3150] iter_file_splice_write+0x530/0x830 [ 1764.836441][ T3150] ? page_cache_pipe_buf_release+0xf0/0xf0 [ 1764.842334][ T3150] direct_splice_actor+0x97/0xb0 [ 1764.847311][ T3150] splice_direct_to_actor+0x22f/0x540 [ 1764.852713][ T3150] ? generic_pipe_buf_nosteal+0x20/0x20 [ 1764.858283][ T3150] do_splice_direct+0x152/0x1d0 [ 1764.863171][ T3150] do_sendfile+0x396/0x810 [ 1764.867848][ T3150] __x64_sys_sendfile64+0xb8/0x140 [ 1764.873080][ T3150] do_syscall_64+0xc7/0x390 [ 1764.877586][ T3150] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1764.883481][ T3150] RIP: 0033:0x45c479 [ 1764.887381][ T3150] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1764.906987][ T3150] RSP: 002b:00007fb2f9cddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1764.915501][ T3150] RAX: ffffffffffffffda RBX: 00007fb2f9cde6d4 RCX: 000000000045c479 [ 1764.923465][ T3150] RDX: 0000000020000240 RSI: 0000000000000005 RDI: 0000000000000005 [ 1764.931442][ T3150] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1764.939405][ T3150] R10: 02008000fffffffe R11: 0000000000000246 R12: 0000000000000006 [ 1764.947396][ T3150] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000005 04:12:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x386c00, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:04 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:04 executing program 5 (fault-call:11 fault-nth:0): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:04 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x63000000, 0x8080fffffffe) [ 1765.099374][ T3289] BPF: (anon) type_id=218103813 bits_offset=0 [ 1765.136054][ T3289] BPF: [ 1765.143952][ T3289] BPF:Invalid type_id [ 1765.160831][ T3289] BPF: [ 1765.160831][ T3289] [ 1765.166801][ T3288] FAULT_INJECTION: forcing a failure. [ 1765.166801][ T3288] name failslab, interval 1, probability 0, space 0, times 0 [ 1765.183455][ T3288] CPU: 0 PID: 3288 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1765.192078][ T3288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1765.202144][ T3288] Call Trace: [ 1765.205502][ T3288] dump_stack+0x11d/0x187 04:12:05 executing program 4 (fault-call:10 fault-nth:6): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:05 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1765.209854][ T3288] should_fail.cold+0x5/0xf [ 1765.214378][ T3288] __should_failslab+0x82/0xb0 [ 1765.219174][ T3288] should_failslab+0x5/0xf [ 1765.223623][ T3288] kmem_cache_alloc_trace+0x26/0x5f0 [ 1765.228981][ T3288] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1765.234898][ T3288] alloc_pipe_info+0xf3/0x3d0 [ 1765.239658][ T3288] splice_direct_to_actor+0x4b8/0x540 [ 1765.245130][ T3288] ? apparmor_file_permission+0x35/0x40 [ 1765.250699][ T3288] ? security_file_permission+0x86/0x270 [ 1765.256349][ T3288] ? generic_pipe_buf_nosteal+0x20/0x20 [ 1765.261921][ T3288] do_splice_direct+0x152/0x1d0 [ 1765.266795][ T3288] do_sendfile+0x396/0x810 [ 1765.271237][ T3288] __x64_sys_sendfile64+0xb8/0x140 [ 1765.276365][ T3288] do_syscall_64+0xc7/0x390 [ 1765.280911][ T3288] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1765.286804][ T3288] RIP: 0033:0x45c479 [ 1765.290706][ T3288] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1765.296487][ T3422] BPF: (anon) type_id=218103813 bits_offset=0 [ 1765.310311][ T3288] RSP: 002b:00007fb7c8bb8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1765.310394][ T3288] RAX: ffffffffffffffda RBX: 00007fb7c8bb96d4 RCX: 000000000045c479 [ 1765.325148][ T3422] BPF: [ 1765.332844][ T3288] RDX: 0000000020000240 RSI: 0000000000000005 RDI: 0000000000000005 [ 1765.332855][ T3288] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1765.332866][ T3288] R10: 02008000fffffffe R11: 0000000000000246 R12: 0000000000000006 [ 1765.332875][ T3288] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000000 04:12:05 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x6c000000, 0x8080fffffffe) 04:12:05 executing program 5 (fault-call:11 fault-nth:1): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:05 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x11}, 0x80, 0x0}}], 0x1, 0x0) [ 1765.505752][ T3543] FAULT_INJECTION: forcing a failure. [ 1765.505752][ T3543] name failslab, interval 1, probability 0, space 0, times 0 [ 1765.518976][ T3422] BPF:Invalid type_id [ 1765.523812][ T3422] BPF: [ 1765.523812][ T3422] [ 1765.571692][ T3543] CPU: 1 PID: 3543 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1765.580358][ T3543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1765.590419][ T3543] Call Trace: [ 1765.593764][ T3543] dump_stack+0x11d/0x187 [ 1765.598213][ T3543] should_fail.cold+0x5/0xf [ 1765.602773][ T3543] __should_failslab+0x82/0xb0 [ 1765.607550][ T3543] should_failslab+0x5/0xf [ 1765.611974][ T3543] __kmalloc+0x54/0x640 [ 1765.616187][ T3543] ? iter_file_splice_write+0x120/0x830 [ 1765.621766][ T3543] iter_file_splice_write+0x120/0x830 [ 1765.627248][ T3543] ? page_cache_pipe_buf_release+0xf0/0xf0 [ 1765.633070][ T3543] direct_splice_actor+0x97/0xb0 [ 1765.638035][ T3543] splice_direct_to_actor+0x22f/0x540 [ 1765.643418][ T3543] ? generic_pipe_buf_nosteal+0x20/0x20 [ 1765.648996][ T3543] do_splice_direct+0x152/0x1d0 [ 1765.653952][ T3543] do_sendfile+0x396/0x810 [ 1765.658515][ T3543] __x64_sys_sendfile64+0xb8/0x140 [ 1765.663670][ T3543] do_syscall_64+0xc7/0x390 [ 1765.668201][ T3543] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1765.674099][ T3543] RIP: 0033:0x45c479 [ 1765.678009][ T3543] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1765.697737][ T3543] RSP: 002b:00007fb2f9cddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1765.706213][ T3543] RAX: ffffffffffffffda RBX: 00007fb2f9cde6d4 RCX: 000000000045c479 [ 1765.714194][ T3543] RDX: 0000000020000240 RSI: 0000000000000005 RDI: 0000000000000005 04:12:05 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1765.722217][ T3543] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1765.730300][ T3543] R10: 02008000fffffffe R11: 0000000000000246 R12: 0000000000000006 [ 1765.738278][ T3543] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000006 [ 1765.745865][ T3548] FAULT_INJECTION: forcing a failure. [ 1765.745865][ T3548] name failslab, interval 1, probability 0, space 0, times 0 04:12:05 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x75000000, 0x8080fffffffe) [ 1765.802679][ T3548] CPU: 0 PID: 3548 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1765.811423][ T3548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1765.821489][ T3548] Call Trace: [ 1765.824809][ T3548] dump_stack+0x11d/0x187 [ 1765.829224][ T3548] should_fail.cold+0x5/0xf [ 1765.833842][ T3548] __should_failslab+0x82/0xb0 [ 1765.842097][ T3548] should_failslab+0x5/0xf [ 1765.846629][ T3548] __kmalloc+0x54/0x640 [ 1765.850819][ T3548] ? kmem_cache_alloc_trace+0x1e1/0x5f0 [ 1765.856364][ T3548] ? alloc_pipe_info+0x205/0x3d0 [ 1765.861330][ T3548] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1765.867329][ T3548] alloc_pipe_info+0x205/0x3d0 [ 1765.872115][ T3548] splice_direct_to_actor+0x4b8/0x540 [ 1765.876388][ T3587] BPF: (anon) type_id=218103813 bits_offset=0 [ 1765.877624][ T3548] ? apparmor_file_permission+0x35/0x40 [ 1765.877654][ T3548] ? security_file_permission+0x86/0x270 [ 1765.894914][ T3548] ? generic_pipe_buf_nosteal+0x20/0x20 04:12:05 executing program 4 (fault-call:10 fault-nth:7): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) [ 1765.900487][ T3548] do_splice_direct+0x152/0x1d0 [ 1765.905440][ T3548] do_sendfile+0x396/0x810 [ 1765.909885][ T3548] __x64_sys_sendfile64+0xb8/0x140 [ 1765.915041][ T3548] do_syscall_64+0xc7/0x390 [ 1765.917179][ T3587] BPF: [ 1765.919598][ T3548] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1765.919652][ T3548] RIP: 0033:0x45c479 [ 1765.932194][ T3548] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1765.951024][ T3587] BPF:Invalid type_id [ 1765.951998][ T3548] RSP: 002b:00007fb7c8bb8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1765.952015][ T3548] RAX: ffffffffffffffda RBX: 00007fb7c8bb96d4 RCX: 000000000045c479 [ 1765.952034][ T3548] RDX: 0000000020000240 RSI: 0000000000000005 RDI: 0000000000000005 [ 1765.956186][ T3587] BPF: [ 1765.956186][ T3587] [ 1765.964462][ T3548] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1765.964473][ T3548] R10: 02008000fffffffe R11: 0000000000000246 R12: 0000000000000006 04:12:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x387400, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) [ 1765.964482][ T3548] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000001 04:12:05 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x8, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:06 executing program 5 (fault-call:11 fault-nth:2): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:06 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x79000000, 0x8080fffffffe) [ 1766.239338][ T3775] FAULT_INJECTION: forcing a failure. [ 1766.239338][ T3775] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1766.304872][ T3786] BPF:[1] UNION (anon) [ 1766.328663][ T3775] CPU: 1 PID: 3775 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1766.337318][ T3775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1766.347473][ T3775] Call Trace: [ 1766.350779][ T3775] dump_stack+0x11d/0x187 [ 1766.354424][ T3788] FAULT_INJECTION: forcing a failure. [ 1766.354424][ T3788] name failslab, interval 1, probability 0, space 0, times 0 [ 1766.355133][ T3775] should_fail.cold+0x5/0xf [ 1766.372271][ T3775] __alloc_pages_nodemask+0xcf/0x310 [ 1766.377570][ T3775] alloc_pages_current+0xca/0x170 [ 1766.382604][ T3775] __page_cache_alloc+0x17f/0x1a0 [ 1766.387633][ T3775] pagecache_get_page+0x251/0x700 [ 1766.392660][ T3775] ? __read_once_size+0x2f/0xd0 [ 1766.397589][ T3775] ? apic_timer_interrupt+0xa/0x20 [ 1766.402703][ T3775] grab_cache_page_write_begin+0x56/0x80 [ 1766.408344][ T3775] simple_write_begin+0x4e/0x270 [ 1766.413297][ T3775] ? generic_perform_write+0xe0/0x320 [ 1766.418818][ T3775] generic_perform_write+0x13a/0x320 [ 1766.424200][ T3775] __generic_file_write_iter+0x240/0x370 [ 1766.429841][ T3775] generic_file_write_iter+0x294/0x38e [ 1766.435325][ T3775] do_iter_readv_writev+0x4a7/0x5d0 [ 1766.440537][ T3775] do_iter_write+0x137/0x3a0 [ 1766.445136][ T3775] ? __kmalloc+0x21c/0x640 [ 1766.449670][ T3775] vfs_iter_write+0x56/0x80 [ 1766.454176][ T3775] iter_file_splice_write+0x530/0x830 [ 1766.459585][ T3775] ? page_cache_pipe_buf_release+0xf0/0xf0 [ 1766.465393][ T3775] direct_splice_actor+0x97/0xb0 [ 1766.470352][ T3775] splice_direct_to_actor+0x22f/0x540 [ 1766.475747][ T3775] ? generic_pipe_buf_nosteal+0x20/0x20 [ 1766.481298][ T3775] do_splice_direct+0x152/0x1d0 [ 1766.486158][ T3775] do_sendfile+0x396/0x810 [ 1766.490592][ T3775] __x64_sys_sendfile64+0xb8/0x140 [ 1766.495713][ T3775] do_syscall_64+0xc7/0x390 [ 1766.500228][ T3775] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1766.506123][ T3775] RIP: 0033:0x45c479 [ 1766.510026][ T3775] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1766.529646][ T3775] RSP: 002b:00007fb2f9cddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1766.538065][ T3775] RAX: ffffffffffffffda RBX: 00007fb2f9cde6d4 RCX: 000000000045c479 [ 1766.546049][ T3775] RDX: 0000000020000240 RSI: 0000000000000005 RDI: 0000000000000005 [ 1766.554017][ T3775] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1766.562010][ T3775] R10: 02008000fffffffe R11: 0000000000000246 R12: 0000000000000006 [ 1766.569981][ T3775] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000007 04:12:06 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x36}, 0x80, 0x0}}], 0x1, 0x0) [ 1766.578122][ T3788] CPU: 0 PID: 3788 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1766.586722][ T3788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1766.591319][ T3786] BPF: [ 1766.596773][ T3788] Call Trace: [ 1766.596855][ T3788] dump_stack+0x11d/0x187 [ 1766.596883][ T3788] should_fail.cold+0x5/0xf [ 1766.605360][ T3786] BPF:meta_left:64 meta_needed:96 [ 1766.607283][ T3788] __should_failslab+0x82/0xb0 [ 1766.607349][ T3788] should_failslab+0x5/0xf [ 1766.621294][ T3786] BPF: [ 1766.621294][ T3786] [ 1766.621660][ T3788] __kmalloc+0x54/0x640 [ 1766.621687][ T3788] ? iter_file_splice_write+0x120/0x830 [ 1766.641229][ T3788] iter_file_splice_write+0x120/0x830 [ 1766.646652][ T3788] ? page_cache_pipe_buf_release+0xf0/0xf0 [ 1766.652471][ T3788] direct_splice_actor+0x97/0xb0 [ 1766.657428][ T3788] splice_direct_to_actor+0x22f/0x540 [ 1766.662815][ T3788] ? generic_pipe_buf_nosteal+0x20/0x20 [ 1766.668382][ T3788] do_splice_direct+0x152/0x1d0 [ 1766.673259][ T3788] do_sendfile+0x396/0x810 04:12:06 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x25, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1766.677744][ T3788] __x64_sys_sendfile64+0xb8/0x140 [ 1766.682897][ T3788] do_syscall_64+0xc7/0x390 [ 1766.687420][ T3788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1766.693315][ T3788] RIP: 0033:0x45c479 [ 1766.697328][ T3788] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1766.716939][ T3788] RSP: 002b:00007fb7c8bb8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1766.725414][ T3788] RAX: ffffffffffffffda RBX: 00007fb7c8bb96d4 RCX: 000000000045c479 [ 1766.733392][ T3788] RDX: 0000000020000240 RSI: 0000000000000005 RDI: 0000000000000005 [ 1766.741467][ T3788] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1766.749437][ T3788] R10: 02008000fffffffe R11: 0000000000000246 R12: 0000000000000006 [ 1766.757457][ T3788] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000002 04:12:06 executing program 5 (fault-call:11 fault-nth:3): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) [ 1766.794464][ T3906] BPF:[1] UNION (anon) [ 1766.808664][ T3906] BPF: [ 1766.831693][ T3906] BPF:meta_left:64 meta_needed:444 [ 1766.863745][ T3906] BPF: [ 1766.863745][ T3906] 04:12:06 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x3b, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:06 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x387530, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) [ 1767.041160][ T4124] BPF:[1] UNION (anon) [ 1767.045353][ T4124] BPF: [ 1767.048194][ T4124] BPF:meta_left:64 meta_needed:708 [ 1767.056693][ T4124] BPF: [ 1767.056693][ T4124] [ 1767.064553][ T4124] BPF:[1] UNION (anon) [ 1767.068881][ T4124] BPF: [ 1767.072090][ T4124] BPF:meta_left:64 meta_needed:708 [ 1767.077560][ T4124] BPF: [ 1767.077560][ T4124] 04:12:06 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:06 executing program 4 (fault-call:10 fault-nth:8): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:06 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x7e000000, 0x8080fffffffe) 04:12:06 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x3ab, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:07 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x5ee}, 0x80, 0x0}}], 0x1, 0x0) [ 1767.278233][ T4236] BPF:[1] UNION (anon) [ 1767.297953][ T4236] BPF: [ 1767.309914][ T4236] BPF:meta_left:64 meta_needed:11268 [ 1767.347265][ T4236] BPF: [ 1767.347265][ T4236] 04:12:07 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:07 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x7f510100, 0x8080fffffffe) [ 1767.539280][ T4243] FAULT_INJECTION: forcing a failure. [ 1767.539280][ T4243] name failslab, interval 1, probability 0, space 0, times 0 [ 1767.616115][ T4243] CPU: 1 PID: 4243 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1767.624747][ T4243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1767.634807][ T4243] Call Trace: [ 1767.638112][ T4243] dump_stack+0x11d/0x187 [ 1767.642495][ T4243] should_fail.cold+0x5/0xf [ 1767.647027][ T4243] __should_failslab+0x82/0xb0 [ 1767.651794][ T4243] should_failslab+0x5/0xf [ 1767.656338][ T4243] __kmalloc+0x54/0x640 [ 1767.660539][ T4243] ? iter_file_splice_write+0x120/0x830 [ 1767.666261][ T4243] iter_file_splice_write+0x120/0x830 [ 1767.671666][ T4243] ? page_cache_pipe_buf_release+0xf0/0xf0 [ 1767.677482][ T4243] direct_splice_actor+0x97/0xb0 [ 1767.682432][ T4243] splice_direct_to_actor+0x22f/0x540 [ 1767.687812][ T4243] ? generic_pipe_buf_nosteal+0x20/0x20 [ 1767.693404][ T4243] do_splice_direct+0x152/0x1d0 [ 1767.698271][ T4243] do_sendfile+0x396/0x810 [ 1767.702747][ T4243] __x64_sys_sendfile64+0xb8/0x140 [ 1767.707874][ T4243] do_syscall_64+0xc7/0x390 [ 1767.712388][ T4243] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1767.718279][ T4243] RIP: 0033:0x45c479 [ 1767.722276][ T4243] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1767.742100][ T4243] RSP: 002b:00007fb2f9cddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1767.750525][ T4243] RAX: ffffffffffffffda RBX: 00007fb2f9cde6d4 RCX: 000000000045c479 [ 1767.758561][ T4243] RDX: 0000000020000240 RSI: 0000000000000005 RDI: 0000000000000005 [ 1767.766535][ T4243] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1767.774511][ T4243] R10: 02008000fffffffe R11: 0000000000000246 R12: 0000000000000006 [ 1767.782583][ T4243] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000008 [ 1767.864166][ T4361] BPF: (anon) type_id=2 bits_offset=0 [ 1767.882802][ T4361] BPF: [ 1767.886923][ T4361] BPF:Invalid member [ 1767.891141][ T4361] BPF: [ 1767.891141][ T4361] 04:12:07 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x2, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:07 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x87000000, 0x8080fffffffe) 04:12:07 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0xe00}, 0x80, 0x0}}], 0x1, 0x0) 04:12:07 executing program 4 (fault-call:10 fault-nth:9): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:07 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x387800, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) [ 1768.085326][ T4576] BPF:[1] Invalid btf_info:5020001 [ 1768.108346][ T4576] BPF:[1] Invalid btf_info:5020001 [ 1768.434024][ T4694] FAULT_INJECTION: forcing a failure. [ 1768.434024][ T4694] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1768.480598][ T4694] CPU: 1 PID: 4694 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1768.489319][ T4694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1768.499450][ T4694] Call Trace: [ 1768.502763][ T4694] dump_stack+0x11d/0x187 [ 1768.507102][ T4694] should_fail.cold+0x5/0xf [ 1768.511620][ T4694] __alloc_pages_nodemask+0xcf/0x310 [ 1768.516997][ T4694] alloc_pages_current+0xca/0x170 [ 1768.522042][ T4694] __page_cache_alloc+0x17f/0x1a0 [ 1768.527072][ T4694] pagecache_get_page+0x251/0x700 [ 1768.532129][ T4694] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 1768.537688][ T4694] grab_cache_page_write_begin+0x56/0x80 [ 1768.543340][ T4694] simple_write_begin+0x4e/0x270 [ 1768.548290][ T4694] generic_perform_write+0x13a/0x320 [ 1768.553661][ T4694] __generic_file_write_iter+0x240/0x370 [ 1768.559325][ T4694] generic_file_write_iter+0x294/0x38e [ 1768.564800][ T4694] do_iter_readv_writev+0x4a7/0x5d0 [ 1768.570047][ T4694] do_iter_write+0x137/0x3a0 [ 1768.574669][ T4694] vfs_iter_write+0x56/0x80 [ 1768.579176][ T4694] iter_file_splice_write+0x530/0x830 [ 1768.584569][ T4694] ? page_cache_pipe_buf_release+0xf0/0xf0 [ 1768.590378][ T4694] direct_splice_actor+0x97/0xb0 [ 1768.595326][ T4694] splice_direct_to_actor+0x22f/0x540 [ 1768.600707][ T4694] ? generic_pipe_buf_nosteal+0x20/0x20 [ 1768.606267][ T4694] do_splice_direct+0x152/0x1d0 [ 1768.611133][ T4694] do_sendfile+0x396/0x810 [ 1768.615571][ T4694] __x64_sys_sendfile64+0xb8/0x140 [ 1768.620696][ T4694] do_syscall_64+0xc7/0x390 [ 1768.625214][ T4694] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1768.631204][ T4694] RIP: 0033:0x45c479 [ 1768.635124][ T4694] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1768.654802][ T4694] RSP: 002b:00007fb2f9cddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1768.663234][ T4694] RAX: ffffffffffffffda RBX: 00007fb2f9cde6d4 RCX: 000000000045c479 [ 1768.671209][ T4694] RDX: 0000000020000240 RSI: 0000000000000005 RDI: 0000000000000005 [ 1768.679365][ T4694] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1768.687552][ T4694] R10: 02008000fffffffe R11: 0000000000000246 R12: 0000000000000006 [ 1768.695534][ T4694] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000009 04:12:08 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x90000000, 0x8080fffffffe) 04:12:08 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x3, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:08 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x2, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:08 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x1100}, 0x80, 0x0}}], 0x1, 0x0) 04:12:08 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x99000000, 0x8080fffffffe) [ 1768.912961][ T4712] BPF:[1] Invalid btf_info:5030001 [ 1768.966740][ T4712] BPF:[1] Invalid btf_info:5030001 04:12:08 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xa2000000, 0x8080fffffffe) 04:12:09 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x387a00, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:09 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x4, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xab000000, 0x8080fffffffe) 04:12:09 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x3600}, 0x80, 0x0}}], 0x1, 0x0) [ 1769.562169][ T4941] BPF:[1] Invalid btf_info:5040001 [ 1769.587235][ T4941] BPF:[1] Invalid btf_info:5040001 04:12:09 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:09 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x5, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xb4000000, 0x8080fffffffe) 04:12:09 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x3, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) [ 1769.876134][ T5060] BPF:[1] Invalid btf_info:5050001 [ 1769.919798][ T5060] BPF:[1] Invalid btf_info:5050001 04:12:09 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0xee05}, 0x80, 0x0}}], 0x1, 0x0) 04:12:09 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x6, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xbd000000, 0x8080fffffffe) [ 1770.190985][ T5283] BPF:[1] Invalid btf_info:5060001 04:12:10 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x3880fe, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) [ 1770.211368][ T5283] BPF:[1] Invalid btf_info:5060001 04:12:10 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x7, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1770.396795][ T5397] BPF:[1] Invalid btf_info:5070001 [ 1770.402828][ T5397] BPF:[1] Invalid btf_info:5070001 04:12:10 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x8, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1770.536138][ T27] audit: type=1800 audit(1583295130.330:1114): pid=5504 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="loop2" ino=236 res=0 [ 1770.572198][ T5509] BPF:[1] Invalid btf_info:5080001 04:12:10 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x34000}, 0x80, 0x0}}], 0x1, 0x0) 04:12:10 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x2, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) [ 1770.584872][ T5509] BPF:[1] Invalid btf_info:5080001 04:12:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xc0000000, 0x8080fffffffe) 04:12:10 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0xa, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xc3000000, 0x8080fffffffe) [ 1770.985647][ T5633] BPF:[1] Invalid btf_info:50a0001 [ 1770.991658][ T5633] BPF:[1] Invalid btf_info:50a0001 04:12:11 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x48, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:11 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x40000}, 0x80, 0x0}}], 0x1, 0x0) 04:12:11 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x4, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x38c0fe, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xc6000000, 0x8080fffffffe) [ 1771.493861][ T5856] BPF:[1] Invalid btf_info:5480001 [ 1771.499930][ T5856] BPF:[1] Invalid btf_info:5480001 04:12:11 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x4c, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:11 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x10, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xc9000000, 0x8080fffffffe) 04:12:11 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x400300}, 0x80, 0x0}}], 0x1, 0x0) [ 1771.823018][ T5975] BPF:[1] Invalid btf_info:54c0001 [ 1771.829326][ T5975] BPF:[1] Invalid btf_info:54c0001 04:12:11 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x5, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:11 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x51, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1772.172737][ T6100] BPF:[1] Invalid btf_info:5510001 [ 1772.200225][ T6100] BPF:[1] Invalid btf_info:5510001 04:12:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xcc000000, 0x8080fffffffe) 04:12:12 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x38e803, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:12 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x60, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1772.476415][ T6314] BPF:[1] Invalid btf_info:5600001 [ 1772.508416][ T6314] BPF:[1] Invalid btf_info:5600001 04:12:12 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x68, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:12 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x1000000}, 0x80, 0x0}}], 0x1, 0x0) 04:12:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xcf000000, 0x8080fffffffe) [ 1772.671529][ T6429] BPF:[1] Invalid btf_info:5680001 [ 1772.681783][ T6429] BPF:[1] Invalid btf_info:5680001 04:12:12 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x6c, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1772.774492][ T6541] BPF:[1] Invalid btf_info:56c0001 [ 1772.801650][ T6541] BPF:[1] Invalid btf_info:56c0001 04:12:12 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x2000000, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:12 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x74, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xd2000000, 0x8080fffffffe) [ 1773.095165][ T6661] BPF:[1] Invalid btf_info:5740001 [ 1773.108625][ T6661] BPF:[1] Invalid btf_info:5740001 04:12:13 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x6, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:13 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0xe000000}, 0x80, 0x0}}], 0x1, 0x0) 04:12:13 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x38f401, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xd5000000, 0x8080fffffffe) 04:12:13 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x7a, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:13 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x10000000, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) [ 1773.810406][ T6888] BPF:[1] Invalid btf_info:57a0001 [ 1773.837918][ T6888] BPF:[1] Invalid btf_info:57a0001 04:12:13 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0xec, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xd8000000, 0x8080fffffffe) [ 1773.999785][ T7008] BPF:[1] Invalid btf_info:5ec0001 [ 1774.008995][ T7008] BPF:[1] Invalid btf_info:5ec0001 04:12:13 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x2, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:14 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x11000000}, 0x80, 0x0}}], 0x1, 0x0) [ 1774.359022][ T7127] BPF:[1] PTR (anon) 04:12:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xdb000000, 0x8080fffffffe) [ 1774.389742][ T7127] BPF:type_id=0 [ 1774.397791][ T7127] BPF: [ 1774.409722][ T7127] BPF:vlen != 0 [ 1774.427695][ T7127] BPF: [ 1774.427695][ T7127] 04:12:14 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x200000000000000, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:14 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x7, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:14 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x6, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xde000000, 0x8080fffffffe) 04:12:14 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x38fc00, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:14 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x36000000}, 0x80, 0x0}}], 0x1, 0x0) 04:12:14 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x1000000000000000, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) [ 1775.110756][ T7370] BPF:[1] ENUM (anon) [ 1775.134366][ T7370] BPF:size=0 vlen=1 [ 1775.138447][ T7370] BPF: [ 1775.141787][ T7370] BPF:Unexpected size [ 1775.145933][ T7370] BPF: [ 1775.145933][ T7370] [ 1775.160189][ T7370] BPF:[1] ENUM (anon) [ 1775.189756][ T7370] BPF:size=0 vlen=1 [ 1775.209661][ T7370] BPF: [ 1775.229652][ T7370] BPF:Unexpected size [ 1775.250327][ T7370] BPF: [ 1775.250327][ T7370] 04:12:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe1000000, 0x8080fffffffe) 04:12:15 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x9, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:15 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x7fffffffffffffff, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe2000000, 0x8080fffffffe) 04:12:15 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0xee050000}, 0x80, 0x0}}], 0x1, 0x0) [ 1775.537504][ T7501] BPF:[1] VOLATILE (anon) [ 1775.542125][ T7501] BPF:type_id=0 [ 1775.545791][ T7501] BPF: [ 1775.548649][ T7501] BPF:vlen != 0 [ 1775.552355][ T7501] BPF: [ 1775.552355][ T7501] [ 1775.558643][ T7501] BPF:[1] VOLATILE (anon) [ 1775.563441][ T7501] BPF:type_id=0 [ 1775.567235][ T7501] BPF: [ 1775.570350][ T7501] BPF:vlen != 0 [ 1775.574181][ T7501] BPF: [ 1775.574181][ T7501] 04:12:15 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x3b, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1775.800409][ T7614] BPF:[1] Invalid btf_info:3b000001 04:12:15 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x8, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:15 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0xffffffff00000000, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe4000000, 0x8080fffffffe) 04:12:15 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x38fe80, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:15 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1776.133218][ T7880] BPF: (anon) type_id=2 bits_offset=0 [ 1776.138678][ T7880] BPF: [ 1776.150594][ T7880] BPF:Invalid member [ 1776.154779][ T7880] BPF: [ 1776.154779][ T7880] [ 1776.200961][ T7880] BPF: (anon) type_id=2 bits_offset=0 04:12:16 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0xffffff7f}, 0x80, 0x0}}], 0x1, 0x0) 04:12:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe5000000, 0x8080fffffffe) [ 1776.261132][ T7880] BPF: [ 1776.272955][ T7880] BPF:Invalid member [ 1776.296658][ T7880] BPF: [ 1776.296658][ T7880] 04:12:16 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:16 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0xffffffffffffff7f, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe7000000, 0x8080fffffffe) [ 1776.677655][ T8017] BPF: (anon) type_id=2 bits_offset=0 [ 1776.707480][ T8017] BPF: [ 1776.713103][ T8017] BPF:Invalid member [ 1776.717148][ T8017] BPF: [ 1776.717148][ T8017] [ 1776.723880][ T8017] BPF: (anon) type_id=2 bits_offset=0 [ 1776.729687][ T8017] BPF: [ 1776.735465][ T8017] BPF:Invalid member [ 1776.739610][ T8017] BPF: [ 1776.739610][ T8017] 04:12:16 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x2, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:16 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x1, 0x0) [ 1776.950012][ T8130] BPF: (anon) type_id=2 bits_offset=0 [ 1776.955922][ T8130] BPF: [ 1776.960201][ T8130] BPF:Invalid member [ 1776.964604][ T8130] BPF: [ 1776.964604][ T8130] [ 1776.978393][ T8130] BPF: (anon) type_id=2 bits_offset=0 [ 1776.984660][ T8130] BPF: [ 1776.987908][ T8130] BPF:Invalid member [ 1776.992941][ T8130] BPF: [ 1776.992941][ T8130] 04:12:17 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x38fec0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:17 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendto$isdn(r0, &(0x7f00000002c0)={0xd37c, 0x5, "202640d0383cc637e21f33a04f150886179f61b1f71f96032112127bf905fe65ed4d34a37d24ddc474a55576450d01911fabedb1dc77a0f44c6f1ff5336e3ad08ae241bfc81c8ca7fa0f87b5f30c499b95541bf5d37fd415e88a7c236b15d7527b442d7791fc3d100ee0d7948e79f313ab1cdcd6f049c85b63fb35fea1cef5f5e46a7f65d0711cb7414ed9830f2cd0cf40e3f5f6"}, 0x9c, 0x10, &(0x7f0000000100)={0x22, 0x0, 0x1f, 0x1}, 0x6) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r1, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000001cc0), 0x1006) sendfile(r3, r3, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r4, 0x0, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:17 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x3, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xe8000000, 0x8080fffffffe) 04:12:17 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x9, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) [ 1777.295475][ T8358] BPF: (anon) type_id=2 bits_offset=0 [ 1777.332875][ T8358] BPF: [ 1777.335869][ T8358] BPF:Invalid member [ 1777.343239][ T8358] BPF: 04:12:17 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x0, 0x4}, 0x80, 0x0}}], 0x1, 0x0) [ 1777.343239][ T8358] 04:12:17 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x4, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xea000000, 0x8080fffffffe) [ 1777.808677][ T8484] BPF: (anon) type_id=2 bits_offset=0 [ 1777.840787][ T8484] BPF: [ 1777.843640][ T8484] BPF:Invalid member [ 1777.872927][ T8484] BPF: [ 1777.872927][ T8484] 04:12:17 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x5, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:17 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x0, 0xe}, 0x80, 0x0}}], 0x1, 0x0) 04:12:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xeb000000, 0x8080fffffffe) [ 1778.067696][ T8597] BPF: (anon) type_id=2 bits_offset=0 [ 1778.095014][ T8597] BPF: [ 1778.130622][ T8597] BPF:Invalid member [ 1778.183804][ T8597] BPF: [ 1778.183804][ T8597] 04:12:18 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x38ff00, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:18 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x6, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1778.396893][ T8815] BPF: (anon) type_id=2 bits_offset=0 [ 1778.407187][ T8815] BPF: [ 1778.410212][ T8815] BPF:Invalid member [ 1778.414969][ T8815] BPF: [ 1778.414969][ T8815] [ 1778.422597][ T8815] BPF: (anon) type_id=2 bits_offset=0 [ 1778.429760][ T8815] BPF: [ 1778.433637][ T8815] BPF:Invalid member [ 1778.438963][ T8815] BPF: [ 1778.438963][ T8815] 04:12:18 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6ff2, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xee000000, 0x8080fffffffe) 04:12:18 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x7, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1778.603282][ T8932] BPF: (anon) type_id=2 bits_offset=0 [ 1778.614351][ T8932] BPF: [ 1778.619513][ T8932] BPF:Invalid member [ 1778.628001][ T8932] BPF: [ 1778.628001][ T8932] [ 1778.641069][ T8932] BPF: (anon) type_id=2 bits_offset=0 [ 1778.646701][ T8932] BPF: [ 1778.649684][ T8932] BPF:Invalid member [ 1778.653825][ T8932] BPF: [ 1778.653825][ T8932] 04:12:18 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0xa, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xf0ffffff, 0x8080fffffffe) 04:12:18 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x8, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:18 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x0, 0x11}, 0x80, 0x0}}], 0x1, 0x0) [ 1778.881151][ T9051] BPF: (anon) type_id=2 bits_offset=0 [ 1778.921269][ T9051] BPF: [ 1778.924091][ T9051] BPF:Invalid member [ 1778.967408][ T9051] BPF: [ 1778.967408][ T9051] 04:12:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xf1000000, 0x8080fffffffe) 04:12:18 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0xa, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1779.237839][ T9176] BPF: (anon) type_id=2 bits_offset=0 [ 1779.250064][ T9176] BPF: [ 1779.259040][ T9176] BPF:Invalid member [ 1779.266563][ T9176] BPF: [ 1779.266563][ T9176] 04:12:19 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x0, 0x36}, 0x80, 0x0}}], 0x1, 0x0) 04:12:19 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x38ff0f, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xf4000000, 0x8080fffffffe) 04:12:19 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x48, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xf4ffffff, 0x8080fffffffe) 04:12:19 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x0, 0x5ee}, 0x80, 0x0}}], 0x1, 0x0) [ 1779.980377][ T9415] BPF: (anon) type_id=2 bits_offset=0 [ 1780.001170][ T9415] BPF: [ 1780.007494][ T9415] BPF:Invalid member [ 1780.021018][ T9415] BPF: [ 1780.021018][ T9415] 04:12:19 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000100)) r2 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f0000000080)='syz0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000001cc0), 0x1006) sendfile(r3, r3, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000140), &(0x7f0000000200)=0x4) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/btrfs-control\x00', 0x200800, 0x0) perf_event_open(&(0x7f000001d000)={0x4, 0xfffffffffffffe64, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xa}, 0x41049, 0x0, 0xfffffffe, 0x6, 0xffffffffffffffff, 0x2000000}, r5, 0xffffffffffffffff, r6, 0x8) ioctl$TIOCNXCL(r6, 0x540d) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) ptrace$setopts(0x4200, 0x0, 0x1041, 0xc) 04:12:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xf5ffffff, 0x8080fffffffe) 04:12:19 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0xb, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:19 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x4c, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1780.194774][ T9538] BPF: (anon) type_id=2 bits_offset=0 [ 1780.214516][ T9538] BPF: [ 1780.217468][ T9538] BPF:Invalid member [ 1780.235807][ T9538] BPF: [ 1780.235807][ T9538] 04:12:20 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x51, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:20 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x0, 0xe00}, 0x80, 0x0}}], 0x1, 0x0) 04:12:20 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20102, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e5, 0x0, @perf_config_ext={0x100000000, 0x3}, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f0000000100)='./file0\x00', 0x20) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x2003d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) [ 1780.471768][ T9653] BPF: (anon) type_id=2 bits_offset=0 [ 1780.484063][ T9653] BPF: [ 1780.493127][ T9653] BPF:Invalid member [ 1780.506815][ T9653] BPF: [ 1780.506815][ T9653] 04:12:20 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xf7000000, 0x8080fffffffe) 04:12:20 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x60, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xfa000000, 0x8080fffffffe) [ 1780.891617][ T9881] BPF: (anon) type_id=2 bits_offset=0 [ 1780.897143][ T9881] BPF: [ 1780.900030][ T9881] BPF:Invalid member [ 1780.915438][ T9881] BPF: [ 1780.915438][ T9881] 04:12:20 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x68, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:20 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x0, 0x1100}, 0x80, 0x0}}], 0x1, 0x0) [ 1781.168165][ T9996] BPF: (anon) type_id=2 bits_offset=0 [ 1781.173898][ T9996] BPF: [ 1781.176913][ T9996] BPF:Invalid member [ 1781.191872][ T9996] BPF: [ 1781.191872][ T9996] [ 1781.199318][ T9996] BPF: (anon) type_id=2 bits_offset=0 [ 1781.209724][ T9996] BPF: [ 1781.213969][ T9996] BPF:Invalid member [ 1781.221049][ T9996] BPF: [ 1781.221049][ T9996] 04:12:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xfbffffff, 0x8080fffffffe) 04:12:21 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0xc, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:21 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r4, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x8b, 0x1, 0x4, "3bb81774967fc9c1590bf504ca0c613b", "c98b15d617a6dd997094094ad1f14975ae288c7d911363fc6e485a4129ada856389af5348149ea4c452c1372d7060713d2e0611e37e3652fe971f0ba6e47ba52ed59703ae675353f1a6eeeea0ddc6e2915e3dcd1b89fd43bd21512e30c93efa8d04f4f2c4caa7e4b298daece9dbf981a012318da2363"}, 0x8b, 0x3) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) accept(r2, &(0x7f00000003c0)=@nl, &(0x7f0000000140)=0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x0) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8, 0x13, r3, 0x180000000) 04:12:21 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x6c, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xfd000000, 0x8080fffffffe) [ 1781.606977][T10127] BPF: (anon) type_id=2 bits_offset=0 [ 1781.618033][T10127] BPF: [ 1781.631599][T10127] BPF:Invalid member [ 1781.638364][T10127] BPF: [ 1781.638364][T10127] 04:12:21 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x0, 0x3600}, 0x80, 0x0}}], 0x1, 0x0) 04:12:21 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty={[0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:21 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x74, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1781.935413][T10353] BPF: (anon) type_id=2 bits_offset=0 [ 1781.943013][T10353] BPF: [ 1781.945920][T10353] BPF:Invalid member [ 1781.949958][T10353] BPF: [ 1781.949958][T10353] [ 1781.957449][T10353] BPF: (anon) type_id=2 bits_offset=0 [ 1781.965231][T10353] BPF: [ 1781.968323][T10353] BPF:Invalid member [ 1781.973369][T10353] BPF: [ 1781.973369][T10353] 04:12:21 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x7a, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xfffdffff, 0x8080fffffffe) 04:12:22 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x0, 0xee05}, 0x80, 0x0}}], 0x1, 0x0) [ 1782.278647][T10464] BPF: (anon) type_id=2 bits_offset=0 [ 1782.299039][T10464] BPF: [ 1782.340685][T10464] BPF:Invalid member [ 1782.369576][T10464] BPF: [ 1782.369576][T10464] 04:12:22 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0xec, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:22 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0xd, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xfffffdff, 0x8080fffffffe) [ 1782.748548][T10592] BPF: (anon) type_id=2 bits_offset=0 [ 1782.765863][T10592] BPF: [ 1782.772052][T10592] BPF:Invalid member [ 1782.790506][T10592] BPF: [ 1782.790506][T10592] 04:12:22 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xfffffff0, 0x8080fffffffe) 04:12:22 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty={[0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:22 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x0, 0x34000}, 0x80, 0x0}}], 0x1, 0x0) 04:12:22 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x300, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1783.129584][T10816] BPF: (anon) type_id=2 bits_offset=0 [ 1783.152343][T10816] BPF: [ 1783.158605][T10816] BPF:Invalid member [ 1783.163038][T10816] BPF: [ 1783.163038][T10816] [ 1783.169740][T10816] BPF: (anon) type_id=2 bits_offset=0 [ 1783.175693][T10816] BPF: [ 1783.178660][T10816] BPF:Invalid member [ 1783.183018][T10816] BPF: [ 1783.183018][T10816] 04:12:23 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x500, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xfffffff4, 0x8080fffffffe) [ 1783.308247][T10927] BPF: (anon) type_id=2 bits_offset=0 [ 1783.318068][T10927] BPF: [ 1783.322559][T10927] BPF:Invalid member [ 1783.326652][T10927] BPF: [ 1783.326652][T10927] [ 1783.335672][T10927] BPF: (anon) type_id=2 bits_offset=0 [ 1783.342072][T10927] BPF: [ 1783.345123][T10927] BPF:Invalid member [ 1783.349299][T10927] BPF: [ 1783.349299][T10927] 04:12:23 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x600, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:23 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x0, 0x40000}, 0x80, 0x0}}], 0x1, 0x0) [ 1783.535821][T11042] BPF: (anon) type_id=2 bits_offset=0 [ 1783.542175][T11042] BPF: [ 1783.545070][T11042] BPF:Invalid member [ 1783.549164][T11042] BPF: [ 1783.549164][T11042] [ 1783.555810][T11042] BPF: (anon) type_id=2 bits_offset=0 [ 1783.561401][T11042] BPF: [ 1783.564371][T11042] BPF:Invalid member [ 1783.568454][T11042] BPF: [ 1783.568454][T11042] [ 1783.575200][ T27] audit: type=1800 audit(1583295143.370:1115): pid=11041 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="loop2" ino=267 res=0 04:12:23 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x100) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x21001, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r4, 0xffffffffffffffff, r5, 0x0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r6, 0xffffffffffffffff, r7, 0x0) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) r9 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r8, 0xffffffffffffffff, r9, 0x0) r10 = getpid() sched_setscheduler(r10, 0x5, &(0x7f0000000380)) r11 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r10, 0xffffffffffffffff, r11, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000200)=ANY=[@ANYRESHEX=r8, @ANYRES64], 0x2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:24 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0xe, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xfffffff5, 0x8080fffffffe) 04:12:24 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x700, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:24 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:24 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x0, 0x400300}, 0x80, 0x0}}], 0x1, 0x0) [ 1784.366035][T11281] BPF: (anon) type_id=2 bits_offset=0 [ 1784.390522][T11281] BPF: [ 1784.401870][T11281] BPF:Invalid member [ 1784.421868][T11281] BPF: [ 1784.421868][T11281] [ 1784.592951][ T27] audit: type=1800 audit(1583295144.390:1116): pid=11394 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="loop2" ino=268 res=0 04:12:24 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0xa00, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xfffffffb, 0x8080fffffffe) [ 1784.794937][T11408] BPF: (anon) type_id=2 bits_offset=0 [ 1784.803863][T11408] BPF: [ 1784.806718][T11408] BPF:Invalid member [ 1784.814738][T11408] BPF: [ 1784.814738][T11408] [ 1784.824124][T11408] BPF: (anon) type_id=2 bits_offset=0 [ 1784.829678][T11408] BPF: [ 1784.832766][T11408] BPF:Invalid member [ 1784.836862][T11408] BPF: [ 1784.836862][T11408] 04:12:24 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x0, 0x1000000}, 0x80, 0x0}}], 0x1, 0x0) 04:12:24 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x2000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1785.102727][T11525] BPF: (anon) type_id=2 bits_offset=0 [ 1785.108287][T11525] BPF: [ 1785.111230][T11525] BPF:Invalid member [ 1785.115555][T11525] BPF: [ 1785.115555][T11525] [ 1785.122044][T11525] BPF: (anon) type_id=2 bits_offset=0 [ 1785.127695][T11525] BPF: [ 1785.130771][T11525] BPF:Invalid member [ 1785.134892][T11525] BPF: [ 1785.134892][T11525] 04:12:25 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x4800, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x1000000000000, 0x8080fffffffe) [ 1785.247680][T11736] BPF: (anon) type_id=2 bits_offset=0 [ 1785.276029][T11736] BPF: [ 1785.286476][T11736] BPF:Invalid member [ 1785.296174][T11736] BPF: [ 1785.296174][T11736] 04:12:25 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x840, 0x0) select(0x40, &(0x7f0000000080)={0x1, 0x8, 0x5, 0x0, 0x1ff, 0xec, 0x7, 0x7ce}, &(0x7f0000000100)={0xe7e, 0x1ff, 0x5, 0x4, 0x7, 0x5, 0x10000, 0x100000001}, &(0x7f0000000140)={0x8, 0xffffffffffffffe1, 0x5, 0x9, 0x1f, 0x8, 0xd2, 0x20}, &(0x7f0000000200)) 04:12:25 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0xf, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty={[0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x7ffffffffffff, 0x8080fffffffe) 04:12:25 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x4c00, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:25 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x0, 0xe000000}, 0x80, 0x0}}], 0x1, 0x0) [ 1785.828778][T11865] BPF: (anon) type_id=2 bits_offset=0 [ 1785.859422][T11865] BPF: [ 1785.869397][T11865] BPF:Invalid member [ 1785.883413][T11865] BPF: [ 1785.883413][T11865] 04:12:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xa000000000000, 0x8080fffffffe) 04:12:25 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x5100, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1786.155261][T11987] BPF: (anon) type_id=2 bits_offset=0 [ 1786.179057][T11987] BPF: [ 1786.188805][T11987] BPF:Invalid member [ 1786.202997][T11987] BPF: [ 1786.202997][T11987] 04:12:26 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x0, 0x11000000}, 0x80, 0x0}}], 0x1, 0x0) 04:12:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x100000000000000, 0x8080fffffffe) 04:12:26 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x6000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1786.589967][T12104] BPF: (anon) type_id=2 bits_offset=0 [ 1786.612315][T12104] BPF: [ 1786.615161][T12104] BPF:Invalid member 04:12:26 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty={[0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) [ 1786.643929][T12104] BPF: [ 1786.643929][T12104] 04:12:26 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000080)={0x1, 0x29, [0x2, 0x6, 0x81, 0x8, 0xd3], 0x40}) tkill(0x0, 0x0) 04:12:27 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x10, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:27 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x6800, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x200000000000000, 0x8080fffffffe) 04:12:27 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x0, 0x36000000}, 0x80, 0x0}}], 0x1, 0x0) [ 1787.299519][T12339] BPF: (anon) type_id=2 bits_offset=0 [ 1787.328687][T12339] BPF: [ 1787.343887][T12339] BPF:Invalid member [ 1787.347858][T12339] BPF: [ 1787.347858][T12339] 04:12:27 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x6c00, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x400000000000000, 0x8080fffffffe) [ 1787.660473][T12461] BPF: (anon) type_id=2 bits_offset=0 [ 1787.679884][T12461] BPF: [ 1787.698262][T12461] BPF:Invalid member [ 1787.724737][T12461] BPF: [ 1787.724737][T12461] 04:12:27 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x0, 0xee050000}, 0x80, 0x0}}], 0x1, 0x0) 04:12:27 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty={[0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:27 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x7400, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x700000000000000, 0x8080fffffffe) [ 1788.171825][T12683] BPF: (anon) type_id=2 bits_offset=0 [ 1788.206453][T12683] BPF: [ 1788.225455][T12683] BPF:Invalid member [ 1788.240682][T12683] BPF: [ 1788.240682][T12683] 04:12:28 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x7a00, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:28 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x5, 0x420080) sendfile(r2, r2, &(0x7f0000000240)=0xfffffffffffffffd, 0x2008000fffffffd) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) [ 1788.484065][T12809] BPF: (anon) type_id=2 bits_offset=0 [ 1788.489615][T12809] BPF: [ 1788.496803][T12809] BPF:Invalid member 04:12:28 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x11, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:28 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5, 0x0, 0xffffff7f}, 0x80, 0x0}}], 0x1, 0x0) 04:12:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x900000000000000, 0x8080fffffffe) [ 1788.556273][T12809] BPF: [ 1788.556273][T12809] 04:12:28 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0xec00, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty={[0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) [ 1788.853347][T12929] BPF: (anon) type_id=2 bits_offset=0 [ 1788.879628][T12929] BPF: [ 1788.898634][T12929] BPF:Invalid member 04:12:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0xd00000000000000, 0x8080fffffffe) [ 1788.930846][T12929] BPF: [ 1788.930846][T12929] 04:12:28 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0xc, 0x0}}], 0x1, 0x0) 04:12:28 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0xfffff, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:28 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x5, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) r2 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(r2, &(0x7f0000000380)='./file1/file0\x00', 0x0) renameat2(r2, &(0x7f0000000000)='./file1/file0\x00', r2, &(0x7f00000001c0)='./file0\x00', 0x2) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_config_ext={0x0, 0xffffffffffffb8c7}, 0xc2, 0x0, 0xfffffffe, 0x8, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r4, 0x0) r5 = fcntl$dupfd(r2, 0x406, r4) write$UHID_INPUT(r5, &(0x7f0000001cc0)={0x8, {'\x00', 0x1000}}, 0x1006) sendfile(r1, r1, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f0000000080)='./file0\x00', 0x278) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r7, 0xffffffffffffffff, r8, 0x0) r9 = getpid() sched_setscheduler(r9, 0x5, &(0x7f0000000380)) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x3}, 0x440, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, 0x0, 0x4, r10, 0x0) ioctl$VIDIOC_QUERYBUF(r8, 0xc0585609, &(0x7f00000000c0)={0x6, 0x2, 0x4, 0x40000000, 0x9e, {0x77359400}, {0x2, 0x2, 0x1f, 0xa0, 0x0, 0x7f, "d23c6d40"}, 0x8, 0x2, @offset=0x8, 0x8, 0x0, r10}) r12 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x400) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r13, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x0, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r13, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={r13, 0xf801}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r12, 0x84, 0x7c, &(0x7f0000000200)={r13, 0x2fe, 0x8}, 0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r11, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r13, 0x7, 0x10000}, &(0x7f0000000200)=0xc) setsockopt$inet6_tcp_int(r6, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r6, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r6, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) [ 1789.217575][T13153] BPF: (anon) type_id=2 bits_offset=0 [ 1789.231628][T13153] BPF: [ 1789.234425][T13153] BPF:Invalid member [ 1789.238307][T13153] BPF: [ 1789.238307][T13153] 04:12:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x1000000000000000, 0x8080fffffffe) [ 1789.251388][ T27] audit: type=1804 audit(1583295149.050:1117): pid=13150 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir085037545/syzkaller.RIf3zi/4007/file0/file0" dev="ramfs" ino=330261 res=1 [ 1789.268784][T13153] BPF: (anon) type_id=2 bits_offset=0 [ 1789.286441][ T27] audit: type=1804 audit(1583295149.080:1118): pid=13150 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir085037545/syzkaller.RIf3zi/4007/file0/file0" dev="ramfs" ino=330261 res=1 [ 1789.311868][T13153] BPF: [ 1789.315278][T13153] BPF:Invalid member [ 1789.319718][T13153] BPF: [ 1789.319718][T13153] 04:12:29 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x12, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:29 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0xffffff, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:29 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80000000, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) r3 = add_key$keyring(0x0, &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0x90, r3) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000140)={r4, 0x1000, 0xa}, &(0x7f00000002c0)={'enc=', 'oaep', ' hash=', {'cryptd(xxhash64-generic)\x00'}}, &(0x7f0000000900)="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", &(0x7f0000000200)=""/10) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r5, 0x0, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) [ 1789.547512][T13276] BPF: (anon) type_id=2 bits_offset=0 [ 1789.560003][T13276] BPF: [ 1789.566465][T13276] BPF:Invalid member [ 1789.570803][T13276] BPF: [ 1789.570803][T13276] [ 1789.578491][T13276] BPF: (anon) type_id=2 bits_offset=0 [ 1789.590803][T13276] BPF: 04:12:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x1200000000000000, 0x8080fffffffe) 04:12:29 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x13, 0x0}}], 0x1, 0x0) [ 1789.597253][T13276] BPF:Invalid member [ 1789.604861][T13276] BPF: [ 1789.604861][T13276] 04:12:29 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x1000000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:29 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty={[0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) [ 1789.875178][T13495] BPF: (anon) type_id=2 bits_offset=0 04:12:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x1b00000000000000, 0x8080fffffffe) [ 1789.956364][T13495] BPF: [ 1789.972554][T13495] BPF:Invalid member [ 1790.001592][T13495] BPF: [ 1790.001592][T13495] 04:12:29 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x2000000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1790.178317][T13613] BPF: (anon) type_id=2 bits_offset=0 [ 1790.183901][T13613] BPF: [ 1790.186772][T13613] BPF:Invalid member [ 1790.193741][T13613] BPF: [ 1790.193741][T13613] [ 1790.200079][T13613] BPF: (anon) type_id=2 bits_offset=0 [ 1790.205997][T13613] BPF: [ 1790.209085][T13613] BPF:Invalid member [ 1790.213450][T13613] BPF: [ 1790.213450][T13613] 04:12:30 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x3000000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:30 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x200003c0, 0x0}}], 0x1, 0x0) [ 1790.315448][T13723] BPF: (anon) type_id=2 bits_offset=0 [ 1790.327385][T13723] BPF: [ 1790.333732][T13723] BPF:Invalid member [ 1790.342142][T13723] BPF: [ 1790.342142][T13723] [ 1790.356341][T13723] BPF: (anon) type_id=2 bits_offset=0 04:12:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x1e00000000000000, 0x8080fffffffe) [ 1790.369726][T13723] BPF: [ 1790.376590][T13723] BPF:Invalid member [ 1790.386507][T13723] BPF: [ 1790.386507][T13723] 04:12:30 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x13, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:30 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f00000003c0)={0x0, 0xfb, 0x105, 0x0, 0x8, "4eb9be2ca9f54d3860a52b95321325b7", "3a28658cc87554c5e0bfd9b93d962c2a24b2f9af34ceb79a17e709375ccba56cb79791ab53c3ab8de81b169b3d0abe5ace030183ed95cd02a37a164df8fbe5108edbc752de8bb772fbbb9106d003afbad42fd4e21e9a19abad1e0927a91888596000d1198497b940811a7667ee8448b0c9a0660fee46ab47c4855ac570422c57a7e01af364cfc4b4be19d20a50b3a516a97b35ad312d982270689fcc819a67865f40d730c468766520ffa1ce35d328495b870ec3995459936d1b6d156b38665e50eb9f32b337017c5ff56f2a3b09e2d9d97af91904871071b7c8da3e419cb8f30f026a5924bc1baaab5a54bb6f6a5ae7"}, 0x105, 0x1) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:30 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x4000000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1790.632895][T13844] BPF: (anon) type_id=2 bits_offset=0 [ 1790.639424][T13844] BPF: [ 1790.666837][T13844] BPF:Invalid member [ 1790.704172][T13844] BPF: [ 1790.704172][T13844] 04:12:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x2000000000000000, 0x8080fffffffe) 04:12:30 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty={[0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:30 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0, 0x4}}], 0x1, 0x0) 04:12:30 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x5000000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1791.161945][T14079] BPF: (anon) type_id=2 bits_offset=0 [ 1791.210384][T14079] BPF: [ 1791.224271][T14079] BPF:Invalid member [ 1791.267291][T14079] BPF: [ 1791.267291][T14079] 04:12:31 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x2400000000000000, 0x8080fffffffe) 04:12:31 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x6000000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1791.665228][T14197] BPF: (anon) type_id=2 bits_offset=0 04:12:31 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0, 0xe}}], 0x1, 0x0) [ 1791.734569][T14197] BPF: [ 1791.764334][T14197] BPF:Invalid member [ 1791.788686][T14197] BPF: [ 1791.788686][T14197] [ 1791.822911][ T27] audit: type=1804 audit(1583295151.620:1119): pid=14059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir085037545/syzkaller.RIf3zi/4009/file0/file0" dev="ramfs" ino=330418 res=1 04:12:31 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty={[0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:31 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x2d00000000000000, 0x8080fffffffe) [ 1791.969986][ T27] audit: type=1804 audit(1583295151.620:1120): pid=14059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir085037545/syzkaller.RIf3zi/4009/file0/file0" dev="ramfs" ino=330418 res=1 [ 1792.006058][ T27] audit: type=1804 audit(1583295151.630:1121): pid=14230 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir085037545/syzkaller.RIf3zi/4009/file0/file0" dev="ramfs" ino=330418 res=1 04:12:31 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x14, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:32 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:32 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x7000000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:32 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x3600000000000000, 0x8080fffffffe) [ 1792.266479][T14429] BPF: (anon) type_id=2 bits_offset=0 [ 1792.280575][T14429] BPF: [ 1792.283453][T14429] BPF:Invalid member 04:12:32 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0, 0x11}}], 0x1, 0x0) [ 1792.310538][T14429] BPF: [ 1792.310538][T14429] [ 1792.339300][T14429] BPF: (anon) type_id=2 bits_offset=0 [ 1792.372790][T14429] BPF: [ 1792.385835][T14429] BPF:Invalid member [ 1792.408923][T14429] BPF: [ 1792.408923][T14429] 04:12:32 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x8000000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:32 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x3f00000000000000, 0x8080fffffffe) 04:12:32 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x15, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) [ 1792.667303][T14553] BPF: (anon) type_id=2 bits_offset=0 [ 1792.676737][T14553] BPF: [ 1792.681952][T14553] BPF:Invalid member [ 1792.696935][T14553] BPF: [ 1792.696935][T14553] [ 1792.709126][T14553] BPF: (anon) type_id=2 bits_offset=0 [ 1792.720631][T14553] BPF: [ 1792.723474][T14553] BPF:Invalid member [ 1792.727368][T14553] BPF: [ 1792.727368][T14553] 04:12:32 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0xa000000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:32 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty={[0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:32 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0, 0x36}}], 0x1, 0x0) [ 1792.929658][T14766] BPF: (anon) type_id=2 bits_offset=0 [ 1792.935266][T14766] BPF: [ 1792.938208][T14766] BPF:Invalid member [ 1792.950656][T14766] BPF: [ 1792.950656][T14766] 04:12:32 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x4000000000000000, 0x8080fffffffe) [ 1792.975440][T14766] BPF: (anon) type_id=2 bits_offset=0 [ 1792.989925][T14766] BPF: [ 1792.998731][T14766] BPF:Invalid member [ 1793.009968][T14766] BPF: [ 1793.009968][T14766] 04:12:32 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x20000000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1793.284142][T14893] BPF: (anon) type_id=2 bits_offset=0 [ 1793.289945][T14893] BPF: [ 1793.292954][T14893] BPF:Invalid member [ 1793.297073][T14893] BPF: [ 1793.297073][T14893] [ 1793.303713][T14893] BPF: (anon) type_id=2 bits_offset=0 [ 1793.309476][T14893] BPF: [ 1793.313165][T14893] BPF:Invalid member [ 1793.317660][T14893] BPF: [ 1793.317660][T14893] 04:12:33 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:33 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x4800000000000000, 0x8080fffffffe) 04:12:33 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0, 0x5ee}}], 0x1, 0x0) 04:12:33 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x48000000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1793.837921][T15107] BPF: (anon) type_id=2 bits_offset=0 [ 1793.856055][T15107] BPF: [ 1793.864590][T15107] BPF:Invalid member [ 1793.877665][T15107] BPF: [ 1793.877665][T15107] 04:12:33 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x4c000000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:33 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty={[0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) [ 1794.022203][T15220] BPF: (anon) type_id=2 bits_offset=0 [ 1794.027682][T15220] BPF: [ 1794.030901][T15220] BPF:Invalid member [ 1794.034916][T15220] BPF: [ 1794.034916][T15220] [ 1794.041522][T15220] BPF: (anon) type_id=2 bits_offset=0 [ 1794.047583][T15220] BPF: [ 1794.050929][T15220] BPF:Invalid member [ 1794.055681][T15220] BPF: [ 1794.055681][T15220] 04:12:34 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x16, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:34 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x51000000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:34 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x5100000000000000, 0x8080fffffffe) 04:12:34 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0, 0xe00}}], 0x1, 0x0) 04:12:34 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x5a00000000000000, 0x8080fffffffe) 04:12:34 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) r3 = accept$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000140)={'veth0_to_hsr\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r4, 0x0, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r5, 0xffffffffffffffff, r6, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r6, 0x4040534e, &(0x7f0000000200)={0x80, @tick=0x3fffc00, 0x1, {0x1, 0x3f}, 0x8, 0x1, 0x3}) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r7, 0xffffffffffffffff, r8, 0x0) ioctl$NBD_CLEAR_QUE(r8, 0xab05) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:34 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x60000000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1794.870379][T15466] BPF: (anon) type_id=2 bits_offset=0 04:12:34 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0, 0x1100}}], 0x1, 0x0) [ 1794.929166][T15466] BPF: [ 1794.963088][T15466] BPF:Invalid member [ 1794.990231][T15466] BPF: [ 1794.990231][T15466] 04:12:34 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty={[0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:34 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x68000000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:35 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x6300000000000000, 0x8080fffffffe) [ 1795.378624][T15692] BPF: (anon) type_id=2 bits_offset=0 [ 1795.390369][T15692] BPF: [ 1795.403222][T15692] BPF:Invalid member [ 1795.413779][T15692] BPF: [ 1795.413779][T15692] 04:12:35 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x6c00000000000000, 0x8080fffffffe) 04:12:35 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x17, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:35 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x6c000000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:35 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0, 0x3600}}], 0x1, 0x0) [ 1795.690133][T15808] BPF: (anon) type_id=2 bits_offset=0 [ 1795.712468][T15808] BPF: [ 1795.715323][T15808] BPF:Invalid member [ 1795.745000][T15808] BPF: [ 1795.745000][T15808] 04:12:35 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x7500000000000000, 0x8080fffffffe) 04:12:35 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x74000000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1796.077868][T16029] BPF: (anon) type_id=2 bits_offset=0 [ 1796.094358][T16029] BPF: [ 1796.097250][T16029] BPF:Invalid member [ 1796.101434][T16029] BPF: [ 1796.101434][T16029] [ 1796.127859][T16029] BPF: (anon) type_id=2 bits_offset=0 [ 1796.178604][T16029] BPF: [ 1796.209578][T16029] BPF:Invalid member 04:12:36 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty={[0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:36 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0, 0xee05}}], 0x1, 0x0) 04:12:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x7900000000000000, 0x8080fffffffe) 04:12:36 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) r3 = getpid() ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r3, 0xffffffffffffffff, r4, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r5, 0x0, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x282140, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, r6, 0xffffffffffffffff, r7, 0x0) ioctl$BINDER_SET_MAX_THREADS(r7, 0x40046205, &(0x7f0000000100)=0x5) setsockopt$IPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) [ 1796.299725][T16029] BPF: [ 1796.299725][T16029] 04:12:36 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x7a000000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1796.562810][T16155] BPF: (anon) type_id=2 bits_offset=0 [ 1796.602277][T16155] BPF: [ 1796.637314][T16155] BPF:Invalid member [ 1796.652897][T16155] BPF: [ 1796.652897][T16155] 04:12:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x7e00000000000000, 0x8080fffffffe) 04:12:36 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0xec000000, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1796.905428][T16272] BPF: (anon) type_id=2 bits_offset=0 [ 1796.923448][T16272] BPF: [ 1796.937080][T16272] BPF:Invalid member [ 1796.955690][T16272] BPF: [ 1796.955690][T16272] 04:12:37 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x18, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:37 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0, 0x34000}}], 0x1, 0x0) 04:12:37 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0xffff0f00, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:37 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x7f51010000000000, 0x8080fffffffe) 04:12:37 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty={[0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) [ 1797.318804][T16493] BPF: (anon) type_id=2 bits_offset=0 [ 1797.363183][T16493] BPF: [ 1797.384179][T16493] BPF:Invalid member [ 1797.407449][T16493] BPF: [ 1797.407449][T16493] 04:12:37 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x7fffffffffffffff, 0x8080fffffffe) 04:12:37 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0xffffff00, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:37 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x4a108}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0xa000, 0xe8) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f0000000140)='./file0\x00', 0x51) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r3, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x806c0, 0x0) ioctl$KDDISABIO(r4, 0x4b37) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) [ 1797.611998][T16610] BPF: (anon) type_id=2 bits_offset=0 [ 1797.617418][T16610] BPF: [ 1797.620181][T16610] BPF:Invalid member [ 1797.661781][T16610] BPF: [ 1797.661781][T16610] 04:12:37 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0, 0x40000}}], 0x1, 0x0) 04:12:37 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1797.846153][T16725] BPF: (anon) type_id=2 bits_offset=0 [ 1797.851862][T16725] BPF: [ 1797.854783][T16725] BPF:Invalid member [ 1797.858822][T16725] BPF: [ 1797.858822][T16725] [ 1797.865424][T16725] BPF: (anon) type_id=2 bits_offset=0 [ 1797.871116][T16725] BPF: [ 1797.874119][T16725] BPF:Invalid member [ 1797.878390][T16725] BPF: [ 1797.878390][T16725] 04:12:37 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1798.039818][ T27] audit: type=1804 audit(1583295157.830:1122): pid=16719 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir085037545/syzkaller.RIf3zi/4014/file0/file0" dev="ramfs" ino=332890 res=1 04:12:37 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x8000000000000000, 0x8080fffffffe) [ 1798.163483][T16835] BPF: type_id=2 bits_offset=0 [ 1798.168381][T16835] BPF: [ 1798.216835][T16835] BPF:Invalid name [ 1798.241666][T16835] BPF: [ 1798.241666][T16835] 04:12:38 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240)=0x19, 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) 04:12:38 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = accept(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000080)=0x80) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x400) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r3, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x0, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r3, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={r3, 0xf801}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000200)={r3, 0x2fe, 0x8}, 0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000200)={r3, 0x2, 0x3, [0xa89a, 0x101, 0xfff]}, &(0x7f00000002c0)=0xe) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r5, &(0x7f0000001cc0), 0x1006) sendfile(r5, r5, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x0, &(0x7f0000000280)=0x9, 0x4) connect$inet6(r6, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast1, 0x3d}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r6, 0x0, 0x41, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1a) tkill(0x0, 0x0) 04:12:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty={[0x58, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 04:12:38 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0, 0x400300}}], 0x1, 0x0) 04:12:38 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x3, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:38 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x8700000000000000, 0x8080fffffffe) [ 1798.754456][T17071] BPF: type_id=2 bits_offset=0 [ 1798.759660][T17071] BPF: [ 1798.762802][T17071] BPF:Invalid name [ 1798.766737][T17071] BPF: [ 1798.766737][T17071] [ 1798.773020][T17071] BPF: type_id=2 bits_offset=0 [ 1798.780843][T17071] BPF: [ 1798.783855][T17071] BPF:Invalid name [ 1798.788078][T17071] BPF: [ 1798.788078][T17071] 04:12:38 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x4, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:38 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x9000000000000000, 0x8080fffffffe) [ 1798.938097][T17184] BPF: type_id=2 bits_offset=0 [ 1798.948118][T17184] BPF: [ 1798.951133][T17184] BPF:Invalid name [ 1798.955041][T17184] BPF: [ 1798.955041][T17184] [ 1798.963564][T17184] BPF: type_id=2 bits_offset=0 [ 1798.969812][T17184] BPF: [ 1798.972964][T17184] BPF:Invalid name [ 1798.977073][T17184] BPF: [ 1798.977073][T17184] 04:12:38 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x5, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:39 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000340)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0, 0x1000000}}], 0x1, 0x0) [ 1799.252493][T17301] BPF: (invalid-name-offset) type_id=2 bits_offset=0 [ 1799.278516][T17301] BPF: [ 1799.289422][T17301] BPF:Invalid member name_offset:5 [ 1799.314991][T17301] BPF: [ 1799.314991][T17301] 04:12:39 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x6, 0x2}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xf, 0x2}, {0xb}, {0x1, 0x2}, {0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/237, 0x69, 0xed, 0x8}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) 04:12:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724b"], 0x9) sendfile(r1, r1, &(0x7f0000000000)=0x9900000000000000, 0x8080fffffffe) [ 1799.572477][T17509] BPF: (invalid-name-offset) type_id=2 bits_offset=0 [ 1799.582894][T17509] BPF: [ 1799.585689][T17509] BPF:Invalid member name_offset:6 [ 1799.674040][T17509] BPF: [ 1799.674040][T17509] [ 1800.279652][T17411] ================================================================== [ 1800.287818][T17411] BUG: KCSAN: data-race in generic_file_read_iter / simple_write_end [ 1800.295871][T17411] [ 1800.298209][T17411] write to 0xffff8880701e0cc8 of 8 bytes by task 17080 on cpu 1: [ 1800.305958][T17411] simple_write_end+0x1cc/0x370 [ 1800.310818][T17411] generic_perform_write+0x1d7/0x320 [ 1800.316111][T17411] __generic_file_write_iter+0x240/0x370 [ 1800.321746][T17411] generic_file_write_iter+0x294/0x38e [ 1800.327208][T17411] do_iter_readv_writev+0x4a7/0x5d0 [ 1800.332408][T17411] do_iter_write+0x137/0x3a0 [ 1800.337112][T17411] vfs_iter_write+0x56/0x80 [ 1800.341621][T17411] iter_file_splice_write+0x530/0x830 [ 1800.347011][T17411] direct_splice_actor+0x97/0xb0 [ 1800.351958][T17411] splice_direct_to_actor+0x22f/0x540 [ 1800.357332][T17411] do_splice_direct+0x152/0x1d0 [ 1800.362184][T17411] do_sendfile+0x396/0x810 [ 1800.366600][T17411] __x64_sys_sendfile64+0xb8/0x140 [ 1800.371716][T17411] do_syscall_64+0xc7/0x390 [ 1800.376220][T17411] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1800.382101][T17411] [ 1800.384436][T17411] read to 0xffff8880701e0cc8 of 8 bytes by task 17411 on cpu 0: [ 1800.392066][T17411] generic_file_read_iter+0x85b/0x1490 [ 1800.397622][T17411] generic_file_splice_read+0x2df/0x470 [ 1800.403167][T17411] do_splice_to+0xc7/0x100 [ 1800.407581][T17411] splice_direct_to_actor+0x1b9/0x540 [ 1800.412947][T17411] do_splice_direct+0x152/0x1d0 [ 1800.417795][T17411] do_sendfile+0x396/0x810 [ 1800.422212][T17411] __x64_sys_sendfile64+0xb8/0x140 [ 1800.427324][T17411] do_syscall_64+0xc7/0x390 [ 1800.431829][T17411] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1800.437706][T17411] [ 1800.440029][T17411] Reported by Kernel Concurrency Sanitizer on: [ 1800.446189][T17411] CPU: 0 PID: 17411 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1800.454853][T17411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1800.464917][T17411] ================================================================== [ 1800.472971][T17411] Kernel panic - not syncing: panic_on_warn set ... [ 1800.479561][T17411] CPU: 0 PID: 17411 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1800.488223][T17411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1800.498276][T17411] Call Trace: [ 1800.501577][T17411] dump_stack+0x11d/0x187 [ 1800.505920][T17411] panic+0x210/0x640 [ 1800.509823][T17411] ? vprintk_func+0x89/0x13a [ 1800.514424][T17411] kcsan_report.cold+0xc/0x14 [ 1800.519110][T17411] kcsan_setup_watchpoint+0x304/0x400 [ 1800.524494][T17411] generic_file_read_iter+0x85b/0x1490 [ 1800.529994][T17411] generic_file_splice_read+0x2df/0x470 [ 1800.535548][T17411] ? add_to_pipe+0x1b0/0x1b0 [ 1800.540144][T17411] do_splice_to+0xc7/0x100 [ 1800.544563][T17411] splice_direct_to_actor+0x1b9/0x540 [ 1800.549950][T17411] ? generic_pipe_buf_nosteal+0x20/0x20 [ 1800.555501][T17411] do_splice_direct+0x152/0x1d0 [ 1800.560375][T17411] do_sendfile+0x396/0x810 [ 1800.564813][T17411] __x64_sys_sendfile64+0xb8/0x140 [ 1800.569940][T17411] do_syscall_64+0xc7/0x390 [ 1800.574450][T17411] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1800.580338][T17411] RIP: 0033:0x45c479 [ 1800.584240][T17411] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1800.603845][T17411] RSP: 002b:00007fb2f9c9bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1800.612274][T17411] RAX: ffffffffffffffda RBX: 00007fb2f9c9c6d4 RCX: 000000000045c479 [ 1800.620251][T17411] RDX: 0000000020000240 RSI: 0000000000000006 RDI: 0000000000000006 [ 1800.628224][T17411] RBP: 000000000076c060 R08: 0000000000000000 R09: 0000000000000000 [ 1800.636206][T17411] R10: 02008000fffffffe R11: 0000000000000246 R12: 00000000ffffffff [ 1800.644184][T17411] R13: 00000000000008d1 R14: 00000000004cb364 R15: 000000000076c06c [ 1800.653518][T17411] Kernel Offset: disabled [ 1800.657847][T17411] Rebooting in 86400 seconds..