[ 275.591547][T10765] BPF:[1] ENUM [ 275.608712][T10765] BPF:size=4 vlen=0 20:05:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 275.625924][T10766] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 275.626337][T10770] BPF:[1] Invalid name_offset:7 [ 275.644509][T10765] BPF: [ 275.651509][T10768] BPF: Invalid name_offset:14 [ 275.666767][T10765] BPF:Invalid name 20:05:18 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x4801, 0x0) 20:05:18 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x21, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 275.691055][T10765] BPF: [ 275.691055][T10765] [ 275.706774][T10768] BPF: Invalid name_offset:14 20:05:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 275.937919][T10790] BPF: Invalid name_offset:14 [ 275.960554][T10792] BPF:[1] ENUM 20:05:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') [ 275.984018][T10792] BPF:size=4 vlen=0 [ 276.001732][T10792] BPF: [ 276.014199][T10797] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 276.026222][T10792] BPF:Invalid name 20:05:19 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe", 0x33, 0x400}], 0x4801, 0x0) [ 276.043509][T10794] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 276.067202][T10792] BPF: [ 276.067202][T10792] 20:05:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:05:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 276.314906][T10814] BPF:[1] ENUM [ 276.327030][T10814] BPF:size=4 vlen=0 [ 276.365827][T10774] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 276.382252][T10815] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 276.389870][T10814] BPF: [ 276.410250][T10814] BPF:Invalid name [ 276.438113][T10814] BPF: [ 276.438113][T10814] [ 276.460672][T10824] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2b, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x480, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x28, 0x0, 0x9, 0x801, 0x0, 0x0, {0x1, 0x0, 0x4}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0xfffffffd}}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}]}, 0x28}, 0x1, 0x0, 0x0, 0x48040}, 0x24040800) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 20:05:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:05:19 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe", 0x33, 0x400}], 0x4801, 0x0) 20:05:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 276.639877][T10790] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 276.667732][T10843] BPF:[1] ENUM [ 276.691782][T10843] BPF:size=4 vlen=0 [ 276.711135][T10847] BPF: Invalid name_offset:14 [ 276.730869][T10845] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 276.749036][T10843] BPF: [ 276.789825][T10843] BPF:Invalid name [ 276.821130][T10843] BPF: [ 276.821130][T10843] [ 276.871431][T10859] BPF:[1] Invalid name_offset:7 20:05:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) socket(0x28, 0x3, 0xffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x9c01}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x30a) 20:05:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:20 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe", 0x33, 0x400}], 0x4801, 0x0) 20:05:20 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7e, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 277.034191][T10866] BPF:[1] ENUM [ 277.052646][T10868] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 277.057906][T10866] BPF:size=4 vlen=0 [ 277.086024][T10866] BPF: [ 277.092447][T10870] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 277.107146][T10866] BPF:Invalid name [ 277.131470][T10877] BPF: Invalid name_offset:14 [ 277.142243][T10878] BPF: Invalid name_offset:14 20:05:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 277.176052][T10866] BPF: [ 277.176052][T10866] 20:05:20 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ff", 0x37, 0x400}], 0x4801, 0x0) [ 277.361760][T10899] BPF:[1] ENUM [ 277.365346][T10899] BPF:size=4 vlen=0 [ 277.371738][T10899] BPF: [ 277.374524][T10899] BPF:Invalid name [ 277.381719][T10900] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 277.388400][T10899] BPF: [ 277.388400][T10899] [ 277.471011][T10859] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 20:05:20 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2b, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) 20:05:20 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:20 executing program 1: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x80, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 20:05:20 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ff", 0x37, 0x400}], 0x4801, 0x0) [ 277.714606][T10912] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 277.728728][T10915] BPF: Invalid name_offset:14 [ 277.738194][T10918] BPF:[1] ENUM [ 277.746320][T10918] BPF:size=4 vlen=0 [ 277.760871][T10918] BPF: [ 277.763707][T10915] BPF: Invalid name_offset:14 20:05:20 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x500, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 277.786256][T10918] BPF:Invalid name [ 277.796759][T10920] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 277.811198][T10921] BPF:[1] Invalid name_offset:7 20:05:20 executing program 1: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) [ 277.847514][T10918] BPF: [ 277.847514][T10918] 20:05:21 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ff", 0x37, 0x400}], 0x4801, 0x0) 20:05:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 278.015804][T10941] BPF: Invalid name_offset:14 [ 278.029366][T10942] BPF:[1] ENUM [ 278.036285][T10941] BPF: Invalid name_offset:14 20:05:21 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x600, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 278.060594][T10942] BPF:size=4 vlen=0 [ 278.128890][T10945] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 278.140009][T10942] BPF: [ 278.167506][T10942] BPF:Invalid name 20:05:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 278.201756][T10952] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 278.202606][T10942] BPF: [ 278.202606][T10942] [ 278.220521][T10953] BPF: Invalid name_offset:14 [ 278.243670][T10953] BPF: Invalid name_offset:14 20:05:21 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2b, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:21 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:21 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53", 0x39, 0x400}], 0x4801, 0x0) 20:05:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x11, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast1}, {0x306}, 0x20, {0x2, 0x4e24, @remote}, 'nr0\x00'}) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r3, r3) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) ioctl$NBD_SET_SOCK(r2, 0xab00, r4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x5, 0xffffffffffffffff, 0xb) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r5, &(0x7f00000017c0), 0x3a8, 0x0) 20:05:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) [ 278.717491][T10975] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 278.733027][T10976] BPF: Invalid name_offset:14 [ 278.736580][T10978] BPF:[1] ENUM [ 278.743254][T10978] BPF:size=4 vlen=0 [ 278.758766][T10978] BPF: 20:05:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) ppoll(&(0x7f0000001080)=[{}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x15) process_vm_readv(0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/40, 0x28}, {&(0x7f0000000040)}, {&(0x7f00000000c0)=""/118, 0x76}, {&(0x7f0000000180)=""/191, 0xbf}], 0x4, &(0x7f00000002c0)=[{&(0x7f0000000280)=""/48, 0x30}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x15) r4 = syz_open_procfs(r1, &(0x7f0000000080)='sessionid\x00') preadv(r4, &(0x7f00000017c0), 0x3a8, 0x0) 20:05:21 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:21 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53", 0x39, 0x400}], 0x4801, 0x0) [ 278.768704][T10978] BPF:Invalid name [ 278.774174][T10976] BPF: Invalid name_offset:14 [ 278.780095][T10982] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 278.782492][T10978] BPF: [ 278.782492][T10978] 20:05:22 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53", 0x39, 0x400}], 0x4801, 0x0) [ 278.856539][T10997] BPF:[1] ENUM [ 278.860495][T10997] BPF:size=4 vlen=0 [ 278.866141][T10997] BPF: [ 278.870455][T10997] BPF:Invalid name [ 278.871944][T10999] BPF:[1] Invalid name_offset:7 [ 278.874280][T10997] BPF: [ 278.874280][T10997] 20:05:22 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a}], 0x4801, 0x0) [ 278.918077][T11003] BPF:[1] ENUM [ 278.921764][T11003] BPF:size=4 vlen=0 [ 278.937543][T11003] BPF: [ 278.943877][T11003] BPF:Invalid name [ 278.956853][T11003] BPF: [ 278.956853][T11003] [ 279.012881][T11007] BPF: Invalid name_offset:14 20:05:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 279.037036][T11007] BPF: Invalid name_offset:14 [ 279.053559][T11011] BPF:[1] ENUM [ 279.071268][T11011] BPF:size=4 vlen=0 [ 279.098452][T11011] BPF: [ 279.110330][T11011] BPF:Invalid name [ 279.123957][T11011] BPF: [ 279.123957][T11011] [ 279.187472][T11019] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 279.445988][T10989] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 20:05:22 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2b, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:22 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x60ff, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:22 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a}], 0x4801, 0x0) 20:05:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) [ 279.634223][T11036] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 279.657660][T11038] BPF: Invalid name_offset:14 [ 279.662272][T11039] BPF:[1] ENUM [ 279.674168][T11039] BPF:size=4 vlen=0 20:05:22 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7900, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 279.684509][T11038] BPF: Invalid name_offset:14 [ 279.693321][T11039] BPF: [ 279.700463][T11041] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 279.707469][T11039] BPF:Invalid name [ 279.722139][T11039] BPF: [ 279.722139][T11039] [ 279.759489][T11050] BPF:[1] Invalid name_offset:7 [ 279.901235][T11060] BPF: Invalid name_offset:14 [ 279.932033][T11060] BPF: Invalid name_offset:14 20:05:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x20, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r3 = dup2(r2, r2) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f0000000000)={0x4, [0x7dd, 0x4, 0x400, 0x4, 0x6, 0x3ff, 0x1000, 0x0, 0x101, 0x0, 0x0, 0xfffe, 0x80, 0x101, 0x5, 0x1000, 0xf3e2, 0x3ff, 0x4, 0x6e99, 0x8000, 0x1, 0x1, 0x0, 0x2, 0xa50, 0x45a, 0x8, 0x7, 0x8, 0x9, 0x7, 0x0, 0x7, 0x4, 0x0, 0x3, 0x8001, 0x7fff, 0x3, 0xffff, 0x7ff, 0x429, 0x5, 0x9, 0x5, 0x3, 0x5], 0x2}) 20:05:23 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7e00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:23 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a}], 0x4801, 0x0) 20:05:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 280.124400][T11070] BPF:[1] ENUM [ 280.143543][T11073] BPF: Invalid name_offset:14 [ 280.149642][T11072] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 280.152813][T11070] BPF:size=4 vlen=0 [ 280.184500][T11071] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 280.196873][T11073] BPF: Invalid name_offset:14 [ 280.239536][T11070] BPF: 20:05:23 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb900, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 280.269201][T11070] BPF:Invalid name 20:05:23 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 280.318814][T11070] BPF: [ 280.318814][T11070] [ 280.336725][T11092] BPF: Invalid name_offset:14 [ 280.367691][T11092] BPF: Invalid name_offset:14 [ 280.417017][T11050] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 280.546458][T11100] BPF:[1] ENUM [ 280.564161][T11100] BPF:size=4 vlen=0 [ 280.580692][T11100] BPF: 20:05:23 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:23 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x400000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x2, 0x0, 0x1, 0x1, 0x7, 0x100, 0x2, 0x0, r4}, &(0x7f0000000040)=0x20) ppoll(&(0x7f0000001080)=[{}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x15) r5 = getpgrp(0x0) syz_open_procfs(r5, &(0x7f0000000200)='net/ip6_tables_matches\x00') 20:05:23 executing program 4 (fault-call:4 fault-nth:0): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 280.593723][T11100] BPF:Invalid name [ 280.606622][T11100] BPF: [ 280.606622][T11100] [ 280.612269][T11099] EXT4-fs (loop0): bad geometry: block count 1104 exceeds size of device (1 blocks) [ 280.713649][T11109] BPF: Invalid name_offset:14 [ 280.729028][T11112] FAULT_INJECTION: forcing a failure. [ 280.729028][T11112] name failslab, interval 1, probability 0, space 0, times 0 [ 280.741689][T11112] CPU: 0 PID: 11112 Comm: syz-executor.4 Not tainted 5.8.0-rc4-next-20200710-syzkaller #0 [ 280.751578][T11112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.761637][T11112] Call Trace: [ 280.764935][T11112] dump_stack+0x18f/0x20d [ 280.769289][T11112] should_fail.cold+0x5/0x14 [ 280.773888][T11112] ? load_msg+0x3e/0x460 [ 280.778136][T11112] should_failslab+0x5/0xf [ 280.782562][T11112] slab_pre_alloc_hook.constprop.0+0xf4/0x1f0 [ 280.785905][T11115] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 280.788632][T11112] __kmalloc+0x6f/0x320 [ 280.788655][T11112] load_msg+0x3e/0x460 [ 280.788676][T11112] do_msgsnd+0x184/0x14d0 [ 280.788693][T11112] ? __might_fault+0x11f/0x1d0 [ 280.788709][T11112] ? newque+0x630/0x630 [ 280.788739][T11112] __x64_sys_msgsnd+0xe0/0x130 [ 280.788756][T11112] do_syscall_64+0x60/0xe0 [ 280.788775][T11112] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 280.788796][T11112] RIP: 0033:0x45cba9 [ 280.838330][T11112] Code: Bad RIP value. [ 280.842391][T11112] RSP: 002b:00007f2f19054c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000045 [ 280.850799][T11112] RAX: ffffffffffffffda RBX: 00000000004f8600 RCX: 000000000045cba9 20:05:24 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:24 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 280.858813][T11112] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 000000000000003b [ 280.866870][T11112] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 280.874834][T11112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 280.882789][T11112] R13: 00000000000007a4 R14: 00000000004ca8d4 R15: 00007f2f190556d4 20:05:24 executing program 4 (fault-call:4 fault-nth:1): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 280.925748][T11109] BPF: Invalid name_offset:14 20:05:24 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x53e000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:24 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 281.074583][T11129] BPF:[1] ENUM [ 281.094337][T11129] BPF:size=4 vlen=0 [ 281.107440][T11130] EXT4-fs (loop0): bad geometry: block count 1104 exceeds size of device (1 blocks) 20:05:24 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 281.128193][T11129] BPF: [ 281.128312][T11134] BPF: Invalid name_offset:14 [ 281.130986][T11129] BPF:Invalid name [ 281.130992][T11129] BPF: [ 281.130992][T11129] 20:05:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:05:24 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000040)=""/219, 0x0, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 281.250119][T11146] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:24 executing program 0 (fault-call:2 fault-nth:0): clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 281.299978][T11150] BPF:[1] ENUM [ 281.308694][T11150] BPF:size=4 vlen=0 [ 281.318018][T11150] BPF: [ 281.321036][T11150] BPF:Invalid name [ 281.325014][T11150] BPF: [ 281.325014][T11150] [ 281.395472][T11160] BPF:hdr_len not found [ 281.534644][T11167] BPF:[1] ENUM [ 281.542300][T11169] FAULT_INJECTION: forcing a failure. [ 281.542300][T11169] name failslab, interval 1, probability 0, space 0, times 0 [ 281.560104][T11167] BPF:size=4 vlen=0 [ 281.570631][T11167] BPF: [ 281.574777][T11167] BPF:Invalid name [ 281.580900][T11167] BPF: [ 281.580900][T11167] [ 281.586325][T11169] CPU: 0 PID: 11169 Comm: syz-executor.0 Not tainted 5.8.0-rc4-next-20200710-syzkaller #0 [ 281.596220][T11169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.606276][T11169] Call Trace: [ 281.609576][T11169] dump_stack+0x18f/0x20d [ 281.613914][T11169] should_fail.cold+0x5/0x14 [ 281.618517][T11169] ? __do_sys_memfd_create+0xf6/0x440 [ 281.623892][T11169] should_failslab+0x5/0xf [ 281.628317][T11169] slab_pre_alloc_hook.constprop.0+0xf4/0x1f0 [ 281.634387][T11169] __kmalloc+0x6f/0x320 [ 281.638544][T11169] ? __sb_end_write+0xf8/0x1d0 [ 281.643307][T11169] ? strnlen_user+0x223/0x2f0 [ 281.650856][T11169] __do_sys_memfd_create+0xf6/0x440 [ 281.656058][T11169] ? ksys_write+0x1a5/0x250 [ 281.660564][T11169] ? memfd_file_seals_ptr+0x150/0x150 [ 281.665938][T11169] ? lock_is_held_type+0xb0/0xe0 [ 281.670991][T11169] ? do_syscall_64+0x1c/0xe0 [ 281.675589][T11169] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 281.681577][T11169] do_syscall_64+0x60/0xe0 [ 281.686001][T11169] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 281.691889][T11169] RIP: 0033:0x45cba9 [ 281.695771][T11169] Code: Bad RIP value. [ 281.699833][T11169] RSP: 002b:00007fa7f4115a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 281.708244][T11169] RAX: ffffffffffffffda RBX: 000000000050b240 RCX: 000000000045cba9 [ 281.716215][T11169] RDX: 0000000020010288 RSI: 0000000000000000 RDI: 00000000004c1d11 [ 281.724188][T11169] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 281.732160][T11169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 281.740129][T11169] R13: 0000000000000c55 R14: 00000000004ce97c R15: 00007fa7f41166d4 [ 281.760571][T11143] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 281.776161][T11134] BPF: Invalid name_offset:14 20:05:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x2000, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:05:24 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000040)=""/219, 0x0, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:24 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xf9, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xeffffffffffffffd, 0x6}, 0xead2, 0x0, 0x4, 0x1, 0x0, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x40, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r2, r2) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x9c01}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r7, 0x0) ioctl$TUNSETOWNER(r5, 0x400454cc, r7) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) write$dsp(r4, &(0x7f00000000c0)="edf682ea7b4427be3488e579033989c548e8f2015085169cd2178a4231b8c31a45e39b43273bf4ab9f0dd638b790a4bfe7f7618198c9335e185814ef58369efd779de260e2c8801363dae3c31c27f8723bcd4ab8bfa11389d86a49974ce29cec1d26973325a29bfe84c6e78f747c3253dd0d89", 0x73) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x40300) 20:05:25 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x607400, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:25 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000040)=""/219, 0x0, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 281.942986][T11179] BPF:hdr_len not found [ 281.947699][T11180] BPF:[1] ENUM [ 281.964979][T11183] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 281.982787][T11180] BPF:size=4 vlen=0 [ 282.038734][T11180] BPF: 20:05:25 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 282.065435][T11180] BPF:Invalid name [ 282.079720][T11180] BPF: [ 282.079720][T11180] 20:05:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x200000, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 282.178793][T11198] BPF:hdr_len not found [ 282.181555][T11202] BPF: Invalid name_offset:14 [ 282.221249][T11202] BPF: Invalid name_offset:14 20:05:25 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x73d000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) [ 282.279198][T11210] BPF:[1] ENUM [ 282.282932][T11210] BPF:size=4 vlen=0 20:05:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff8000/0x4000)=nil, 0x0, 0x0, r0}, 0x68) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x7, &(0x7f0000000000)=0x200, 0x4) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x11, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) setsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @remote}, 0x8) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r4 = syz_open_dev$vcsu(&(0x7f0000000380)='/dev/vcsu#\x00', 0x100000000, 0x400000) sendmsg$AUDIT_DEL_RULE(r4, &(0x7f0000000480)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)={&(0x7f0000001300)=ANY=[@ANYBLOB="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"], 0x44c}, 0x1, 0x0, 0x0, 0x4040}, 0x20000000) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="04000000000000000000", @ANYRES16=r3, @ANYBLOB="080028bd7000fbdbdf250500000005002200000000000c0016000400000000000000080018000000000005000d000000000006001c000000000008001800e0000002050006000800000005000d0001000000"], 0x58}}, 0x40000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r5, &(0x7f00000017c0), 0x3a8, 0x0) [ 282.359242][T11210] BPF: [ 282.387563][T11210] BPF:Invalid name [ 282.394425][T11215] BPF: Invalid name_offset:14 [ 282.409034][T11216] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 282.421464][T11210] BPF: [ 282.421464][T11210] 20:05:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x1000000, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 282.440592][T11215] BPF: Invalid name_offset:14 20:05:25 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x746000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 282.504511][T11210] BPF:[1] ENUM [ 282.535263][T11210] BPF:size=4 vlen=0 [ 282.558503][T11210] BPF: [ 282.582460][T11210] BPF:Invalid name [ 282.612703][T11210] BPF: [ 282.612703][T11210] 20:05:25 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) [ 282.708723][T11236] BPF: Invalid name_offset:14 20:05:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x8010020, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 282.766037][T11236] BPF: Invalid name_offset:14 20:05:25 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x790000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 282.860389][T11244] BPF:[1] ENUM [ 282.884092][T11245] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 282.893707][T11244] BPF:size=4 vlen=0 [ 282.934451][T11244] BPF: [ 282.957094][T11244] BPF:Invalid name [ 282.976931][T11244] BPF: [ 282.976931][T11244] [ 282.987488][T11251] BPF: Invalid name_offset:14 [ 283.020607][T11251] BPF: Invalid name_offset:14 [ 283.047432][T11244] BPF:[1] ENUM [ 283.089195][T11244] BPF:size=4 vlen=0 [ 283.114004][T11244] BPF: [ 283.134166][T11244] BPF:Invalid name [ 283.162837][T11244] BPF: [ 283.162837][T11244] 20:05:26 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x1f, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x20000108, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:05:26 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb90000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) 20:05:26 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$x25(0xffffffffffffffff, &(0x7f00000001c0)={0x9, @remote={[], 0x1}}, 0x12) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x7, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x40, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000140)='htcp\x00', 0x5) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x11, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 283.403590][T11267] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 283.413351][T11268] BPF:[1] ENUM [ 283.427663][T11269] BPF: Invalid name_offset:14 [ 283.437079][T11268] BPF:size=4 vlen=0 20:05:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x20000000000000, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:05:26 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xd07300, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:26 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x1f, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 283.470877][T11268] BPF: [ 283.477427][T11269] BPF: Invalid name_offset:14 [ 283.489682][T11275] BPF:No type found [ 283.500040][T11268] BPF:Invalid name [ 283.547810][T11268] BPF: [ 283.547810][T11268] [ 283.626925][T11285] BPF:[1] ENUM [ 283.630511][T11285] BPF:size=4 vlen=0 [ 283.634312][T11285] BPF: [ 283.699993][T11291] BPF: Invalid name_offset:14 [ 283.720002][T11285] BPF:Invalid name 20:05:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:26 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x5, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 283.749228][T11285] BPF: [ 283.749228][T11285] [ 283.754311][T11295] BPF:No type found [ 283.761615][T11291] BPF: Invalid name_offset:14 20:05:26 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xe05300, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:26 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x1f, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x100000000000000, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 283.971106][T11305] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 283.985922][T11306] BPF:No type found 20:05:27 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2b, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f00000000c0)={0x1, @output={0x1000, 0x1, {0x156, 0x10001}, 0x7f, 0x2}}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r3, &(0x7f0000001300)=[{&(0x7f0000001340)=""/209, 0xfffffffffffffcb6}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/51, 0xfffffffffffffe8f}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r5 = dup2(r4, r4) connect$netlink(r5, &(0x7f0000000080)=@unspec, 0xc) fsmount(r5, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$netlink(r6, &(0x7f0000000080)=@unspec, 0xc) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000000)=0x0) process_vm_readv(r7, &(0x7f0000002700)=[{&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000001440)=""/146, 0x92}, {&(0x7f0000001500)=""/185, 0xb9}, {&(0x7f00000015c0)=""/79, 0x4f}, {&(0x7f0000001640)=""/187, 0xbb}, {&(0x7f0000001700)=""/4096, 0x1000}], 0x6, &(0x7f0000004980)=[{&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000280)=""/50, 0x32}, {&(0x7f0000004780)=""/69, 0x45}, {&(0x7f0000004800)=""/26, 0x1a}, {&(0x7f0000004840)=""/55, 0x37}, {&(0x7f0000004880)=""/196, 0xc4}], 0x7, 0x0) [ 284.025005][T11309] BPF:[1] ENUM [ 284.055968][T11309] BPF:size=4 vlen=0 [ 284.066141][T11312] BPF: Invalid name_offset:14 [ 284.091371][T11309] BPF: [ 284.107211][T11309] BPF:Invalid name [ 284.134513][T11312] BPF: Invalid name_offset:14 [ 284.146925][T11309] BPF: [ 284.146925][T11309] [ 284.188091][T11309] BPF:[1] ENUM 20:05:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x801002000000000, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:05:27 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 284.209674][T11309] BPF:size=4 vlen=0 [ 284.254140][T11309] BPF: 20:05:27 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2b, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 284.285165][T11309] BPF:Invalid name 20:05:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 284.327983][T11309] BPF: [ 284.327983][T11309] 20:05:27 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 284.477297][T11337] BPF: Invalid name_offset:14 20:05:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x41c1, 0x408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8300}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x7, &(0x7f0000000000)=0x200, 0x4) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x11, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) 20:05:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x2000) msgctl$IPC_RMID(r0, 0x0) [ 284.518156][T11337] BPF: Invalid name_offset:14 20:05:27 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 284.580169][T11344] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 284.620051][T11345] BPF:[1] ENUM [ 284.651106][T11345] BPF:size=4 vlen=0 [ 284.685418][T11345] BPF: [ 284.709119][T11345] BPF:Invalid name [ 284.750918][T11345] BPF: [ 284.750918][T11345] [ 284.807691][T11345] BPF:[1] ENUM [ 284.827978][T11354] BPF: Invalid name_offset:14 [ 284.870841][T11345] BPF:size=4 vlen=0 20:05:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:28 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 284.911662][T11345] BPF: [ 284.914235][T11354] BPF: Invalid name_offset:14 [ 284.946041][T11345] BPF:Invalid name 20:05:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x200000) msgctl$IPC_RMID(r0, 0x0) [ 284.995149][T11345] BPF: [ 284.995149][T11345] 20:05:28 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 285.137490][T11369] BPF: Invalid name_offset:14 [ 285.151415][T11370] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 285.189861][T11369] BPF: Invalid name_offset:14 20:05:28 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 285.216917][T11376] BPF:[1] ENUM [ 285.259714][T11376] BPF:size=4 vlen=0 [ 285.294775][T11376] BPF: 20:05:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x1000000) msgctl$IPC_RMID(r0, 0x0) [ 285.320102][T11376] BPF:Invalid name [ 285.353008][T11376] BPF: [ 285.353008][T11376] [ 285.408776][T11376] BPF:[1] ENUM [ 285.431312][T11387] BPF: Invalid name_offset:14 [ 285.432988][T11376] BPF:size=4 vlen=0 [ 285.493013][T11376] BPF: [ 285.499404][T11387] BPF: Invalid name_offset:14 [ 285.528012][T11376] BPF:Invalid name [ 285.554943][T11376] BPF: [ 285.554943][T11376] 20:05:28 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2b, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r3}}}}}}]}, 0x48}}, 0x0) 20:05:28 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x5000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:28 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x8010020) msgctl$IPC_RMID(r0, 0x0) [ 285.794396][T11401] BPF:[1] ENUM [ 285.802572][T11404] BPF: Invalid name_offset:14 [ 285.817231][T11401] BPF:size=4 vlen=0 20:05:29 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2a, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:29 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 285.843778][T11404] BPF: Invalid name_offset:14 [ 285.857174][T11401] BPF: [ 285.882073][T11401] BPF:Invalid name [ 285.922472][T11401] BPF: [ 285.922472][T11401] 20:05:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r3}}}}}}]}, 0x48}}, 0x0) [ 285.987512][T11401] BPF:[1] ENUM [ 286.053403][T11401] BPF:size=4 vlen=0 [ 286.063308][T11422] BPF:[1] Invalid name_offset:7 [ 286.065177][T11401] BPF: [ 286.073465][T11423] BPF: Invalid name_offset:14 20:05:29 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x29, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 286.094359][T11401] BPF:Invalid name 20:05:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x20000108) msgctl$IPC_RMID(r0, 0x0) 20:05:29 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 286.131983][T11401] BPF: [ 286.131983][T11401] [ 286.145443][T11423] BPF: Invalid name_offset:14 20:05:29 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 286.318146][T11437] BPF:[1] Invalid name_offset:7 [ 286.341107][T11440] BPF:[1] ENUM [ 286.363093][T11440] BPF:size=4 vlen=0 [ 286.396895][T11440] BPF: [ 286.422065][T11440] BPF:Invalid name [ 286.426033][T11444] BPF: Invalid name_offset:14 [ 286.456505][T11440] BPF: [ 286.456505][T11440] [ 286.464667][T11444] BPF: Invalid name_offset:14 [ 286.505933][T11440] BPF:[1] ENUM [ 286.548597][T11440] BPF:size=4 vlen=0 [ 286.567285][T11440] BPF: [ 286.584893][T11440] BPF:Invalid name [ 286.612447][T11440] BPF: [ 286.612447][T11440] [ 286.910543][T11437] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 20:05:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x20000000000000) msgctl$IPC_RMID(r0, 0x0) 20:05:30 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x20000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:30 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x21, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r3}}}}}}]}, 0x48}}, 0x0) [ 287.019755][T11459] BPF:[1] ENUM [ 287.031448][T11460] BPF: Invalid name_offset:14 [ 287.034540][T11459] BPF:size=4 vlen=0 [ 287.055737][T11459] BPF: [ 287.064885][T11459] BPF:Invalid name [ 287.073461][T11460] BPF: Invalid name_offset:14 [ 287.077298][T11459] BPF: [ 287.077298][T11459] [ 287.107464][T11459] BPF:[1] ENUM [ 287.119588][T11459] BPF:size=4 vlen=0 20:05:30 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x21000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x100000000000000) msgctl$IPC_RMID(r0, 0x0) [ 287.132303][T11459] BPF: [ 287.152005][T11459] BPF:Invalid name [ 287.167014][T11459] BPF: [ 287.167014][T11459] 20:05:30 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x48, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 287.271399][T11476] BPF: Invalid name_offset:14 [ 287.301673][T11476] BPF: Invalid name_offset:14 [ 287.313759][T11482] BPF:[1] ENUM [ 287.330669][T11482] BPF:size=4 vlen=0 [ 287.348792][T11482] BPF: [ 287.360678][T11482] BPF:Invalid name [ 287.377974][T11482] BPF: [ 287.377974][T11482] [ 287.406554][T11482] BPF:Invalid magic 20:05:30 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x29, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:30 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7e000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:30 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x801002000000000) msgctl$IPC_RMID(r0, 0x0) 20:05:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 287.778650][T11493] BPF:[1] ENUM [ 287.803322][T11493] BPF:size=4 vlen=0 20:05:31 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x7}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x28, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 287.831468][T11493] BPF: [ 287.831500][T11497] BPF: Invalid name_offset:14 [ 287.845751][T11493] BPF:Invalid name [ 287.858358][T11500] BPF:[1] Invalid name_offset:7 [ 287.871838][T11493] BPF: [ 287.871838][T11493] [ 287.874975][T11497] BPF: Invalid name_offset:14 [ 287.912380][T11493] BPF:[1] ENUM [ 287.932292][T11493] BPF:size=4 vlen=0 [ 287.952265][T11493] BPF: [ 287.965007][T11493] BPF:Invalid name [ 288.004410][T11493] BPF: [ 288.004410][T11493] 20:05:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) io_uring_setup(0x7fd, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x1, 0x34e}) r0 = msgget$private(0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x109440, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x0, &(0x7f00000002c0)={0x7, {{0x2, 0x4e23, @multicast1}}, {{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x108) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x7) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x240281) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) [ 288.136365][T11516] BPF:[1] Invalid name_offset:7 20:05:31 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x60, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:31 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 288.465753][T11528] BPF:[1] ENUM [ 288.483581][T11528] BPF:size=4 vlen=0 [ 288.485334][T11530] BPF: Invalid name_offset:14 [ 288.508362][T11528] BPF: [ 288.514393][T11532] BPF: Invalid name_offset:14 [ 288.521436][T11528] BPF:Invalid name [ 288.535400][T11516] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 288.553545][T11528] BPF: [ 288.553545][T11528] [ 288.580381][T11528] BPF:[1] ENUM 20:05:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:31 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x68, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 288.606027][T11528] BPF:size=4 vlen=0 [ 288.610079][T11528] BPF: [ 288.612922][T11528] BPF:Invalid name [ 288.617004][T11528] BPF: [ 288.617004][T11528] 20:05:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="d3"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:05:31 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xff600000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 288.764408][T11551] BPF:[1] ENUM [ 288.780555][T11551] BPF:size=4 vlen=0 [ 288.807955][T11551] BPF: [ 288.826549][T11551] BPF:Invalid name [ 288.830540][T11557] BPF: Invalid name_offset:14 [ 288.854320][T11551] BPF: 20:05:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:32 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffff6, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 288.854320][T11551] [ 288.874736][T11557] BPF: Invalid name_offset:14 [ 288.915524][T11551] BPF:[1] ENUM [ 288.944462][T11551] BPF:size=4 vlen=0 [ 288.976267][T11551] BPF: [ 289.000843][T11551] BPF:Invalid name [ 289.021598][T11551] BPF: [ 289.021598][T11551] [ 289.022449][T11568] BPF: Invalid name_offset:14 20:05:32 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x7}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x28, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:32 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 289.063525][T11568] BPF: Invalid name_offset:14 20:05:32 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 289.187727][T11579] BPF:[1] ENUM [ 289.205918][T11579] BPF:size=4 vlen=0 [ 289.235910][T11579] BPF: [ 289.236420][T11582] BPF:[1] Invalid name_offset:7 [ 289.246940][T11584] BPF: Invalid name_offset:14 [ 289.251720][T11579] BPF:Invalid name [ 289.271727][T11579] BPF: [ 289.271727][T11579] [ 289.286463][T11584] BPF: Invalid name_offset:14 20:05:32 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x7}]}, {0x0, [0x0]}}, &(0x7f0000000040)=""/219, 0x27, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 289.319544][T11579] BPF:[1] ENUM [ 289.376453][T11579] BPF:size=4 vlen=0 [ 289.380299][T11579] BPF: [ 289.383067][T11579] BPF:Invalid name [ 289.436304][T11579] BPF: [ 289.436304][T11579] 20:05:32 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2100000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:33 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x74, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 289.926563][T11598] BPF:[1] ENUM [ 289.936419][T11598] BPF:size=4 vlen=0 [ 289.941240][T11599] BPF:[1] Invalid name_offset:7 [ 289.947259][T11601] BPF: Invalid name_offset:14 [ 289.955831][T11598] BPF: [ 289.970189][T11598] BPF:Invalid name 20:05:33 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 289.984183][T11601] BPF: Invalid name_offset:14 20:05:33 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x400000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 290.037294][T11598] BPF: [ 290.037294][T11598] [ 290.100078][T11598] BPF:[1] ENUM [ 290.148736][T11598] BPF:size=4 vlen=0 [ 290.171667][T11615] BPF:[1] Invalid name_offset:7 [ 290.174999][T11598] BPF: [ 290.187416][T11598] BPF:Invalid name [ 290.212442][T11598] BPF: [ 290.212442][T11598] 20:05:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 290.255315][T11618] BPF: Invalid name_offset:14 20:05:33 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, 0x0, 0x26, 0x0, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:33 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7a, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 290.445565][T11627] BPF:[1] ENUM [ 290.456185][T11627] BPF:size=4 vlen=0 [ 290.484191][T11627] BPF: 20:05:33 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, 0x0, 0x26, 0x0, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 290.497013][T11627] BPF:Invalid name [ 290.534826][T11627] BPF: [ 290.534826][T11627] 20:05:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:33 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, 0x0, 0x26, 0x0, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:34 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 290.915884][T11618] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 291.019452][T11650] BPF: Invalid name_offset:14 20:05:34 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:34 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x60ffffffffff, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 291.151277][T11633] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 291.191952][T11667] BPF: Invalid name_offset:14 20:05:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 291.226803][T11627] BPF:[1] ENUM [ 291.230931][T11627] BPF:size=4 vlen=0 [ 291.234931][T11627] BPF: [ 291.238392][T11627] BPF:Invalid name [ 291.242730][T11627] BPF: [ 291.242730][T11627] 20:05:34 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x790000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:34 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 291.289578][T11673] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 291.349124][T11679] BPF: Invalid name_offset:14 20:05:34 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0x80000000, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f00000004c0)=@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7}, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r3 = dup2(r2, r2) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f0000000000)={0x4, 0x7, [{0x1, 0x0, 0xdb}, {0x200, 0x0, 0x2}, {0x7d5, 0x0, 0x5}, {0x3, 0x0, 0xc600000000000000}]}) msgsnd(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) [ 291.381101][T11679] BPF: Invalid name_offset:14 20:05:34 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7e, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:34 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7fffffffefff, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:34 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 291.605807][T11694] BPF: Invalid name_offset:14 [ 291.621427][T11697] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 291.633415][T11696] BPF:[1] ENUM [ 291.643248][T11696] BPF:size=4 vlen=0 [ 291.650176][T11698] BPF:[1] Invalid name_offset:7 [ 291.653986][T11694] BPF: Invalid name_offset:14 [ 291.679540][T11696] BPF: [ 291.695645][T11696] BPF:Invalid name [ 291.736062][T11696] BPF: [ 291.736062][T11696] [ 292.109685][T11705] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 292.129627][T11696] BPF:[1] ENUM [ 292.133207][T11696] BPF:size=4 vlen=0 [ 292.141374][T11696] BPF: [ 292.144156][T11696] BPF:Invalid name 20:05:35 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb90000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:35 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:05:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 292.196878][T11696] BPF: [ 292.196878][T11696] 20:05:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r1}], 0x1, 0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0xaa, 0x3}, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="51767295102800a4d4e2599cc5e1dbd228a16a9b8db553ccba4f40000000000000001c0701b45b2ca40b4ea4c85214b672a64264b1e0157c1901b6a716d0cacdf9e4120bc948a4a6aa135da3799075c1231448057d3f94209faf875801ae7127689eff16700193031883f1e794442bbaccbf7e290cc490692c5e66c3817ca3dfb3600bc52bc3"], 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r3, r3) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={r7, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) getsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=r7, &(0x7f0000000040)=0x4) msgctl$IPC_RMID(r2, 0x0) [ 292.293984][T11723] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 292.298960][T11724] BPF:[1] Invalid name_offset:7 [ 292.321304][T11726] BPF: Invalid name_offset:14 [ 292.364100][T11726] BPF: Invalid name_offset:14 20:05:35 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xda, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:35 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:05:35 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 292.582895][T11744] BPF:[1] ENUM [ 292.593653][T11744] BPF:size=4 vlen=0 [ 292.601060][T11746] BPF: Invalid name_offset:14 [ 292.611668][T11747] BPF:[1] Invalid name_offset:7 [ 292.615966][T11744] BPF: 20:05:35 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:05:35 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x60740000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 292.635413][T11746] BPF: Invalid name_offset:14 [ 292.648026][T11744] BPF:Invalid name [ 292.686032][T11744] BPF: [ 292.686032][T11744] [ 292.712505][T11754] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 292.770753][T11744] BPF:[1] ENUM [ 292.774598][T11744] BPF:size=4 vlen=0 20:05:35 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 292.813739][T11758] BPF:[1] Invalid name_offset:7 [ 292.826321][T11744] BPF: [ 292.862874][T11744] BPF:Invalid name [ 292.889484][T11766] BPF: Invalid name_offset:14 [ 292.909736][T11744] BPF: [ 292.909736][T11744] 20:05:36 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 292.944202][T11766] BPF: Invalid name_offset:14 20:05:36 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xd0730000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 293.026923][T11775] BPF:[1] Invalid name_offset:7 20:05:36 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 293.146877][T11781] BPF:[1] ENUM [ 293.192291][T11781] BPF:size=4 vlen=0 20:05:36 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x11, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) sendmmsg$sock(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f00000000c0)="d5ad770ab70be7c08dcce0a221d49842263a2e5329c688a4c57f040b15ab47726bd5aed826da02611b183aadd68aba416c06bc7d4d129634869cd0905e636421140acea0bd6810cb022c44015e0e6fc5dd39c9bd1c20c8c8917d8401230cb027a4005231e96ad568d33f5c49ba0c98d2028f5369c18bfbe36fb83e74e099d6dc1a88ebe4a5048436b64f015c97d6b69d10d8503ae8fcba2fd41fc9c1463f9eec4876fbb8950f", 0xa6}, {&(0x7f0000000000)="18f4dc97610541fccb3ba3fe30fceb74c28e0d79d95c62b05bcad2e722e077391ea3d75fd618766c52b9d09906922adaff63cd21de2f46a6bc8ff7cea12891e9c44b7609d476ac477911275c4949ea078cc71f2d2c4c53060280a377e7370800cdbf8c868a94bb23090a74efe4d5d298f4257fa31fa67c972143", 0x7a}, {&(0x7f00000002c0)="abb1e507f7e3ba783080cef51ee99b032b0cc0db06697b3996cd8e76b9fd4d9ef2ab74d9ba969b531dd984bf67c96ad80a6656cacfba9b9c84a2b8eaabacb74257b9a8ada7e8d155972b72ce4a3f640e34540909024e95c452986381f718bcf113369abd7b3c7fbf3fb32e38180287d38e593b3c240ab238d4a38167d19ea492338cb5b0c497befd43a5fae23395af913e53a06aeee1aed4d565cea35e081549d006895f191eba99932c1f3da33e49db3c7e", 0xb2}, {&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000001380)="2f417119a7945d89d06f03343537bc169ba1812a6ef41eaf9f7c9c71f5780970715ec85f76c51428b33b6e60a30937b3eee576e0679e6db3709a28e9b87030487903320a4a72b94fe06059a06f2e5d5efa5983a64f00ac", 0x57}, {&(0x7f0000001400)="217da13a7210134c7f3afd9d72439a6a5c03942cbda4928808efb9773843b7798f12dbe1fb58bb210360ce6fb1c1d09584063f7d6b2a83f94e54b5532990e8556e8531497373e8a8f836abd75b4f0bf185ae5fbe48b7c98c7d439df37053a26efd361ede7e1ff93cb0942697", 0x6c}], 0x6, &(0x7f0000001500)=[@mark={{0x14, 0x1, 0x24, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @mark={{0x14, 0x1, 0x24, 0xb25}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x91}}, @timestamping={{0x14, 0x1, 0x25, 0x3ff}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x1f}}, @mark={{0x14, 0x1, 0x24, 0x800}}], 0xd8}}], 0x1, 0x40000085) alarm(0x10001) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="53dbd23cc7a99eb480f31400dd41b07238a4ff9331e7a7908df8f5d4c49189dcacbbfdd98461bd6206190453d3a68f6b562f9e569ec5721c40f949cffc98236307fab100ba11855e01e2683348eb6a4286d6a3b885799b5badfaa6721cbad826ab1905112c8e9e3d49e30e3421e42b8e5686ba77754b60392252d5d5ccdb0d4fceaa99eca92c519cde57511cffd24827409daead2c5b779ea48fa0192d1ca9436bee079621aca2bd"], 0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) [ 293.219773][T11787] BPF:[1] Invalid name_offset:7 [ 293.230147][T11788] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 293.239126][T11781] BPF: [ 293.248860][T11789] BPF: Invalid name_offset:14 [ 293.257881][T11781] BPF:Invalid name [ 293.289383][T11781] BPF: [ 293.289383][T11781] [ 293.340327][T11781] BPF:[1] ENUM [ 293.365394][T11781] BPF:size=4 vlen=0 20:05:36 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4801, 0x0) 20:05:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 293.417556][T11781] BPF: [ 293.431736][T11781] BPF:Invalid name 20:05:36 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x500, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 293.462234][T11781] BPF: [ 293.462234][T11781] 20:05:36 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4801, 0x0) [ 293.532527][T11807] BPF:[1] Invalid name_offset:7 [ 293.573338][T11810] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 293.604382][T11813] BPF:[1] Invalid name_offset:7 20:05:36 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4801, 0x0) [ 293.655564][T11817] BPF:[1] ENUM [ 293.661289][T11817] BPF:size=4 vlen=0 [ 293.698460][T11817] BPF: [ 293.710698][T11817] BPF:Invalid name [ 293.728845][T11817] BPF: [ 293.728845][T11817] [ 293.759207][T11817] BPF:[1] ENUM [ 293.776096][T11817] BPF:size=4 vlen=0 [ 293.788085][T11826] BPF:[1] Invalid name_offset:7 [ 293.797774][T11817] BPF: 20:05:36 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x4801, 0x0) [ 293.810597][T11817] BPF:Invalid name 20:05:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 293.841169][T11817] BPF: [ 293.841169][T11817] 20:05:37 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x600, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 293.916317][T11830] BPF:[1] Invalid name_offset:7 [ 293.995634][T11835] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. [ 294.030449][T11837] BPF:[1] ENUM [ 294.034141][T11837] BPF:size=4 vlen=0 [ 294.038178][T11789] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 294.049308][T11838] BPF: Invalid name_offset:14 [ 294.072596][T11837] BPF: [ 294.095538][T11837] BPF:Invalid name 20:05:37 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xe0530000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:37 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x4801, 0x0) [ 294.118537][T11837] BPF: [ 294.118537][T11837] [ 294.156903][T11837] BPF:[1] ENUM [ 294.182117][T11837] BPF:size=4 vlen=0 20:05:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 294.204537][T11837] BPF: [ 294.220076][T11837] BPF:Invalid name [ 294.252124][T11837] BPF: [ 294.252124][T11837] 20:05:37 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$netlink(r0, &(0x7f0000000080)=@unspec, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r3, r3) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0xb, 0x4, 0x100000, 0x8, {0x0, 0x2710}, {0x2, 0x8, 0x2, 0x0, 0x81, 0x59, "091a03d7"}, 0x93f, 0x3, @fd=r2, 0x1, 0x0, r4}) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r5 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r5, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01, 0x0, 0x0, 0x0, 0x40}}) r6 = msgget$private(0x0, 0x0) msgsnd(r6, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgsnd(r6, &(0x7f0000000100)=ANY=[], 0x0, 0x0) msgctl$IPC_RMID(r5, 0x0) [ 294.495136][T11859] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. [ 294.517376][T11861] BPF:[1] ENUM [ 294.525682][T11862] BPF: Invalid name_offset:14 [ 294.536802][T11861] BPF:size=4 vlen=0 20:05:37 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x4801, 0x0) [ 294.557268][T11867] BPF:[1] Invalid name_offset:7 [ 294.560210][T11861] BPF: [ 294.565089][T11862] BPF: Invalid name_offset:14 [ 294.584504][T11861] BPF:Invalid name 20:05:37 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x100000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:37 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) r3 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r5}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000000)=0x3) fcntl$setsig(r4, 0xa, 0x12) dup2(r4, r5) prlimit64(r3, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r6, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r6, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r6, 0x0) [ 294.610311][T11868] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 294.616961][T11861] BPF: [ 294.616961][T11861] [ 294.663043][T11861] BPF:[1] ENUM [ 294.711269][T11861] BPF:size=4 vlen=0 20:05:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 294.752516][T11881] BPF: Invalid name_offset:14 [ 294.757997][T11861] BPF: [ 294.787702][T11881] BPF: Invalid name_offset:14 [ 294.794281][T11861] BPF:Invalid name 20:05:37 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x200000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 294.819661][T11886] BPF:[1] Invalid name_offset:7 20:05:37 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x4801, 0x0) [ 294.843616][T11861] BPF: [ 294.843616][T11861] 20:05:38 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:38 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 294.978940][T11894] BPF: Invalid name_offset:14 [ 294.991329][T11896] BPF:[1] Invalid name_offset:7 [ 294.994904][T11895] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. [ 295.030791][T11896] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 295.092899][T11905] BPF:[1] ENUM [ 295.112836][T11909] BPF: Invalid name_offset:14 [ 295.114702][T11905] BPF:size=4 vlen=0 [ 295.130033][T11910] BPF: Invalid name_offset:14 20:05:38 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x4801, 0x0) [ 295.173187][T11905] BPF: [ 295.186717][T11905] BPF:Invalid name [ 295.204102][T11905] BPF: [ 295.204102][T11905] 20:05:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c00010062"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:38 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x400000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 295.258999][T11905] BPF:[1] ENUM [ 295.262685][T11905] BPF:size=4 vlen=0 [ 295.295579][T11905] BPF: [ 295.309866][T11905] BPF:Invalid name [ 295.327375][T11905] BPF: [ 295.327375][T11905] 20:05:38 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb47, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:38 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x4801, 0x0) [ 295.369722][T11918] BPF:[1] Invalid name_offset:7 [ 295.386205][T11919] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:38 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x4801, 0x0) [ 295.448348][T11925] BPF:[1] Invalid name_offset:7 [ 295.461411][T11926] BPF: Invalid name_offset:14 [ 295.503696][T11933] BPF:[1] Invalid name_offset:7 [ 295.551066][T11928] BPF: Invalid name_offset:14 [ 295.577074][T11941] BPF:[1] ENUM [ 295.604034][T11941] BPF:size=4 vlen=0 [ 295.625955][T11941] BPF: [ 295.635433][T11941] BPF:Invalid name [ 295.657140][T11941] BPF: [ 295.657140][T11941] [ 295.684207][T11941] BPF:[1] ENUM [ 295.698073][T11941] BPF:size=4 vlen=0 [ 295.715719][T11941] BPF: [ 295.729864][T11941] BPF:Invalid name [ 295.745758][T11941] BPF: [ 295.745758][T11941] 20:05:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c00010062"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:40 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x4801, 0x0) 20:05:40 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x500000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:40 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb48, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) write$binfmt_elf64(r2, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x1, 0xf0, 0x1, 0x1000, 0x0, 0x0, 0x1, 0x213, 0x40, 0x8f, 0x1, 0x5, 0x38, 0x2, 0x9, 0x400, 0x8}, [{0x2, 0xfc4, 0x7f, 0x100000001, 0x0, 0x8, 0x7fff, 0x9}, {0x60000000, 0x3f, 0x1, 0xbc81, 0x5, 0xfffffffffffffffd, 0x6d, 0x3}], "54eb4aac5ae98d4eeac4ea3b31a5176c1824ef31c08c6a57d4acd7c81ba21298c14c1b803fe95a32c0ef49420190a5819dca048d8081a8e3b557089741fc5e816ba6", [[], [], [], [], [], []]}, 0x6f2) r3 = dup2(r2, r2) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) ioctl$KVM_GET_CPUID2(r3, 0xc008ae91, &(0x7f0000000000)={0x3, 0x0, [{}, {}, {}]}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000000880)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x44050) 20:05:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) dup2(r1, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r3 = dup2(r2, r2) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f00000002c0)={0x3ff, {{0xa, 0x4e21, 0x9, @empty, 0x8001}}, 0x1, 0x7, [{{0xa, 0x4e22, 0x7, @empty, 0xfff}}, {{0xa, 0x4e24, 0x6, @private1, 0x7fd8}}, {{0xa, 0x4e23, 0x101, @private1, 0x6}}, {{0xa, 0x4e24, 0x6, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}}, {{0xa, 0x4e22, 0x4, @mcast2, 0x3f}}, {{0xa, 0x4e23, 0x8a47, @empty, 0x5}}, {{0xa, 0x4e24, 0x4, @empty, 0x7}}]}, 0x410) 20:05:41 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x4801, 0x0) [ 297.847154][T11964] BPF:[1] Invalid name_offset:7 [ 297.854836][T11965] BPF: Invalid name_offset:14 [ 297.866374][T11967] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 297.866410][T11968] BPF:[1] ENUM [ 297.917974][T11965] BPF: Invalid name_offset:14 [ 297.935953][T11966] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 297.959306][T11968] BPF:size=4 vlen=0 [ 297.972980][T11968] BPF: [ 297.980077][T11968] BPF:Invalid name [ 297.990951][T11968] BPF: [ 297.990951][T11968] [ 298.006127][T11968] BPF:[1] ENUM 20:05:41 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x600000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 298.026117][T11968] BPF:size=4 vlen=0 20:05:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') ioctl$CAPI_NCCI_OPENCOUNT(r1, 0x80044326, &(0x7f0000000000)=0xfffffe00) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 298.048801][T11968] BPF: [ 298.065087][T11968] BPF:Invalid name [ 298.092795][T11987] BPF:[1] Invalid name_offset:7 20:05:41 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001", 0x1d, 0x400}], 0x4801, 0x0) [ 298.117101][T11968] BPF: [ 298.117101][T11968] 20:05:41 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb49, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c00010062"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r1 = dup2(r0, r0) connect$netlink(r1, &(0x7f0000000080)=@unspec, 0xc) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f00000000c0)={0x0, &(0x7f0000000000)="a82b7ff4be66d67ec1f00c41793bd5e7daed5f85e23d834e447222f1e3af6e06dbfbb5c14ec4ef21598487309b94955f790096ae719741e97ce040830899f794d1c51e0f0bbf202b4b5fc6044dc68deb568bc4224f"}) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r2, 0x0) 20:05:41 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001", 0x1d, 0x400}], 0x4801, 0x0) [ 298.231319][T11996] BPF:[1] Invalid name_offset:7 [ 298.244862][T11994] BPF: Invalid name_offset:14 [ 298.359836][T12007] BPF:[1] ENUM [ 298.363674][T12007] BPF:size=4 vlen=0 [ 298.368322][T12007] BPF: [ 298.371351][T12007] BPF:Invalid name [ 298.375328][T12007] BPF: [ 298.375328][T12007] [ 298.376909][T12003] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 298.408225][T12011] BPF:[1] Invalid name_offset:7 20:05:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r3 = dup2(r2, r2) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) mmap$qrtrtun(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x2000000, 0x810, r3, 0xad79) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 20:05:41 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001", 0x1d, 0x400}], 0x4801, 0x0) 20:05:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:05:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c00010062726964"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 298.779618][T12027] BPF:[1] Invalid name_offset:7 20:05:41 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x4801, 0x0) [ 298.836806][T12029] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 298.890779][T12033] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 298.974648][T12037] BPF:[1] Invalid name_offset:7 [ 299.055210][T12045] BPF: Invalid name_offset:14 [ 299.069882][T11994] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 299.096260][T12037] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 20:05:42 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x11, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) r1 = accept$inet(r0, &(0x7f0000000000)={0x2, 0x0, @initdev}, &(0x7f0000000040)=0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000140)={{0x0, @loopback, 0x4e20, 0x1, 'lblcr\x00', 0x34, 0x7, 0x58}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x3, 0x4, 0x6, 0x1f}}, 0x44) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r2, 0x0) 20:05:42 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0xfffffffffffffec1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 299.178431][T12007] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 20:05:42 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb4a, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c00010062726964"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:42 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x4801, 0x0) [ 299.390915][T12064] BPF: Invalid name_offset:14 20:05:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, &(0x7f00000001c0)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x6c, r3, 0x10, 0x70bd28, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:sshd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_virt_wifi\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'vlan0\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4008005}, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r4, &(0x7f00000017c0), 0x3a8, 0x0) [ 299.504406][T12074] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 299.507020][T12075] BPF:[1] Invalid name_offset:7 [ 299.543182][T12078] BPF:[1] ENUM [ 299.588392][T12078] BPF:size=4 vlen=0 [ 299.601811][T12076] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 20:05:42 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x4801, 0x0) [ 299.632349][T12078] BPF: [ 299.671308][T12078] BPF:Invalid name [ 299.721711][T12078] BPF: [ 299.721711][T12078] [ 299.772657][T12078] BPF:[1] ENUM 20:05:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c00010062726964"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 299.815664][T12078] BPF:size=4 vlen=0 [ 299.833866][T12078] BPF: [ 299.841963][T12093] BPF:[1] Invalid name_offset:7 [ 299.850499][T12078] BPF:Invalid name [ 299.864106][T12078] BPF: [ 299.864106][T12078] 20:05:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f0000001600)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000015c0)={&(0x7f0000000240)={0x1368, 0x14, 0x8, 0x70bd28, 0x25dfdbfd, {0x3, 0x4}, [@INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0xe3, 0x1, "2bdcc63be117cb16ea696fed23d2f10c601536a9019b8012359e144fd2cd35afd849b84d661e3d9814f46918dcad72ab9a71ac9d2350991629be6f7dfb4242c78b7c549f5f3b452205cd29651bd1dc1c62e13f13c4f6b627020155952e65a58d051df134b2d090cd7fc2b53573e2d0a3e33ce01e0c9c87546d797304df940232e571d8f1d6a5c9f1d70448e0bcaf645f9dd7c64b75cf529341a2ebc065a332e2b00f12df527199324622976cdcc48091950025d0b606be10ff0ef8502491a35cbc00a54d2e07b6549349bff0ca6cc77ef4865dbd2e23fc3bc7b2e7fd5ae952"}, @INET_DIAG_REQ_BYTECODE={0x5, 0x1, 'v'}, @INET_DIAG_REQ_BYTECODE={0xe2, 0x1, "f43423862ba98478be7a3aef75ae7b13282e6a53627d8f458f79495df627aaedf3bcb019ba4090e7b1b5b148ae3aae970cc0a88a146c5f9ea13b4554d34f435e42014e03f4b0fa218dea3a254f3325cf950bf44ef083cd83742fe5744c116f1dbf082d6060bbad5e82e4b6ccdb0691dd9b2478b8f0c06c8ba398421c05ab2778c7e075c0669436f392fd49054bf4f728117433019e4ef1d941fa160ee04c44880ac5cd4726e1ee292d41a6f7ae29a38a38f1cc16b50bc6fe85f6ae60a38db5aad8a9407de34acddce38d1db370f1929c0f34ce8eb4c617217073cd70108a"}, @INET_DIAG_REQ_BYTECODE={0x1e, 0x1, "f77cebbafc87bb0260bebd0c594f5341ad998212d6028a09edc0"}, @INET_DIAG_REQ_BYTECODE={0x7e, 0x1, "543cd9cc9073c6ee802b1672126352c1a08cbc7ec9a14c9728007ae2cdf4b82c1134e2f9e9ceaefab2f069d405acb19495174df2132bb8cdd25ae9be8c9ac39d2b3aa682e0969b106ba828ab1327bca8b9c0c3a963a354551770d3cccc4fd22bcbca7a5531b65bb1d69b7862033ae7593c26f68e764dfaa1364a"}, @INET_DIAG_REQ_BYTECODE={0xdd, 0x1, "cd26696d2723ab78bb19fbfa46fc8f4d091fe29d11cf965efab50cd3d5831fce734beb1429da103fcc4fc940ca4c8d59c47b814d657363abc4d78fbf5b140e2ef8f41e8bf43c1db161f822e3107d37469bd57e7fad735a9d762626057fdfd7b1ca94e524bef7c83aea838ff8268a95b08bcf6dc25fc5799206a99e79bcbdaff11873e5f8e12996ccacd881b8df73d7a38a671c2b3d2aa60c101797f33792f4e8c2c65c738487b24ba620519f747050742db6811000a022414372e03440cd2aa51af2d57b160f667f7fba5744a7de242298e596a7f8bfd9ba39"}]}, 0x1368}, 0x1, 0x0, 0x0, 0x8000}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xbc, r3, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}, {0x5, 0x83, 0x1}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}, {0x5, 0x83, 0x1}}]}, 0xbc}, 0x1, 0x0, 0x0, 0x200040d0}, 0x4004000) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 20:05:43 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb4b, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:43 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe", 0x33, 0x400}], 0x4801, 0x0) [ 300.015147][T12098] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 300.094547][T12106] BPF:[1] ENUM [ 300.117810][T12106] BPF:size=4 vlen=0 [ 300.143625][T12106] BPF: [ 300.153793][T12106] BPF:Invalid name [ 300.154915][T12112] BPF:[1] Invalid name_offset:7 [ 300.163804][T12064] BPF: Invalid name_offset:14 [ 300.164633][T12106] BPF: [ 300.164633][T12106] [ 300.199002][T12106] BPF:[1] ENUM [ 300.202750][T12106] BPF:size=4 vlen=0 [ 300.267436][T12113] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 300.280754][T12106] BPF: [ 300.304808][T12106] BPF:Invalid name [ 300.325465][T12106] BPF: [ 300.325465][T12106] 20:05:43 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7e00000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000000000)) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:05:43 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe", 0x33, 0x400}], 0x4801, 0x0) 20:05:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c0001006272696467"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:43 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r3 = dup2(r2, r2) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) setsockopt$ALG_SET_AEAD_AUTHSIZE(r3, 0x117, 0x5, 0x0, 0x6) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r1, r1) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) write$vhost_msg_v2(r4, &(0x7f0000000000)={0x2, 0x0, {&(0x7f00000000c0)=""/4096, 0x1000, &(0x7f00000010c0)=""/133, 0x3, 0x3}}, 0x48) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r5, &(0x7f00000017c0), 0x3a8, 0x0) 20:05:43 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe", 0x33, 0x400}], 0x4801, 0x0) [ 300.508103][T12134] BPF:[1] Invalid name_offset:7 [ 300.508744][T12132] BPF:[1] ENUM [ 300.533097][T12139] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 300.551940][T12132] BPF:size=4 vlen=0 [ 300.575050][T12132] BPF: [ 300.589230][T12142] BPF: Invalid name_offset:14 [ 300.589438][T12132] BPF:Invalid name [ 300.626114][T12132] BPF: [ 300.626114][T12132] [ 300.645461][T12142] BPF: Invalid name_offset:14 20:05:43 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff00000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 300.709568][T12132] BPF:[1] ENUM [ 300.715583][T12132] BPF:size=4 vlen=0 [ 300.727924][T12132] BPF: [ 300.738898][T12132] BPF:Invalid name [ 300.761288][T12132] BPF: [ 300.761288][T12132] 20:05:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:05:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) write$hidraw(0xffffffffffffffff, &(0x7f0000000000)="505cb210ad992e3407349191c9c9864f6f72ef0eab24fdf9012a474866245923933b75764f08e421", 0x28) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x81, 0x0, 0x0, 0x0, 0x41c1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 300.812823][T12158] BPF:[1] Invalid name_offset:7 20:05:44 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c0001006272696467"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:44 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ff", 0x37, 0x400}], 0x4801, 0x0) [ 300.960215][T12165] BPF: Invalid name_offset:14 20:05:44 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ff", 0x37, 0x400}], 0x4801, 0x0) [ 301.007856][T12169] BPF:[1] Invalid name_offset:7 [ 301.019908][T12165] BPF: Invalid name_offset:14 20:05:44 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffefffffff7f0000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 301.078436][T12176] BPF:[1] ENUM [ 301.102400][T12176] BPF:size=4 vlen=0 [ 301.112482][T12181] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 301.145319][T12176] BPF: 20:05:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:05:44 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ff", 0x37, 0x400}], 0x4801, 0x0) 20:05:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r2 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}, 0x0, 0x0, 0x200000}, &(0x7f00000001c0)=0x9c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0)={r4, 0xcc, "2eda1a7d0f292311e0dca0abb86b4c67869f095abaa8fe84f7437f4a3766f073f9082c6525a42ea07207d604a212d857d94245341fb26a1837cdfcfb900ed70ce0b6f0b9fd6ed58c64f7b5c02f9f09ff9cb92c28f41011e07e09d2752407f668ece442581d775f71bc85ca29d21b45c837a5e8145905d2890385cf3d8efadfb7dbb8be51c131e3207cd057d69f5e8b9528dbaa1fb1508c538cb5e7e562982f6e9204e1717d6c523d473997f8c3accb9ef61044c57cf1bd0c07b86ef87d6a83d2ebfe0dd3849f6b73fef029ce"}, &(0x7f0000000000)=0xd4) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 301.172137][T12176] BPF:Invalid name [ 301.181075][T12184] BPF:[1] Invalid name_offset:7 [ 301.199735][T12176] BPF: [ 301.199735][T12176] [ 301.265987][T12176] BPF:[1] ENUM [ 301.284411][T12193] BPF: Invalid name_offset:14 [ 301.299341][T12176] BPF:size=4 vlen=0 [ 301.303306][T12176] BPF: [ 301.306688][T12176] BPF:Invalid name [ 301.310551][T12176] BPF: [ 301.310551][T12176] 20:05:44 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x470b, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c0001006272696467"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 301.368796][T12193] BPF: Invalid name_offset:14 20:05:44 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff00000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 301.422819][T12205] BPF:[1] Invalid name_offset:7 20:05:44 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53", 0x39, 0x400}], 0x4801, 0x0) 20:05:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r1 = dup2(r0, r0) connect$netlink(r1, &(0x7f0000000080)=@unspec, 0xc) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000000)={0xbba9, 0x8, 0x8, 0x80, 0x0, 0x6}) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x1000, &(0x7f00000000c0), 0x2, r1, 0x4}) msgsnd(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r2, 0x0) [ 301.515955][T12206] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 301.584943][T12214] BPF:[1] ENUM [ 301.593276][T12214] BPF:size=4 vlen=0 [ 301.620219][T12214] BPF: [ 301.638060][T12214] BPF:Invalid name [ 301.671421][T12214] BPF: [ 301.671421][T12214] [ 301.714485][T12217] BPF: Invalid name_offset:14 [ 301.723655][T12219] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 301.765873][T12214] BPF:[1] ENUM [ 301.802132][T12222] BPF:[1] Invalid name_offset:7 [ 301.814010][T12214] BPF:size=4 vlen=0 [ 301.846873][T12217] BPF: Invalid name_offset:14 20:05:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000000000000fcefffffffffffff0100000000000000", @ANYRES32=r1, @ANYBLOB="000000000400000000000001000085de534d9c424a0b000000002000"]) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x5, 0xffffffffffffffff, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r3, r3) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) fcntl$setstatus(r3, 0x4, 0xc0000) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={r7, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000000c0)={r7, 0x6, 0x30}, &(0x7f0000000100)=0xc) ioctl$MEDIA_REQUEST_IOC_QUEUE(r4, 0x7c80, 0x0) 20:05:45 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53", 0x39, 0x400}], 0x4801, 0x0) [ 301.883638][T12214] BPF: [ 301.898306][T12226] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 20:05:45 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffffffff600000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 301.938974][T12214] BPF:Invalid name [ 301.989040][T12214] BPF: [ 301.989040][T12214] 20:05:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003580)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000240)=0xe8) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x8, &(0x7f00000034c0)=[{&(0x7f00000002c0)="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", 0x1000, 0x6}, {&(0x7f0000000140)="065c8b84eb58cd1b9e841add816b02eeab49fc21508fdb934655524eba12ab36d99ac8a7a45910579f687b0ea8de6c8b0221c0293f0b8f6aa228850e5523cb84f941213b14d72277f697e1a91e19c71415904e96a8c277bde005fa9703ec4267e482f8692b5b16ae15a5a8aec7f0aadc3d067120a7678ea5a9fdc8afa8975b868d8f234992701628c46fb412b84e6aa980c6c06fdb50c931c104c591", 0x9c, 0xffff}, {&(0x7f00000012c0)="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", 0xfa, 0x7fffffff}, {&(0x7f00000013c0)="0cacc9621eeb96f1ff6baf3862f96bb3370462e191929c55125a5e886a4be71b3207ad92887c05d17e5e544f160c5e469966ae7be40d3e19e73d822be59f8ca9ca192fa1055c7571f21d7fa979beee520371adbfb709fcbab50d3046f3934adbb4e038b04374cc9d32c6e73f0761eadebe3ee92e5973931174778b862cc43fcf63bafbacaf24c652e45b927a8e2c16ab6d91c5bea394d036ac502f90c49a6b6fdba533a0a5bce20f5664081fe44f4feba13b00c814dd1ee2cfae2a12d0761e3d4f2c456f97a74019acb7513fadc6b01755af4b236dc6f39833783af5293c65ffa3f7f80be7a3b0", 0xe7}, {&(0x7f00000014c0)="9fbeb264528452a34ddd85f0796261b855a3fd4fbfa79b3c43e437421b726b46a8e6ec0644cc4f61527a73f8d4da9479a88059dfb329d13c6fda5b847b06eff9f19119fab6562ae3029260a2a7e7bf2d3523b64e7867ca4fb6bedfa7ac5d7caed04dae90aa602da7f862df4d377a1891526a7b4aa5d88ed43264c31882aaabf33bcbc38ccd719c588b50d8839354ed4cf03cd7493091693a47f35d459f3582e198e0a5b4254f7bea8509466b1b1ed7a20422e73545f2ee7406348447da9220e7fe25d219b3c17eb17ce41f23ef28d17c9aa87712c2f1e33eb79150e63d20bee1ea501f3c881ad1e0790ca35a8cc444dbb462042a81c514310cda6adef2ea912b0ecac39d66badd4ca0d1e70befb6a245b3ad6a129a5a062f157084ab6822650083670aeb7b64f9099ffd132660068f3d4605e355615f890efa020dc4c800e8f4b4246bbce8ea4e2496b553fae24c3b0c83cfd548298e1e0e26d2d1ae2c3dc56c92a3383fd0ee9599f6aa43aa517b488295ddfa77f2c94bc399f8cd8f869a738445896fde2b376a2a2944be22a1ecf6930f6ed2711e55eda12a0aae2dd2a9614c9389a286c4159fa7532e30e07184d50e8b63f9d5552bacf15c7727c61494dcc5f4089494f5fcfbea2ebb41b48ece266ac2b2050bc9f6354b4faeaa0663f789bc5b58e661401b6577502c08db6d6ae4fdb04e0b1ae9383f98335e6836d41bf05b8722f4c9e8245ae468b82b9a6fb685fc9bea6ff73e0c76c05bf636f02ad305f13054e86adaaf382511e51eaebd3898833dd294505b120b3a234bb465660dcc40549cb42e79ce267ca72d7a47b9f13c4df3581b64c8d08dfe7913bcf5d84daddacb353327cc7c316cecacc34a118ef61a0f8ff2f7e66b2ad97d2eec5f1cbcc1f16982e33e44412a9e3e0cf1a16a1b141b059e692208fd73da0484c83a2891e6e724296988c74939f0348bac551492d6966f49d81bed8e64566633d5dd3eed33a65c3af3a43583d3a5533cc55f402d252f2f7053396c84d12d4ef2d4c45f39c16235863ed37d664fc19c28313e5b514479f832a117f3aa56ac6bae71a811ef4c7ddd5602316a6522c4a17ac98354acbdf57d6e573abbd7996119ec00052d8f9e83226e0422b8bdbdf2a47a1a2618fb509f99a867aa5bbeedf0b761cb5ccf7c1a83d45d0f1d6b2cf38446c6a64129abe981a359c636f48e003257120b6d314b1c4b17b7f5821ea51c2ed0601eabac7a9260883548ce82d3ab47dd70572b6d768e79821a7b6d5cdf74cad691554d65acfa08f64cd8449dcd4f24a04bd0b9a1520fc840705a520d56210a8f587faa86639e6ab6fa719317e6575fc3053ad993dafe6939a888a80983275b01a9dd2758876fc88356b1e56d81476c9e20cb4bfab4b16ab99e4f7e71d7affa710d1476b155ccd0d007f85d296b0779cc4b5504e7bc9ed7039bb8662c9351a9db9b8ee22de6fed7e0d72b585d17567e3cc940dd183171b1fd12034d37b7c1c81d5ba18fd353f961352779cd19ee090da14f817d1da1b7abf88009a7c6c1363e1cc03d38c6b37acbd1df78f855aac426e3aefd7a5c1a0670a39723af5a4e7368eb83ac7a23b748b73687ae338e946578240651487eb16bc3b5709f227dbaf8bd2cfc1f156406facc4b176ad680671a98158bf6bb5a32ed4ea4ab7b5212c44af7521b928aaade9f03205cd422229a559b1d4c4d57f8343d69a0ea213d0f4852440b86504b6789f40ef82ca06f13345ca589ee09f9e31a78d84a6695f627981f86798fc236670ed0b60923c1577ce4b1b37f39473c08973cf1f93990bfa6625b3c0579a16a96be520d21dbb6a6f491e9b7dcb178cccf608c5a11d47b61dc30bda9bb0128810b3d61a122504c70d108e410baf21f00c895b52fe874faf63468b0a535d38dddcf621bb0de9a98fd521c6ea1ec8d684e2812305821d411e35d786f66a1ac325227190f84dffad1df87f4b08c55ec88d90ac13a6a253aaa67f14c8709f33e2d6944ce51056b1c1bfbe16babaf1ff858ee917f89ce295b34d50373ec605fbccc1f6743b390a86be16fe113f6a2095e89c4d5c629b7ba16def3c83fc926fc3bf7f9d18a94c69fe8b9a410bb9030b463b2bdc2f60377297399fc4e88fe3336df3b6ea6de226f2523ab33c377bdc0d14948638876d710276375ceae9def410cfee4ce9fa601f3eb6acda7a5fec21f423f52344494278cb6aa83c02a1cedeb61b9d8d1543f280fb1c3b9e9e2249d5bca864d2236bca81a4071cfbd488002551ece68d05595658636e0d224613ce27cf08bd774996d3a1e4b9700c590a3c54a3c7a70953526ea112f4d2c6efab3f7ac2fe18a4a8398cb0c97e248089648bccde7f67b5c2d032370919e07c356fa59285974bc4a0afb7a498575c4e1bd17a9c76f5c301fa20b4a5aaea1538a80c79acf0f5c3628396eb35628cb1a3cbe547be225b6d9ac7b1d7d5f3f694a6d872db7ed2d4d8476ab3d4d4a363f0b365f0879bc2cd37916c4bdc24f8e944a1a64692014be2c9a95a0932cc61ba075bef70e6e0fdc64d3f242287af86cfb86986903380c8d5955dc02dd10a1dd0da8dcf0f743cea5928bbabe39a31fb8561997f487c177d96ab3bcebcc17737647b9e18101ab16eb8cbcb4310673b13e01c94ba2fa34818f650b716791865fc0c79f7886bd78e7f592f56d33ec7b5bf9023ef556795ba2fbb54740f6c181fce5aaae099fb85db2ad58639588e53aed5de35319117a5976c007f643f1e3320be58c943c2b069f8ffce6518bad26ac59e41e7216fe2bb99555d8ab5932d3636c2ec085b102f02e3b7c42ae5d4249f39251f9aaa2306fe1d0ceae8fe36eb688a29ae9d03bba0f37aa2c5ab6c845fc42b966523beca10ab898b484c20a954d8cecaac3694d8d50c97fd08b4c02d95423d531fc1056d1eeb0786e6529a9b96ce0340e4bee4ed7322934488553276797a3af8a96b1b9988027f73257504eb0c1b1cc935253681ff3baf75614d95a9a0d3c3d96217b7d593ec17c6034f0452b08179b15b3d077e9913c40807434ab17698472ca8d6f447749dcba2748c63a025a7831057dc368114464bd5cd3879c7f1ed133c09f94912e3d142739fb7b995231007a5f2ca19c9a13d0774528d74bd9576969ebb7b0f6780d83901ad35bebf9e744f8f0e4e302bac475f610c56de07f1de493ba5b2e8065f99c5e1d068d32f60d558a75990241ebed3dc9c74a0abde791271941a1ac27351438901fe8a5c1c4c046c82e2a34f8044bd128f4e5a46416e0a83a8efe4dea152820d9dc07b386708caa4ba04c39cfab4dd0d62e4712a5c736cc1f9e58b9767c8f205682cdfbff64b4e1daee95cd10c1113d54cbab6e140b73103f60de6cb7d140077924f1aa7aedc7d457de0bdf728cc84e9ee13427326ea50184979b4b3a7a219ec99ad6503689280b627f726a5f3cba17814cb2028574a57a31871e14b7f0d3bc3e27109072689792477b7a811592d95300b4f6afac9fc6e33e7c28784396ce9560dd50993fdd5fb62a308a3037b3f0f579220f418ed774423efa2ed93a7c156671ab580564a20119ca3e6865ce38c3ac4ab6809c151730fbb26dc9b313bb4463fdd0bd8efca0199c0ca6d6ded82dd5a33477717452e771192ae6a0413224bde12700a03ed6387a4cd6fa13af50da44649d1b8b65f5cf631ffc454bee6a3e8c1e9f84be2b805b4fd966086f947386b43a4cb1389641fca76e472d29826f1b7aaaf2d98eb504619760bb03ca2cfa089ac0d70471f383ce119c0654ee62b1603d40bc030adde09f4eda0fd086ea236ca456e74feefdb7ce2dd795f9312b02e064b249d99d00b34625720e83da8734aaaacb1353016a2a80a5d42869f6f7da545456b334a43bdbb5b761f9f14c9f61d4d20f15d411fbb1a962d281b79fcfa8818faa1cc1e94a43e850a548bbbd97eb7ee1d2c34533f484827335da69d2f9930b4deae5453119ee4718ab5adf0f654d278cbca925a80967530a8387c457cc56e6b065bd08d25c6d392b69090fcaa3fbf69ab3f2ec6e80bef31d0d06322993154a76a281a4a9bd5b0325ed9496488cd9577b56e5e98f7b121283691b08b596c988be455a3556f95b0142709c72612286baeda29fd87df2cce40ad1eeb951b5412228749ddfb8f76410795d3d528dbd0dfe31136e0415b0a5176b6d786889fd66b38cfbd9b44bed626caf07c62bc642ed141eb87df548b10b265765d3ecef925875b224ef05fd7b57f255fcb234496884a2a3f237e75bd7a981b63bf8953d861a83729caaeb254884d9b4c451f422ff0b629811f7cec46fbee963812d67d07587be3b1ffad3d5a65d1c15bbb054eae88c6c5e4d9edbf5ddb9b52b5627835752fc1cbdec99f9bfe7e6c70a34b312f48e8046dc2a88cd496033e27c696438e9041f105d0b5f4af2d222c00de74b6f97f7ccd8f6c1580240bfd58cfed85b5d495b481ebb7826a2778b1c2baf900ff1e68ec39e2cf3bccba9a8e1cc1a6d573db39446449c14a23f17532b4631e0cc0268a18f8587c6902844aec7c73075a28841f8fb991cd0982d2f960bf5f0d176e7fcfd831beed9ac114a8cea09dbf735f0ad355d68be11910baa4c13a28712689d18e99af3358a2860f98149698e5b51a097fac9c1e260f642c53b76f75cc50b7e7f61f3beda59ec98e9dd16b1b14abd821f25e07015e2eb94cf77b6e45b710408ee0420328a4e72fc3e002602f03d25a64cc53ce1c312814317d092701624487422b926cf2cd2c1abf4719048998bec53e19c1010f1f8eb72188d498487c42522cfd48300e32151923f775596f5e7511e692a0219c2dc06891b2f06ed3859b76ac39783d4da649ecfacdfde26af365467be3c747404e9fb8e2717e20c35247c21e0af8be0f88e0010bfd54748543713f6967dec0628086a39e5a0b1ecb5c50bea141b5076f001ba27a841a88f5e0bda2b7ec6864260480e020ba68e2c79776a961234f04a0a5de90ffe77311d7476cbba535a0cc367d269e1585d92c2c6cbaddf5ea4f9fad451650cf26a52e265d52e957be61480bab30e37864b4ac6b9777684c40d39fe2993d83346db9e0d492f5ef49a4679d2567954707796f37cffa3726e0fd067e0d4fbfadc1ac05249ac0fb985fb3c3c996bd6bee6f4794a450dea7f0e53ecffa921e9c7afe1d777ac05b52cf5985693be20def527389c936a52a53c3c06f597616661b7fb67d5e4314460dc0fbdbfb440c1745e5db693a6e85b624948f63e83509e8cb745ef5bf95e769a5c652500bfe9ec57d8f2e3e2965430a0a7aaed6356e2c7800aaaf8bb2db0c4112355465d390cee16a432b2c46d571f6efdc0b94264b2351c14b8abec72a99ad0b51e2b59798c5ead9c00622abe63fe4178345be3e09489f8faae8f1f25c2386854efd7593e15cb6c7e94a2fe5f43b3dbbd2b92ff01035a66c559c4705425beee6724ba2276f810ba9f837f597d2520b2cd76de353aaf5d7fda4df2c1ff81d750440969d8914a40ca3dc01891b8ae0fb88e39e7effb16f3586fa8c40b2bfb90cb6d9f34345d148c0c7d972797bbd21e0abe1afab8881d0d92da33275f9f83a8774c880143d65b73e8a4ceccfa45fb568cd5fec8e48ee013832053cf47db3f7447b62ae4064e75498affd0d338df81239cbc2b3aa801a30a3eea186938798b3c81be10d5f07c19bfce0a26daffa965097b7be6edca3114708ce6501191eb1c8e73d5bbfd2eb6689c31aa3bcf8df9a8cd17f196cdb63a711b5fbe5cd6aa72139a11370fb247e9089cf331e04e410cda884453", 0x1000, 0xe084}, {&(0x7f00000024c0)="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", 0x1000, 0x7ff}, {&(0x7f00000000c0), 0x0, 0xfffffffffffffff8}, {&(0x7f0000000200)="a233347e4e1418972b6440f9c0d5102f523a5796711761324105d22c7a6d71bddd3efec38cabd859e40ab5e8b1a8a4290e561a5b7c16324b997f69b06f8c468d", 0x40, 0xfff}], 0x200000, &(0x7f0000003680)={[{@part={'part', 0x3d, 0x7}}, {@session={'session', 0x3d, 0x4}}, {@type={'type', 0x3d, "ec933413"}}, {@uid={'uid', 0x3d, r1}}], [{@measure='measure'}]}) 20:05:45 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4800, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) dup2(r3, r3) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000000c0)) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r4, &(0x7f00000017c0), 0x3a8, 0x0) 20:05:45 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53", 0x39, 0x400}], 0x4801, 0x0) [ 302.136835][T12242] BPF: Invalid name_offset:14 [ 302.151037][T12245] BPF:[1] Invalid name_offset:7 [ 302.212270][T12254] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 302.237825][T12256] BPF:[1] ENUM [ 302.275270][T12256] BPF:size=4 vlen=0 [ 302.277337][T12250] hfs: unable to parse mount options [ 302.319810][T12256] BPF: 20:05:45 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 302.350918][T12256] BPF:Invalid name [ 302.397293][T12256] BPF: [ 302.397293][T12256] 20:05:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 302.428649][T12272] BPF:[1] Invalid name_offset:7 20:05:45 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a}], 0x4801, 0x0) [ 302.486007][T12273] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 302.507701][T12256] BPF:[1] ENUM 20:05:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r3, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01, r3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="c4"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 302.576344][T12256] BPF:size=4 vlen=0 [ 302.577900][T12278] BPF: Invalid name_offset:14 [ 302.594876][T12256] BPF: [ 302.622071][T12256] BPF:Invalid name [ 302.644602][T12256] BPF: [ 302.644602][T12256] 20:05:45 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x480b, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:45 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a}], 0x4801, 0x0) [ 302.669471][T12283] BPF:[1] Invalid name_offset:7 [ 302.717621][T12285] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 302.745371][T12278] BPF: Invalid name_offset:14 20:05:45 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800200005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 302.855291][T12299] BPF:[1] ENUM [ 302.879068][T12299] BPF:size=4 vlen=0 [ 302.908887][T12299] BPF: [ 302.917071][T12301] BPF:[1] Invalid name_offset:7 [ 302.929886][T12299] BPF:Invalid name [ 302.943875][T12299] BPF: [ 302.943875][T12299] [ 302.962830][T12302] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 302.994711][T12299] BPF:[1] ENUM [ 303.022091][T12299] BPF:size=4 vlen=0 [ 303.055240][T12299] BPF: [ 303.081541][T12308] BPF: Invalid name_offset:14 [ 303.093102][T12299] BPF:Invalid name [ 303.184163][T12308] BPF: Invalid name_offset:14 [ 303.193760][T12299] BPF: [ 303.193760][T12299] 20:05:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:46 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a}], 0x4801, 0x0) 20:05:46 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x490b, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:46 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800300005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x12) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000000)) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x15) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01, 0x0, 0x0, 0x0, 0x105}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 303.583302][T12319] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 303.600696][T12320] BPF:[1] ENUM [ 303.607685][T12320] BPF:size=4 vlen=0 [ 303.620992][T12320] BPF: 20:05:46 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 303.630118][T12323] BPF: Invalid name_offset:14 [ 303.630639][T12320] BPF:Invalid name [ 303.642102][T12324] BPF:[1] Invalid name_offset:7 [ 303.662637][T12320] BPF: [ 303.662637][T12320] [ 303.670463][T12323] BPF: Invalid name_offset:14 20:05:46 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800400005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 303.776121][T12320] BPF:[1] ENUM [ 303.779902][T12320] BPF:size=4 vlen=0 20:05:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x38c, r2, 0x400, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x18, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3b}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x11}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x903}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5dc4}]}, @TIPC_NLA_LINK={0x60, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2d2}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb973}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0x6c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x36}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffbf8}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x8c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8511}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xbd8e}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x40, @private2, 0x20}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @empty}}, {0x14, 0x2, @in={0x2, 0x4e23, @remote}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_BEARER={0xbc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5cb5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xdf3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x101}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK={0xe8, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1a05}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x476}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6122}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x38c}, 0x1, 0x0, 0x0, 0x20000881}, 0xc000) 20:05:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 303.847748][T12320] BPF: [ 303.892938][T12320] BPF:Invalid name 20:05:47 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4a0b, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 303.927847][T12320] BPF: [ 303.927847][T12320] [ 303.933253][T12342] BPF:[1] Invalid name_offset:7 [ 303.953437][T12341] BPF: Invalid name_offset:14 [ 304.008789][T12341] BPF: Invalid name_offset:14 20:05:47 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800500005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:47 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 304.062227][T12351] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 304.166193][T12359] BPF:[1] ENUM [ 304.175548][T12359] BPF:size=4 vlen=0 [ 304.198253][T12361] BPF: Invalid name_offset:14 [ 304.203329][T12362] BPF:[1] Invalid name_offset:7 [ 304.208601][T12359] BPF: [ 304.223030][T12359] BPF:Invalid name 20:05:47 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800600005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 304.243692][T12361] BPF: Invalid name_offset:14 [ 304.249112][T12359] BPF: [ 304.249112][T12359] [ 304.276138][T12358] EXT4-fs (loop3): bad geometry: block count 1104 exceeds size of device (1 blocks) [ 304.296457][T12359] BPF:[1] ENUM 20:05:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:47 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4b0b, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 304.325137][T12359] BPF:size=4 vlen=0 [ 304.339585][T12359] BPF: [ 304.346495][T12359] BPF:Invalid name [ 304.357424][T12359] BPF: [ 304.357424][T12359] 20:05:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f0000000000)) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 304.512380][T12384] BPF: Invalid name_offset:14 20:05:47 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 304.537547][T12385] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 304.584784][T12387] BPF:[1] ENUM [ 304.631705][T12387] BPF:size=4 vlen=0 [ 304.668868][T12387] BPF: [ 304.695541][T12387] BPF:Invalid name [ 304.728493][T12387] BPF: [ 304.728493][T12387] [ 304.780536][T12387] BPF:[1] ENUM [ 304.798936][T12387] BPF:size=4 vlen=0 20:05:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000680)='/dev/input/mice\x00', 0x6000) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000006c0), &(0x7f0000000700)=0x4) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 304.834253][T12400] BPF:[1] Invalid name_offset:7 [ 304.845046][T12387] BPF: [ 304.871598][T12387] BPF:Invalid name 20:05:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x12) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000000)) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x15) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01, 0x0, 0x0, 0x0, 0x105}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 304.963307][T12387] BPF: [ 304.963307][T12387] 20:05:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:48 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x12) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000000)) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x15) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01, 0x0, 0x0, 0x0, 0x105}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 305.243046][T12413] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 305.253335][T12384] BPF: Invalid name_offset:14 [ 305.266580][T12414] BPF:[1] ENUM [ 305.286273][T12414] BPF:size=4 vlen=0 20:05:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x1009, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 305.309597][T12414] BPF: [ 305.335908][T12414] BPF:Invalid name [ 305.366017][T12414] BPF: [ 305.366017][T12414] [ 305.421178][T12414] BPF:[1] ENUM [ 305.466656][T12414] BPF:size=4 vlen=0 [ 305.495875][T12414] BPF: [ 305.522708][T12414] BPF:Invalid name [ 305.551562][T12414] BPF: [ 305.551562][T12414] 20:05:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:48 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800700005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r3, r3) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) openat$cgroup_ro(r4, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000200)=0xfffffffffffffeec) setresuid(0x0, r5, 0x0) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x1f, &(0x7f0000ffa000/0x3000)=nil, 0x3) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, r5, r2, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="81"], 0x0, 0x0) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x42, 0x0) write$P9_RSYMLINK(r6, &(0x7f0000000040)={0x14, 0x11, 0x1, {0x0, 0x3, 0x4}}, 0x14) msgctl$IPC_RMID(r0, 0x0) 20:05:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x12) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000000)) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x15) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01, 0x0, 0x0, 0x0, 0x105}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:05:48 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 305.819159][T12438] BPF:[1] ENUM [ 305.828236][T12439] BPF: Invalid name_offset:14 [ 305.850912][T12438] BPF:size=4 vlen=0 [ 305.871644][T12439] BPF: Invalid name_offset:14 [ 305.902061][T12438] BPF: 20:05:49 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="807e00005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 305.938218][T12438] BPF:Invalid name 20:05:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 305.975057][T12438] BPF: [ 305.975057][T12438] [ 306.032371][T12438] BPF:[1] ENUM 20:05:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1d257e4c1846d74414da8d91c5bcd67b7937fc21573d9750517b6f7a44774aad7cf191addcb2821e9f"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:05:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x12) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000000)) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x15) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01, 0x0, 0x0, 0x0, 0x105}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) [ 306.053141][T12438] BPF:size=4 vlen=0 [ 306.093741][T12438] BPF: 20:05:49 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x60ff, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 306.113884][T12438] BPF:Invalid name [ 306.115727][T12458] BPF: Invalid name_offset:14 [ 306.149602][T12438] BPF: [ 306.149602][T12438] 20:05:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 306.352920][T12472] BPF:[1] ENUM [ 306.376550][T12472] BPF:size=4 vlen=0 20:05:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x5, 0x8, 0x10003, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r1 = dup2(r0, r0) connect$netlink(r1, &(0x7f0000000080)=@unspec, 0xc) recvfrom$netrom(r1, &(0x7f00000000c0)=""/200, 0xc8, 0x2, 0x0, 0x0) r2 = msgget$private(0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) prlimit64(r4, 0xf, &(0x7f0000000240)={0x3, 0x7}, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$SIOCRSSL2CALL(r1, 0x89e2, &(0x7f0000000380)=@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}) r6 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-monitor\x00', 0x14002, 0x0) ioctl$FS_IOC_GETVERSION(r6, 0x80087601, &(0x7f0000000340)) msgsnd(r2, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r3, @ANYRES32=r5, @ANYRESOCT=r1], 0x0, 0x0) msgctl$IPC_RMID(r2, 0x0) [ 306.404930][T12472] BPF: [ 306.421537][T12472] BPF:Invalid name [ 306.447703][T12472] BPF: [ 306.447703][T12472] [ 306.493431][T12472] BPF:[1] ENUM [ 306.515289][T12472] BPF:size=4 vlen=0 [ 306.541226][T12472] BPF: [ 306.557584][T12472] BPF:Invalid name [ 306.583927][T12472] BPF: [ 306.583927][T12472] 20:05:49 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6800, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) umount2(&(0x7f0000000000)='./file0\x00', 0x1) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 306.822030][T12487] BPF:[1] ENUM [ 306.873145][T12487] BPF:size=4 vlen=0 [ 306.909203][T12487] BPF: [ 306.932348][T12487] BPF:Invalid name [ 306.946440][T12458] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 306.962322][T12498] BPF: Invalid name_offset:14 [ 306.979816][T12487] BPF: 20:05:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 306.979816][T12487] 20:05:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x12) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000000)) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x15) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01, 0x0, 0x0, 0x0, 0x105}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}) [ 307.076166][T12487] BPF:[1] ENUM [ 307.080338][T12487] BPF:size=4 vlen=0 [ 307.104401][T12487] BPF: [ 307.118437][T12487] BPF:Invalid name [ 307.136040][T12487] BPF: [ 307.136040][T12487] 20:05:50 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800003005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="19250d3136ac316e8442e8c67cd2f856fea7732ec10c015cfac54904313d544de822da723c1480273656fee0a56b58bea5b52b8bdb17523b3daf9b392504b8f9d470cb89bd61481acee41dec4f2aeaa5ddfa9114831eafb8f03ee74be9f7bd426059b079e347e3ad23b74988072576691b0c02a563a3e3db9dcdc49a7dc63feec1c862bd6b15a8591cf74937d2d6e0c96c7a5c054434334bc6f0d9083528167216bb0bb2e67c41ff7db7e2a957a0ded8fa5dc33dc64fe9944654ef3c43e105d6426941a40c6ea85c4682e6f90dc60f5b44275360bf6fffc3224d1a45d575c7ad"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:05:50 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000000)) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 307.345262][T12517] BPF:[1] ENUM [ 307.365038][T12517] BPF:size=4 vlen=0 [ 307.403755][T12517] BPF: [ 307.444868][T12517] BPF:Invalid name [ 307.458238][T12524] BPF: Invalid name_offset:14 [ 307.492695][T12517] BPF: [ 307.492695][T12517] 20:05:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01, 0x0, 0x0, r1}, 0x0, 0x0, 0xdf21}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r3, r3) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) ioctl$SOUND_MIXER_INFO(r4, 0x805c4d65, &(0x7f00000000c0)) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) dup2(r2, r2) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000000)={0x4, 0x1, 0x3, 0x6, 0xff}, 0xc) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x2040, 0x0) sendto$rose(r5, &(0x7f0000000300)="8e7c3ab0a1c7648c8fe1954cf0b1dbe892e0dbd9c45f6b3ae9028e8da10b5353cef00f576b98bd7f9dec5c41bb5eb4250b04538bc06a95704745b55d53e2442788878157184ac8c0fdd7956cefb4672ca5a7122ddf4184113f5b058635b9dc105ebaf08c6e4a61400918792c0d034ef31d863cd6bd4f564d76f85ef605c84e6300fc618f11b96ed178e7f5c63b23554c9b5479748ac1e285d6993eb4db4b4dae49e42f2fffdf9bec7accc8d7cc41552a96810179e4d962318f264297fbc1799a343cb2732d7a0ea3e1d41641db58953d7943646d7d1b17", 0xd7, 0x8080, &(0x7f0000000400)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x2, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x40) accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x800) 20:05:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="44000000100001040000", @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000000)) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) 20:05:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f00000024c0)=[{&(0x7f0000000140)="e3db96b9935d2c531c97688f2cac0369ed4f4e0289", 0x15}, {&(0x7f0000000180)="ab76f0a7350b83469d58b1d6e20314cd985ba638f4159cd6f46309c9c31edee4179ab6109d785e19cf7f5a26739e432006e4efbba51ef54c3a233d8cfa176b90822346ddd778218c1646ecc9d79bed20547a23dd0f4815f958550f40613113a21d56d00fc33206e64ba17407e7f680a2de520c824dae4f261b6cb31a657165b7bc60271a69a575ec5c17176858", 0x8d}, {&(0x7f00000002c0)="b77c4a37b027f9b1c38c3be343e664f87098f1b12658a4347d996a775d6dba8f8792796f5b189ae74fedd77b372cbd31190f41e6ac3dfaa7ffcc5b3d7c040bfabdce77fd0a29ae59179770914e638bad1ee739bb82fefd2b6faff859769af412786f2c001d06fac30132602df7a40171d1e6c5fc80732fde326cf002f78f13750b54d81fe20bb53f703f037fb045f8d4842dadd95bea5ddac4052cdab32f3407971c3bbcc7fb3ffd205cee9dd3517cd37f69fad4e628820b39a7bb7f028ced5a97164a7ed5dd51f46d975ec57eaa69a39db69433d83702", 0xd7}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="b101b2a430ce158a3be5a3682a493396a33ba31da822c6ee7dec26471cac4865439bafe1bf68c0302969506ed4e29125f1cdbdc0d2761ff8c61818bdebef891cc97e92f5ed9fa2ab8794ea33816d02a46ba481bab953667a3b62bb71969a95c1ee79dad80c8a9b1c42eb237190f7f330ef198ebbe8009de2bf19f3960201127d93ef0a72b310b46458a3e9f960a19a935badad34edbe6f253f92b9be9a45530eb65562446990ad981234efd3f319f70aff086c9f16eac96277a9599d1404e53fb8532ffa14", 0xc5}, {&(0x7f00000014c0)="8ed54c27062f2fae2d055d2e9dd19a7d63bc6ffe5166a16d976d4432c05764673b38419caa6365cdbfb68c813ad3d553fe95cbaed36c728c2152399d61e45bd18b76a448eb9d5860e7405f2a517c42bc08978ad5e723b693b40b99596fbaccba1039180042aea5cf0b45cc0a71bfcc099bc98bf1db88537bb60eded205d0f5a6c3882eec14ca2b0390a1572b1fb11dbf51d5e6ae72c8d0a76b975e3a3644ed84dd8ba2846e223f9d82da9754f2ee1cd731175c36f7a3a90c58b85e049c4e8d45b0fc5ee5a55a73f2669b9c301ca05c722e050f73ad64f5ce0841ef8ace50f619434ecd37310cd3f6c02b5a9e995faa97b529b94e24e523566a7a4165cc0168b68f8177f695d98f3ba996e687b0ad5045553d76390ccc8783718414fa405cf6a41fa3454aa4ada95acac93c64ada5b4ed78d42c5d403e26a75f01851fef0d4c671f4d8c9b12848d25f2be0cb3c5a85a5a019e92902559caa78758575419e67ac91613ae52624b25dd7f8d95ef8abfe1d00eab3d716f99bb822aa0f494d4f801e9c3df811fcde637bc6d510ddbacd754a7b13aea27daeb90dc05424687fa343b58a4f43e10f8a55f73e20fb4065cfd326b7004d3be30b787833831bc57bdb21f46408285301889c89ada1578317abc46545ec8b949d52f763d70f9908acfbf4ce306183890e0b008617389fca9dd34ca327bfebf64d2c7cec2709a036629357bec82d89b4a451715126ff9352a656ae328cf831879f8a756232ab30999986411a8e83e36d6daa660e2311fb801b9b0813637d961e08ff7bc60af2d0ea6f45a3ec72168a72077374925b0cba09c0ab870c41178eba09ff7c4457822b821dcad4de82f4ec599bf5408f8ace586f526b364de86861100b803b8bc4ac3bf5546ef261d095048e7d5d4667b39b6222f67aa4c007f8e8e548c3f73580fa6ef6ec007a9e01e5583d5c4324c781d646d98043cf144f02ec92534ae39147e7c6823c128b743a48805156cd58692c9043b2e168abcba10cc7461b86c047fa9b8e87d026f620adc8db4cd14003207dfc725b03bed7e9db9ecc7ab59b05774f8d2c332edcbb9a8be1d822d861264509d07eff655450cad03de0f93edee246ecacdfdd278f2b094242d68bed36b9abdbec7e3263af4d640aef8b2e43bd075682420a98752b0cac484051093ed63ee7c8c09cca8059ff1f3f0dab6cb069b8db3a0f2306d9d726eff45886f80792f326ddc5ea968ce2df3a226a688d26646d8797cc0e0c7511d588481ccd0b6ae625d838687276dfbfadc9ef136ae8926fb7cc57cbed6113db4126b4e0b2aa0d9196465171b5ab5171a62aa7eb1e5a82e8fdad4d075b9877f7e0507579f812b70598bb9a1136bf3e2a2f9c6efe1fa74ae2858b033be98102618737f9991eb4148f02971d1b694955456171345c6b48fb9a5dd384a254f1fe476462292f7fdbf50b8243a83acd9202f203629ac91dcb2e40d959d815a5eada8748c4d2f890f281cb589fe8443ff788fbf460e5cde773ded4aa90bb74f51b3e587d7dc59e68993954331e8f120ca86bb1de245c34369e35abb265e179070f6dd818b73cc8c25fbe31badfdadd61c96d7819b3e835d026728d0525d21e6f742cce0d6dce15d7c6279c629099934c29978d3538f5de3ad60ae6ac30db0952d1cc739c1fd06985625c16f212d911c5be1caad7823e439acc9989e5fdd87d03c3762640391f9444ba5fd378786b9576ae03ae45c8c8e69a03a2f2815d67c6169b1e209bf021637c9d04915a3916755ed00ba7218f30e27e67880bb483818c025549dfd363568c89b79c2061dfb9cb7be535bd6ba37515b1c316e8acca3b7ecd09a49e764dab2b1a748886ba05fa2bd887537652e9c1aa4ebc894213433b76dc001e8f1c9239b11ac8c3e1f5188d3dcff8ca0642490c82091e243ecb82abbb552b85175c6a0634571eff5bf0bc3660786c63cea2e8f52dc1f12ea088a78cbaaa994888715c06ceb1bd6d3c28e1125050c3236a32084d49442b833ee2e4e2a42bc15494297d7946e769ac39ce750177c3d32bbb92db2d8bd645cc14f23c11fc28af95439adbeac53b926f8cb0b3b3b31390b6556072a388117b1ecd6b00447991fbbfd9268de585e1f4e9c8dab9b5da4ce64acbea8b138c4c1efcbc5da1f503e672ab4ccde67ff38c8bf91e5205f5373753c6effa8b5e64e71ca089cdaed71563e3dd261de12d6d2868c8afa436eb723dfb33c42ae54bcad265570e01cd31d3bceaf8dabe5c82d06e533b8bd9306e94b021558ff040ee950a166311c589bae22fbe403e686b688c5e0e29b68273bd694d682d8889e733240f756fc8b5c8d1dc4b42f3ac8385e1862043bc774060ebbca233853cf96729ee42909217cce456077b8f2b90e7f796b5e27d7fc65d7206ef5c978332c885a1bfd51d056eafbfee187721ab4462dfa3efdb848786e4cd0983b58617aef77301caebbe2f74b282d22337406eb3b32e987b4e4907716e04a390a32978e5021c6c105beceb9609a5c308ac0969e6ebcae4a8fea825fedf26c3cab2031d82df0c2a0ab02605df1c2a83090aad8a17191a2fa31f46f0190229345db3679212eed6c7b770db5b59fd0c0cf20d5c2bdfc45c48c867d6f6a147184290b3b8821a69ef4f0137e66ee01f6acc60f9f9f138f356dd785c9636c4e18f4536c7657bbbe1dd812a4f64e6c680bdf27a72e206a3d635124d98980c29ceaff4ba539eb9569645202042a995cfca7be7b7ccc0b291df332844a7067297305a22260035957de9e489afd416bc4b48f92d6c1ad1bedf9cceca08dec478f62ad6105674dae04e2d680d65e0fa35003e7177b41d0e1e990afe41c38858fa5855c4e322f65aaa90cc0077dc96d177ea6640a8cf51f7cd92628b63438a0826aa0b0b1d86ebd7c4fcc20956caeecabd183af122ec6a4746a85eb9c165ad1fb2b692dfeda699b102ea89bc92311e3e145b2946a2c6497330c8a0d46ca9bc6a942613b2e649e85818165ae7e894d7649354533c1c39035f055000d9d2cb8d3104b0e614a1f3b4b0e9fbb441cbb4950d2ff463c894a92aa48b999d0f4ab99318148b0d6c202075b6b62189120fe4b2ff960df70083a1954c7967b329158e837e357f002910a7e91240a2e2cdc8225b1a284810fb3c41e44073fdd95260d7ae0dcd3ebef6627ad4386a38c6cff2c98e4e9d2ecefcb25ba9788773c40efe2db99d7175711a3e29e7924b17f034ec94541a60c73cbbdc5eb211fb828862c65a4a1697d56c7d3ff566d52a8628143b38609f66c659f92394b8871c37dc65f9225f6641a1e54474e86281f64e2b6074bd23cc84654974f314e6f874b6092237e08a15bf725fcce745ffc26842e50ce4b89697f0addbd6cb9253423ef3d14f80d74cfd63628b16f6de3c20d1e45c3ad492f1931010db791daca14ec7f315e3e4eb0b9516322da8165800ccc77a7064b6bb84ee6211970a6e2d7ca1868a8dd1da67cba990ed264991376a2766d356f22a5d64e25e44d9cc9a0aa1ea4b3409c04624c891df09c7562203b7500c55db6a7cb04c94d44deca170d55cdadc307dd91d8b518a685bdeb3b705fa52cf2db8e43f30c74f6d4be158d1faeaaa342a4b187993aad6a191115ed1dc94478fd57702029a60f651d0ce99d94ad715a4c754e22d1a0cd995819c7a4f987fa8c5499fd9dbda2c847670235cf891f6812b014c7d33fd061e14ea3a2c97e97f918930c680fedeb2020015c3089c394dcd54dace48507ec0bd31fbb8f96db76a184f010d380a6fa20a159e53ae03612582c930ae1da081b2a449b2e0b91fa76da43951bfb814f3191fe04f88c07e6fdb4185684edd1e6316291475d47d44468584b7d1627676a1cc5f0df4193272a4967f7767ad29cdb79e799344597bb05ebb8bd60f85c584eb21f88642d26c0f5ca832f9995526240fc8611fd1ba1cd1f68c130c65527dcdc07af7886f5c62554c5263ba7246de72b2af0cbe6d750200bb0d2b5d26e8134ad4adc31eb28c5da0b62d08456927e7e9b0983e2510c72104ad83314e6b8757abab589a08548e4ec5f911071c99588df78577ae09e79a5176e03431991b362901880766d55196068b5a0b6b1401a38cdb38e549d77c82f30df30e68538cff0980c10e27739be4dc8e163e86402b77066a59d5f3abfad2d89675e31bc0f4a112cac44e47099327d3de069fd26a3273f798af18c882401c60067e2243846a753395a4fb16d6f04ca00f9798c4889910e35db3af2fc1891b1010aed57853c3a281ccbf4aae8a7ebd6728619d838efbe37aa08070482aa3eaf8b410196fad6a0e1bd1a8fe2a72b6dc184a4e98029d8a372cd5997a1bd4aea8fda9cf73c9470174712be7a50d41982a1f0ca2a5486f56e73e3803668cdcd618be516816296e20d3949836456c8c11c247f661786f61bc4494d30d25c0e5d7184554c04bd024c57d87beced4d4f9fb407c4c518a685bd433bfbcbc5eb907e6b067e31f919b308b13b6174c3f372a96066c4dd508b32fb86f1c238d9a93b9100634750dcf03cfeff542d096de5c63df57db6a8cf70e1d0d61d51fd0d2632143cfcfbd4d98191320c372c65aa118ee5548b8a9443b871e52a2d5a256623d028fe9aa5779bfe7c595c11b52ffbdc4ce25371e7136219eb8f1e143137f5394617b37dd0e8605c6e54ea3f87db9905097b37459588f51aed7fc371c7ef7d212a04734106ecfd35fe3fff0addea1f8781ffde11ba2303eeb30f43b3238ba514841ab03ea6dc82e8b47e51c6c196a0bfccfaf32181af99b0fc2c346f7a45097654e363e943e827484c4c43a12655df4be2042497d91b73406527ba3f04a6dcb93426efd4137598cd79f43f78e946a7f7d6b9434512e0027e7046872fd76bf7a6447e1c71b19c106572eb7001ac77c1792f8476edc2d8604eb9d186decd85834d8340e20cebb9ebe90295326636d2747b7b4b74a4b19b8b8bc2ab6ad9ebbaba47885715846bbb7bc8f041d6c2396b07dd5d8f75c77c085f000033c9c3b6538e369bf90fdcd846451f2835a14ac0761b66d37894f05e3ae68600969364ca786822290b4238ac78ad2e6095d2fccc17a1ea902fce733b7f7845be8f4d34e618dd1b9f12b1e01ca77b882aed38607e18368ebb70f022c4c0b5bad772b5fbcfc89b226a0aa97f62824694869c0df28a0928b0a2c1a5e78d2c695020efbf10fbbdf79d96cc94fe33d05708b17c6eccfd7ef6b1d2b7c7df9e3dc91ec3e76722f920ae75c43744295b934398607d80d0b23bc2c06760a39cd7c92207813734be317fd3d0d7a008cc3ac795629a10aa02cbbad3d2ec3747a7d2046071a646d02e31fcbd05fae652f3d5abb53f9473e7cc4daeae2cf1e9bed962bb46aec3763298fb1214436f5df3bd1759f89cfeff88f7cc243855739077c684a7b726efff53f248ce9c4e7a0f7590c538bc77b90ccdbfc9748af6077e96cccdf0301e148bc22d21323b72128fca73ebd77df59f1ba10364e1f429fdf38499f37fc166184801699774527ca56eeec10b251d230ec2b23dd768cea59ea1503f08589c3413490ed5e1072b53b51503abd38a61678f20fa9cfb1a45799c75de4f2236be0a17f52f9258a2927acb82f66ebb20257e9d14ae29b999df7a70b858c6d8f54440c594edfa16bbb217a3cb4ae684fe116e53c4d95b1310cbb5d5fb37e1e7ae07fb8a5550aea8a77407f9db0b5b1c6ad2da66e6bfba74d9f394be3e2c65d4d82925851ba3be384554f3ab0e5a6f767321b9993377df10bc8c43c7e64bb69578a7b16e85de567c", 0x1000}], 0x6, &(0x7f0000002540)=[@ip_ttl={{0x14, 0x0, 0x2, 0x80000001}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xff}}, @ip_retopts={{0xc4, 0x0, 0x7, {[@timestamp={0x44, 0x20, 0xc4, 0x0, 0x2, [0x4, 0x1ff, 0xffe00, 0x7, 0xfffffffe, 0xfffffffd, 0x7f]}, @lsrr={0x83, 0xb, 0x50, [@loopback, @empty]}, @timestamp_prespec={0x44, 0x14, 0xc3, 0x3, 0x2, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8001}, {@rand_addr=0x64010100, 0x8}]}, @lsrr={0x83, 0x1b, 0x80, [@local, @dev={0xac, 0x14, 0x14, 0x23}, @multicast2, @local, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x24, 0x61, 0x0, 0x2, [0xfffffa55, 0xfffff979, 0x10000000, 0x9, 0xff, 0x4, 0x3ff, 0x8000]}, @ssrr={0x89, 0x7, 0x76, [@multicast2]}, @timestamp_addr={0x44, 0x2c, 0x6f, 0x1, 0x9, [{@local, 0x6}, {@loopback, 0x1}, {@broadcast}, {@empty, 0x2}, {@multicast1, 0x5}]}]}}}], 0xf8}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r0, r0) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000000)) r3 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r3, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r3, 0x0) [ 307.855685][T12540] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 308.012104][T12524] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 308.112503][T12522] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 308.120659][T12517] BPF:[1] ENUM [ 308.124371][T12517] BPF:size=4 vlen=0 [ 308.128554][T12517] BPF: [ 308.131326][T12517] BPF:Invalid name [ 308.135369][T12517] BPF: [ 308.135369][T12517] [ 308.145590][T12524] BPF: Invalid name_offset:14 20:05:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) socket$l2tp(0x2, 0x2, 0x73) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:05:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="44000000100001040000", @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:51 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800005005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 308.338979][T12560] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:51 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7400, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 308.517185][T12569] BPF: Invalid name_offset:14 20:05:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="44000000100001040000", @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 308.575341][T12569] BPF: Invalid name_offset:14 20:05:51 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800006005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$HIDIOCSFEATURE(r2, 0xc0404806, &(0x7f00000000c0)="4fb1d39c63f9dbe91a76879beb8e3d54dc50eba1a2aab2d0c59df090e8568ff23e889a16c26c909f61045b8ad7a4568a4782d35138fdce5b7b3dc34be1cd5eb7521982c0ae2a04800649b13b1236af92e44aac2dc5630355450f5b4ad061d40f755e901f5975b5d6e675dbb4ba34c4dbcef74c50c0014754edba7cd5d77a09c1db2f1fef6b002e20831ef588ba14718b5b47321677f1fe5ed92b9a8921ea4f0b5f39faa659dc36") msgsnd(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:05:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000000)) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) [ 308.716340][T12578] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 308.734963][T12577] BPF: Invalid name_offset:14 [ 308.781303][T12577] BPF: Invalid name_offset:14 20:05:51 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800007005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 308.961153][T12595] BPF:[1] ENUM [ 308.971580][T12596] BPF: Invalid name_offset:14 [ 308.984277][T12595] BPF:size=4 vlen=0 [ 309.005292][T12595] BPF: [ 309.010118][T12596] BPF: Invalid name_offset:14 20:05:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400000000000000", @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 309.044995][T12595] BPF:Invalid name [ 309.055381][T12595] BPF: [ 309.055381][T12595] [ 309.075569][T12595] BPF:[1] ENUM [ 309.079146][T12595] BPF:size=4 vlen=0 [ 309.082948][T12595] BPF: [ 309.124762][T12595] BPF:Invalid name [ 309.128516][T12595] BPF: [ 309.128516][T12595] 20:05:52 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="80007e005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 309.169022][T12606] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:52 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7900, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 309.306209][T12610] BPF: Invalid name_offset:14 [ 309.423442][T12615] BPF:[1] ENUM [ 309.450657][T12615] BPF:size=4 vlen=0 20:05:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400000000000000", @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 309.473392][T12615] BPF: [ 309.492580][T12615] BPF:Invalid name [ 309.516704][T12615] BPF: [ 309.516704][T12615] [ 309.560206][T12615] BPF:[1] ENUM [ 309.582575][T12615] BPF:size=4 vlen=0 [ 309.588174][T12621] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 309.607196][T12615] BPF: [ 309.627480][T12615] BPF:Invalid name [ 309.656677][T12615] BPF: [ 309.656677][T12615] 20:05:52 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7a00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000000)) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) 20:05:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400000000000000", @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x9, &(0x7f0000000400)={&(0x7f0000000000)={0x3c, r3, 0x536ae464467e3e0b, 0x0, 0x0, {0x5}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r4, &(0x7f0000000800)={0x0, 0x9, &(0x7f0000000400)={&(0x7f0000000000)={0x3c, r5, 0x536ae464467e3e0b, 0x0, 0x0, {0x5}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x3c, r5, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x4}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000080}, 0x44000) [ 309.878771][T12610] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 309.929162][T12631] BPF:[1] ENUM [ 309.932739][T12631] BPF:size=4 vlen=0 [ 309.976978][T12631] BPF: [ 309.991093][T12631] BPF:Invalid name [ 310.000395][T12635] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 310.027246][T12631] BPF: [ 310.027246][T12631] [ 310.080115][T12631] BPF:[1] ENUM [ 310.098739][T12640] BPF: Invalid name_offset:14 [ 310.118364][T12631] BPF:size=4 vlen=0 [ 310.136532][T12631] BPF: [ 310.149891][T12631] BPF:Invalid name [ 310.204215][T12631] BPF: [ 310.204215][T12631] 20:05:53 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7e00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:53 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800002005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/18, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 310.367226][T12657] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 310.382478][T12658] BPF:[1] ENUM [ 310.393201][T12658] BPF:size=4 vlen=0 [ 310.411972][T12661] BPF: Invalid name_offset:14 20:05:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="5133c7151a79d45428e8be76b14f29a48a2cf8ca1460750b956ecfe6a71ef8fa909eb0cf19edcbc00fd40326360c87dfe54370ba3206e9c87606f887855576b76537d466a473b68ce1b81958e635634aa411b03d9a8d2466cb47b57e13006f9b1c142ef14283ae3db38395c777e1"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 310.417474][T12658] BPF: [ 310.433183][T12658] BPF:Invalid name [ 310.452187][T12658] BPF: [ 310.452187][T12658] [ 310.456343][T12661] BPF: Invalid name_offset:14 20:05:53 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800003005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 310.566550][T12658] BPF:[1] ENUM [ 310.585793][T12658] BPF:size=4 vlen=0 20:05:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/18, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 310.614169][T12658] BPF: [ 310.633881][T12658] BPF:Invalid name 20:05:53 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb900, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 310.662677][T12658] BPF: [ 310.662677][T12658] [ 310.720437][T12678] BPF: Invalid name_offset:14 [ 310.755444][T12678] BPF: Invalid name_offset:14 [ 310.789845][T12680] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 310.811167][T12685] BPF:[1] ENUM 20:05:53 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000000)) dup2(r1, r2) tkill(r0, 0x15) [ 310.830878][T12685] BPF:size=4 vlen=0 [ 310.854826][T12685] BPF: [ 310.884127][T12685] BPF:Invalid name 20:05:54 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800004005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 310.930136][T12685] BPF: [ 310.930136][T12685] [ 310.975388][T12685] BPF:[1] ENUM 20:05:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x46}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, r1}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) r4 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0xfc77a74365e850e8) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYBLOB="2808007f00", @ANYRES16=r5, @ANYBLOB="6ffe000000000000000004000000140001800d0001007564703a73797a3100000000"], 0x28}}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0xf8, r5, 0x300, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x666722bf}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x23d4}]}, @TIPC_NLA_NODE={0xa8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x4c, 0x4, {'gcm(aes)\x00', 0x24, "928c4284e8888aca17867d297ef9b5fe6917f7783f70c876d8068fac2cc49f7e4d6ca1d7"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ID={0x40, 0x3, "77476ee6c51fd7446a778d23d66fbfea032264f1d2c6bcf7a1f339ad2a8cf1a0d00ca9d8b1539038fbf2fef481ebc77ec5b73e2ccffd6510f101d4c9"}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x41}, 0x4000) [ 311.043108][T12685] BPF:size=4 vlen=0 20:05:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/18, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 311.072469][T12685] BPF: [ 311.093497][T12685] BPF:Invalid name [ 311.122793][T12685] BPF: [ 311.122793][T12685] 20:05:54 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xda00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 311.157244][T12700] BPF: Invalid name_offset:14 [ 311.200765][T12700] BPF: Invalid name_offset:14 20:05:54 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800005005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 311.285316][T12708] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 311.303190][T12709] BPF:[1] ENUM [ 311.327135][T12709] BPF:size=4 vlen=0 [ 311.348353][T12709] BPF: [ 311.373320][T12709] BPF:Invalid name 20:05:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="a4caf3fb6e9a885ecf501eaefc74406e16077378884ad7ba3efe1cb7c971263602fe68e77cb29a9e6ab7da7d1e6b922b754e6af7b7e43394c2210faec8a09d70ebc0aa307c9b494a237089461b2633ee41"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x11, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) r1 = socket$inet6(0xa, 0x80003, 0x6b) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_CARRIER={0x5}]}, 0x28}}, 0x0) r5 = socket$inet6(0xa, 0x80003, 0x6b) r6 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r6, &(0x7f0000000240)={0x11, 0x0, r7}, 0x14) getsockname$packet(r6, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_CARRIER={0x5}]}, 0x28}}, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000e80)=[{{&(0x7f00000000c0)=@ll={0x11, 0xea, r4, 0x1, 0x4, 0x6, @random="7efa68432b55"}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)="260e06619aece40d9235c97305a1d768fa560cf8542a9b93d50a0c56d0d783348b88206aff735c3cce9cab3bb2ca684345326587c2156bbc7743fe0a82a16cb7f07118850d97b960169eaca60997ab706f47c39f3ecfaad07972d1adf555443d4538cc1df3822e431fc2bc18f23aa14a51a2f98da3a4eba8b00dd1980c6e662ed9d708078106580a31a336e4513ee0a0278b102781ad5f53cbea6c6e517ffd8a27080b", 0xa3}, {&(0x7f0000000200)="141cbb12680e8a7b0c55856994501ed5904bbc2f4f6d5d2d", 0x18}, {&(0x7f00000002c0)="f815b475312a2ab56a126d559ceae840ecfbadd2c156f06eaf3bf6c7bca4de389b9e4480e92ced29e60974b91825b580026ccc738046cd9d1711ab045e6531e7cd97ad6a4a8f73d36bed8a27dc6c80a5ccfdef0e52e031fb355966da960f64c8170e93acac697f4b359283ad9f6e89f7a061d1a9937f0cb4ca2d2cf1878a4623676ea83fae1ead9cdfb68bf18c728ee7edbe3bb10db9a7db172b50a1b47b158a266b436f4ab46afc96b379db76eaa3b3e04f8a4c13d7a94f7d3a87651ec752cf4e3088a0a983294ae387a8af35178a403785972108d1a2a59c7538366b", 0xdd}], 0x3, &(0x7f00000003c0)=[@mark={{0x14, 0x1, 0x24, 0xffff0001}}, @txtime={{0x18, 0x1, 0x3d, 0x6e}}, @mark={{0x14, 0x1, 0x24, 0x81}}, @timestamping={{0x14, 0x1, 0x25, 0x80000001}}, @timestamping={{0x14, 0x1, 0x25, 0x8000}}, @mark={{0x14, 0x1, 0x24, 0x7}}], 0x90}}, {{&(0x7f0000000480)=@xdp={0x2c, 0x2, r8, 0xf}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="a01055584fd4fb4b13fc1b948f23fe4ce4a0078875b6d6110dd38fc0c4e2a12ad2a467378298459925b1c02d797bceaac13920b4317475fa4e5a5fab4240391110e585039554cb653433f103a26ea652d0d8da8ace4435ca7c9a5ad4c9c77df4697b4f2e1c5fbd3b9d020558f2223a0c8e64150070b8d2e21beb9b183aca6251eb6f715679404ad168af139c40f0b17653b546ceb043e0ca188d9f1142aff6bbc609db6d0ed4edd0ab960dc8103061351f579b98bcb7d26f0b0168488cb8dbbde516bb569ea59eba21608de575369ac8f9336c35abbe1abad3cf470f8f47f53a44d667c3", 0xe4}, {&(0x7f0000000600)="bbfb4c9869ffe85376269a8a0ceff568f6192c353f8c44414b3f6d3964b31d017f39f6750456272f6eb4c918b975906559e44fe3a25e0644b1c866f42d16934a4a78b82442ccae40a2e45f88a7ef5f15acee1cf609999ba0ce58a74fdac0ede62d99bdc7dc499c4059b6def31304bfe1b3926b04235f090f0a3e90ebeebb7f3a6965dd913db32a8cd421ed174794ee23277dff372c3ec3fa6a5763b5a7869193c26061c0443ed3c0c11ee07acdfe5119f7ac83eca66c3929138b2f3f1c7ead9eb49ce8ae4db5bf4f78a318aa8366c1378ad022f9d7ab19e5bb52137b6e483ce65859", 0xe2}, {&(0x7f0000000700)="7e00d73709814806ea7a7d78d952d078e22433cbfa8f2a7e7eb0b56bf79d907ce325645e807d16e1b1d9d94d47d052a037ad34b78c0a7cd548bb8c6a3861d258798bc6f41703f9e66cbfac3af0a84022e04bf7d9a91b9e28ad9ecc7cc60a4bea60359890cb0ab5a1ae84e15f4a519f39baf3f8f682fb4b", 0x77}, {&(0x7f0000000780)="1ba9e3986e3bbcc495c7a3f5dbb3e283957a8dc22733c5a080e06a0c3743e8ff0bf4afae0093475e55f4ab461960a59290483cf49e561f54555f7988249adfda8849d93d2cb0a70c6ebca47718e71bfb8be21cc00c028578e5d0a7a3e30f22c9b74d2b9e878f15138cfaec65b90e61b3771b4ff6bd7815", 0x77}, {&(0x7f0000000800)="f3f346c6e323fdd58dd57aecf9e62574206814ec271b1e0243f5665c41e152c3a77ad8c146344be528ecef1069939b8681405ddbc25f7acef996aed32bd9e02b685ceb24b69ea985e3549862d099e2530e28a2398c1a2a976ba0a95e105549ab0ad25a988c0a79ce9b7d8db5597a14f10c15504ae6c8589f4c0e19da31556fdc6633cda8c99040ddace2ba9e220d691f900d073a73c66d35d519d8fb80fe10d434dc598fd1e402ce7102c67d5af40f35a983c5acd34d59f044", 0xb9}], 0x5, &(0x7f0000000940)=[@mark={{0x14, 0x1, 0x24, 0x26}}, @mark={{0x14, 0x1, 0x24, 0xbf}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @mark={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}], 0x90}}, {{&(0x7f0000000a00)=@sco={0x1f, @fixed={[], 0x12}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a80)="b7e7cf037d4ab82fc2e798241dca8bd754748d9b1ddcf9e03470a3a107d4a60b3adab5074b7ad5c502b9b0f4517dd8d50f9a7ebbdd7f64043aa42f02a370a32147d713602cf86915925b4a92a626b5c05ddb88601416b7a7e463927b51834312e052e6ee2979a7dd2c447bb65535678a96ea76737284e58d17285ee88d532d52d94412098353216cf670da8c450e803794cffa9c34503cdd8afc", 0x9a}, {&(0x7f0000000b40)="f05a7d147e82a2dd87adfe83f24c56c5f6290ce34ff60030a596a871528747f227d72dc2c54e7e1ef377b125a7c952cdb85048ab734b9fca20fb8f7db193321cdb28104222b4d54e275aa09af15dfd5579350a808d8b159e6a10d40c048ae10f7dbc3ea7355b6a7cb6e7c61761f71fa63ca8e6de9fe7dbf72cf9b9c30a45ee18c911a438f9071de45ad1973653c4f901815ccba519b53d5025b80176a9c61eb0f5f4f0bc2a95099dfa407006bf1c15d34a148631", 0xb4}, {&(0x7f0000000c00)="ad5797f0a4a76ed68d928c6ecebf8f007c630d7420f9964634457689d8c375e3c4b74f22c9252aa12a759d7b76be069476b67a4ce95909b0ab34ce061420795eefab3f107d5f037513c64fdd12562f756b2de7eab0b5d5dfc11c4d46a2cb1d2b28c0dc4560538c2faad31fcb46706a21989c46400682a7d0f3fdf931c64ed0c84cba7105667f21dd43dacda192923ba43e162e146aae07030f830ef5b90bb2f4b3fa0a153ebcffc71ce6873c45f453f84b7384e8cf8d039bb6435a15cd78195e39edb9ae447256065550bf", 0xcb}, {&(0x7f0000000d00)="ec40cc3bc04a185d96550b736985d42ce8e425e4bb07013ab3bb33c0838cdf9f0e3cb5b6f500c7c2f1a0e413e947c8912dbe2f3ddedcc7a585eeb182e5cb6e006d1e16668759d73dcc8ca1186ae0e35c5aacdc754341e4c39a9e1bda51b0648dcac05e997c51db791a7b1e024bad15f47ae414dabab4f1195bad214f5516dd2780a55758c0d26cc7f2aa9cc987adb99bb7438c22d4cb4e43312763042f2d9888ba47a5cf9e088adc09e165125eb5b6bce4", 0xb1}], 0x4, &(0x7f0000000e00)=[@txtime={{0x18, 0x1, 0x3d, 0x164}}, @timestamping={{0x14, 0x1, 0x25, 0x200}}, @mark={{0x14, 0x1, 0x24, 0x3d}}], 0x48}}], 0x3, 0x20000844) [ 311.403118][T12709] BPF: [ 311.403118][T12709] [ 311.405134][T12717] BPF: Invalid name_offset:14 [ 311.432104][T12709] BPF:[1] ENUM 20:05:54 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800006005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 311.463699][T12709] BPF:size=4 vlen=0 [ 311.520621][T12709] BPF: [ 311.544580][T12709] BPF:Invalid name 20:05:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/19, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 311.575206][T12709] BPF: [ 311.575206][T12709] 20:05:54 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xff00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 311.666273][T12728] BPF: Invalid name_offset:14 [ 311.702357][T12728] BPF: Invalid name_offset:14 [ 311.720215][T12734] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 311.754395][T12735] BPF:[1] ENUM [ 311.771021][T12735] BPF:size=4 vlen=0 [ 311.797517][T12735] BPF: [ 311.815173][T12735] BPF:Invalid name 20:05:54 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800007005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 311.838701][T12735] BPF: [ 311.838701][T12735] 20:05:55 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x2) fcntl$setsig(0xffffffffffffffff, 0xa, 0x19) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) r3 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r5}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r4, 0xa, 0x12) prlimit64(r3, 0xe, &(0x7f0000000280)={0x100000000000009, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r6, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}, 0x0, 0x0, 0x4}) msgsnd(r6, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0) msgctl$IPC_RMID(r6, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000)='NLBL_CIPSOv4\x00') [ 311.909240][T12735] BPF:[1] ENUM [ 311.949016][T12735] BPF:size=4 vlen=0 [ 311.988135][T12735] BPF: [ 312.007786][T12735] BPF:Invalid name [ 312.021673][T12748] BPF: Invalid name_offset:14 [ 312.029911][T12735] BPF: [ 312.029911][T12735] [ 312.069850][T12748] BPF: Invalid name_offset:14 20:05:57 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x37c68, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000000)) dup2(r1, r2) tkill(r0, 0x15) 20:05:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/19, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:05:57 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="80007e005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:05:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 314.005832][T12762] BPF: Invalid name_offset:14 [ 314.031254][T12765] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 314.043510][T12762] BPF: Invalid name_offset:14 [ 314.049016][T12766] BPF:[1] ENUM [ 314.064429][T12766] BPF:size=4 vlen=0 20:05:57 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000035004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 314.089246][T12766] BPF: [ 314.119935][T12766] BPF:Invalid name [ 314.148150][T12766] BPF: [ 314.148150][T12766] [ 314.210105][T12766] BPF:[1] ENUM 20:05:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x800, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000002c0)="70f0f4e84428d7792413681661d006f807272a52d98357990a0e0199ac7ce4610551c7563e671eaf90f7fb7875e00e71aebdd232dd093733562c1c3942099a40b4b1806d5ef94e207e978d7f62e49a7f9b1299b29c4a3a1593d8f2feb13e85495753d51ee7a0db3298329372a692a6d27b53be625cea3ae6b916f9b0b23b01876d0c4d898bffaaec3d72f83ae1f38ae505b6751d6d8b7f9d683b7d2784aecfa5584e33f4d13fb0c32147d78a8e1b329ac82c3dfca3e608a7ac6ba4338b9d703c218e8aebbe22d4e280f8d3dd0dbd185515aa2e5331d4d6350653e3fc9ac0fc4f3818beb3c54a30e00022aae9b9d39fec4f84bf", 0xf3) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r3, 0x1, 0x0, 0x0, {{}, {}, {0x8, 0x11, 0x2}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="10002abd7000ffdbdf25010000000000000009410000004c0018000000036962000000000000000000000000000000020000000000000000000081ba6d79ac80e2a900"/98], 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x4800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x508f553, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) preadv(r5, &(0x7f00000005c0)=[{&(0x7f00000003c0)=""/103, 0x67}, {&(0x7f0000000440)=""/232, 0xe8}, {&(0x7f0000000540)=""/41, 0x29}], 0x3, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f0000000040)={0x980000, 0x200, 0xfffffc01, r6, 0x0, &(0x7f0000000000)={0x980902, 0x80000000, [], @value64=0x7}}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r7, 0x84, 0x15, &(0x7f00000000c0)={0x3}, 0x1) [ 314.246603][T12766] BPF:size=4 vlen=0 [ 314.264045][T12766] BPF: 20:05:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/19, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 314.286871][T12782] BPF: Invalid name_offset:14 [ 314.304334][T12766] BPF:Invalid name [ 314.308476][T12766] BPF: [ 314.308476][T12766] 20:05:57 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x37c90, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 314.338774][T12782] BPF: Invalid name_offset:14 [ 314.386271][T12785] tipc: Started in network mode 20:05:57 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000055004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 314.417778][T12785] tipc: Own node identity 2, cluster identity 4711 [ 314.456278][T12785] tipc: 32-bit node address hash set to 2 [ 314.500644][T12795] BPF:[1] ENUM [ 314.508785][T12790] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 314.518593][T12795] BPF:size=4 vlen=0 [ 314.567854][T12795] BPF: [ 314.578707][T12795] BPF:Invalid name [ 314.604659][T12795] BPF: [ 314.604659][T12795] 20:05:57 executing program 1: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000000c0)={0x1, 0xffff, 0x2, 0x6, 0x8000, 0x7c0}) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) write$P9_RWALK(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="710000006f010008000404000000fcffffffffffffff0000000000070000000000000000010000000000000000000000400100000008000000000000008002000000000000000000000001020000000100000000000000000000000000000004040000000100"/113], 0x71) r3 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r5}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r4, 0xa, 0x12) dup2(r4, r5) fcntl$setown(r4, 0x8, r3) tkill(r3, 0x15) r6 = syz_open_procfs(r3, &(0x7f0000000080)='sessionid\x00') preadv(r6, &(0x7f00000017c0), 0x3a8, 0x0) [ 314.638185][T12795] BPF:[1] ENUM [ 314.654438][T12806] BPF: Invalid name_offset:14 [ 314.674404][T12795] BPF:size=4 vlen=0 [ 314.703389][T12795] BPF: [ 314.711783][T12806] BPF: Invalid name_offset:14 [ 314.730316][T12795] BPF:Invalid name [ 314.753648][T12795] BPF: [ 314.753648][T12795] 20:05:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x8001, 0x3, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x73}, 0x0) openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x2, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) r1 = syz_usb_connect$printer(0x6, 0x36, &(0x7f0000000f40)=ANY=[@ANYBLOB="12010000090000082505a8a40700000000010902240001010000000904000012070103000905010200ffe00000090582021a"], 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io(r1, 0x0, &(0x7f0000000740)={0x84, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_ep_write(r1, 0x5, 0x42, &(0x7f0000000140)="1a15fa77c330c9ac2ae85d21e046925919e269c1c93aa86aa0bdaa26b543bab5b09968e1280a27e5a65c2483afb785d82e0c8ad32bb510292f6fafde67cd50e07d13") msgctl$IPC_RMID(r0, 0x0) 20:05:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getsockname$netlink(r1, &(0x7f0000000000), &(0x7f0000000040)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) 20:06:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000000)) dup2(r1, r2) tkill(r0, 0x15) 20:06:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r3}}}}}}]}, 0x48}}, 0x0) 20:06:00 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000065004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:00 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x37cac, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) clone(0x82004000, &(0x7f00000000c0)="ebfc00c0bd8e0a0f1d5d45f860cabdc4c2827121862204bf491d0437eb99e2f76e455d6b558fef393b065d6bd18c534730bf1453bc0169580827e3754821a73674629d957a7dc24cd3be665cfa4668932a6738c0ad54480deb4582776980106320baf3197c25b89e715e392598634445625c7aa382d99c09bac83faa49612f4a63722e27603d1dd3a22194e98d01574363c2d47f454e0960be4e67459ff6dfc7f4964a14f2520a923d06eea33e9e3b385185f826b5e96fe8", &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000180)="2ce5fd5f6a0b0494928e6e3c9a051b381f9dbdfcaad8af008220c8307f7a21fb68e6bd14ce2f3afd983b0698f581438366dbf7c59e8d80653e6c4a20dc7f5d45187d11edcfc97cc7af09a6a7c7a2058e0a41b9a67dab418fde64362014db3079f7b8a997473fc5d2b1021f7d562f4988779e883a38d5a78020a4ae437cce4e0ac1669c2ddd47020a151e27bbc51a1077c0f7ac3a9cd8416361dc9cf43f39ce5f101ccdbf52ecdb29ac51f8920cd8d277aba44e7989a8d07f02e31bc596c1d9fcf1635ec2fdafc33c84a01ae291a7a0fe28e15a582c43216cb846301370e16fb5688e62") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 20:06:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x11, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r3, 0x4, 0xc1}, 0xc) [ 317.057985][T12841] BPF: Invalid name_offset:14 [ 317.064295][T12842] BPF:[1] ENUM [ 317.068340][T12845] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 317.080508][T12842] BPF:size=4 vlen=0 [ 317.091834][T12841] BPF: Invalid name_offset:14 20:06:00 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000075004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 317.107707][T12842] BPF: [ 317.126608][T12842] BPF:Invalid name [ 317.141811][T12842] BPF: [ 317.141811][T12842] [ 317.163033][T12842] BPF:[1] ENUM [ 317.178673][T12842] BPF:size=4 vlen=0 [ 317.193958][T12842] BPF: [ 317.204018][T12842] BPF:Invalid name [ 317.218031][T12842] BPF: [ 317.218031][T12842] 20:06:00 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x37cd0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r3}}}}}}]}, 0x48}}, 0x0) [ 317.323522][T12860] BPF: Invalid name_offset:14 [ 317.377663][T12860] BPF: Invalid name_offset:14 [ 317.433095][T12867] BPF:[1] ENUM 20:06:00 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="8000007e5004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 317.462991][T12867] BPF:size=4 vlen=0 [ 317.490039][T12871] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 317.495438][T12867] BPF: [ 317.508186][T12867] BPF:Invalid name [ 317.543209][T12867] BPF: [ 317.543209][T12867] 20:06:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r3 = dup2(r2, r2) connect$netlink(0xffffffffffffffff, &(0x7f0000000080)=@unspec, 0xfffffffffffffe8e) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r6 = dup2(r5, r5) connect$netlink(r6, &(0x7f0000000080)=@unspec, 0xc) ioctl$KVM_SET_PIT(r6, 0x8048ae66, &(0x7f0000000200)={[{0x7f, 0x20, 0xc1, 0x5, 0x0, 0x9f, 0x40, 0x7, 0x7, 0x80, 0xff, 0x80, 0xffffffff}, {0x50, 0x9, 0x5, 0x0, 0x6, 0x5, 0x0, 0x1f, 0x20, 0x58, 0x81, 0x4, 0x1f}, {0x9, 0x583, 0xfd, 0x8, 0x5, 0x7, 0x5, 0x80, 0x3, 0xb0, 0x9, 0x80, 0x91}], 0x6}) tkill(0x0, 0x15) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/time_for_children\x00') fcntl$addseals(r4, 0x409, 0xa) recvmsg$qrtr(r3, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/149, 0x95}, {&(0x7f0000000040)=""/50, 0x32}, {&(0x7f0000000180)=""/13, 0xd}], 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="6800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000061340d1ad8b3532600000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000418b81803ea43570876ce5aa945e"], 0x2f0, 0x101}, 0x38, 0x2) [ 317.582037][T12867] BPF:[1] ENUM [ 317.608305][T12867] BPF:size=4 vlen=0 [ 317.612971][T12878] BPF: Invalid name_offset:14 [ 317.632270][T12867] BPF: 20:06:00 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x400000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 317.655369][T12867] BPF:Invalid name [ 317.662063][T12878] BPF: Invalid name_offset:14 [ 317.692806][T12867] BPF: [ 317.692806][T12867] [ 317.852393][T12888] BPF:[1] ENUM [ 317.872818][T12888] BPF:size=4 vlen=0 [ 317.899191][T12888] BPF: [ 317.916966][T12888] BPF:Invalid name [ 317.940059][T12888] BPF: [ 317.940059][T12888] [ 317.983124][T12888] BPF:[1] ENUM [ 318.021224][T12888] BPF:size=4 vlen=0 [ 318.042579][T12888] BPF: [ 318.068615][T12888] BPF:Invalid name [ 318.091845][T12888] BPF: [ 318.091845][T12888] 20:06:03 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000000)) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:03 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000025004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r3}}}}}}]}, 0x48}}, 0x0) 20:06:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x400) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000040)) msgctl$IPC_RMID(r0, 0x0) 20:06:03 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x53e000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:03 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x68) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x15) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x1541, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40522, 0x2, 0x0, 0x0, 0x6}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r4, &(0x7f00000017c0), 0x3a8, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x220400, 0x0) r6 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9eec004688", @ANYRES16=r6, @ANYBLOB="000426bd7000fbdbdf25050000002f00070073797374656d5f753a6f626a6563745f723a7379736c6f67645f696e697472635f657865635f743a73300000080005000a01010108000500ffffffff14000200fe8000000000000000000000000000301400020000000000000000000000ffff0a01010214000200fe88000000000000000000000000010108000500e000000214000300fe80000000000000000000000000000d"], 0xac}, 0x1, 0x0, 0x0, 0x20004000}, 0x80) sendmsg$NLBL_UNLABEL_C_STATICLIST(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="000325bd70b6038ec100fcdbdf250500000005000100000000000500010001000000080004007f000001180004000000000014000200fe800000000000000000bf39000000aa642c2af674e1db15aa98617606beb1131134de02649e858f815495a98a52daca8f6a552fd05bae98c9e3c46688c75c7814f22d6cb22db3dde744c0acd6"], 0x48}, 0x1, 0x0, 0x0, 0x20000011}, 0x20040000) [ 320.305777][T12908] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 320.322318][T12910] BPF: Invalid name_offset:14 [ 320.332038][T12912] BPF:[1] ENUM [ 320.347035][T12912] BPF:size=4 vlen=0 20:06:03 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000035004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 320.354656][T12910] BPF: Invalid name_offset:14 [ 320.372546][T12912] BPF: [ 320.384140][T12912] BPF:Invalid name [ 320.406543][T12912] BPF: [ 320.406543][T12912] [ 320.438314][T12912] BPF:[1] ENUM [ 320.455624][T12912] BPF:size=4 vlen=0 20:06:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) [ 320.482357][T12912] BPF: [ 320.512698][T12912] BPF:Invalid name [ 320.516316][T12931] BPF: Invalid name_offset:14 [ 320.539000][T12912] BPF: [ 320.539000][T12912] [ 320.561081][T12931] BPF: Invalid name_offset:14 20:06:03 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x607400, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 20:06:03 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000045004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r1 = dup2(r0, r0) connect$netlink(r1, &(0x7f0000000080)=@unspec, 0xc) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r2, 0xc0385720, &(0x7f00000000c0)={0x1}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000000)={{0xa, 0x7}, {0x3, 0x2}, 0x1000, 0x3, 0xfe}) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r3, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) r4 = msgget$private(0x0, 0x0) msgsnd(r4, &(0x7f0000000040)={0x3}, 0x8, 0x0) r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000040)={0x3}, 0x8, 0x0) r6 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r6, 0x0) [ 320.690841][T12942] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 320.714056][T12944] BPF:[1] ENUM [ 320.740772][T12944] BPF:size=4 vlen=0 [ 320.742396][T12947] BPF: Invalid name_offset:14 [ 320.777599][T12944] BPF: [ 320.782198][T12947] BPF: Invalid name_offset:14 [ 320.801446][T12944] BPF:Invalid name [ 320.831001][T12944] BPF: [ 320.831001][T12944] [ 320.870650][T12944] BPF:[1] ENUM [ 320.905678][T12944] BPF:size=4 vlen=0 [ 320.938696][T12944] BPF: [ 320.954878][T12944] BPF:Invalid name [ 320.975979][T12944] BPF: [ 320.975979][T12944] 20:06:06 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000000)) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:06 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000055004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f0000000040)={0x43d, 0x9, 0xffffff7c, 0x3ff, 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x50840}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) preadv(r2, &(0x7f00000002c0), 0x0, 0x7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r3, r3) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000100)={0x3, [0x0, 0x1000, 0x4]}, 0xa) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) r6 = pidfd_getfd(r4, r5, 0x0) write$P9_RSETATTR(r6, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) 20:06:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) 20:06:06 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x73d000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0xc9}, 0x0) r3 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="dd"], 0x0, 0x0) msgctl$IPC_RMID(r3, 0x0) [ 323.436069][T12978] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 323.447833][T12980] BPF: Invalid name_offset:14 [ 323.455215][T12983] BPF:[1] ENUM [ 323.466713][T12983] BPF:size=4 vlen=0 [ 323.477432][T12980] BPF: Invalid name_offset:14 [ 323.495420][T12983] BPF: 20:06:06 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000065004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 323.515815][T12983] BPF:Invalid name [ 323.553723][T12983] BPF: [ 323.553723][T12983] [ 323.593472][T12983] BPF:[1] ENUM 20:06:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f0000000180)={0x9d0000, 0xffff, 0x10001, r3, 0x0, &(0x7f0000000100)={0x9b0952, 0x2, [], @p_u16=&(0x7f00000000c0)=0x800}}) ioctl$TIOCSCTTY(r5, 0x540e, 0x5) fcntl$setsig(r2, 0xa, 0x12) pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="b4dc5c2411c5d1c53cf46df7a8b144eb49a000216c62f548ba143cd46b1ca3dd72d64e1d", 0x24, 0x2000) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0xe) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r6, &(0x7f00000017c0), 0x3a8, 0x0) 20:06:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) [ 323.618709][T12983] BPF:size=4 vlen=0 [ 323.659697][T12983] BPF: [ 323.664442][T13000] BPF: Invalid name_offset:14 [ 323.676823][T12983] BPF:Invalid name 20:06:06 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x746000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:06 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000075004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 323.711181][T12983] BPF: [ 323.711181][T12983] [ 323.715729][T13000] BPF: Invalid name_offset:14 20:06:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01, 0x0, r2, 0x0, 0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x3}) msgsnd(r0, &(0x7f0000001480)=ANY=[@ANYBLOB="514c10050c597546b19815281dd1b5ca1c0e7f4407ee1f90af431b569c147d8062bd4c089f07f88dc9dcdc7dfa4b5bb2e3e23068a860d45c8a10373ad3af71216d278afe5e8bb19c2184afc9a8aadfcb71a437ddc852064a72d2b69e5920ea8394736877c3698137deeeb34ddbc5fb72dabccd2e5350e9ea69532cab9710aff77c480ca2837d646afac24b70a87e4e91de04009aa213bc0c480d4f86b5366c3cb5e22965525022a921814430f7579d5238aafae3f9"], 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x11, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) shutdown(0xffffffffffffffff, 0x1) r4 = semget$private(0x0, 0x4000000009, 0x0) semop(r4, &(0x7f0000000380)=[{}, {}, {0x1, 0x4}, {}], 0x180) semctl$SEM_STAT_ANY(r4, 0x4, 0x14, &(0x7f0000000040)=""/16) pwritev(r3, &(0x7f0000001400)=[{&(0x7f0000000140)="9fbde3ea57f094223220945fcd1adf892d9dd983d1525cb11cac77c59d9483cb393c01e272c8450233d34291fe9243683cc025afa8dc36c5c44b1b82e7ee3b8cc419a5f8c7079838b22478be0ac827a698c9fef59fc63371c54ba2f9c23277d9c3830b26bf0ec4d1a8cf179fd1ba1d8ee340f1397023d822ceff187d9e9ab776ede6345e1ec45703403d36561c815d5bfadac3f7219971ce7da87faca1a941106012fce05f80374762a5763890896c8e96cd20f4a144e6768e6d7d7d9540ea78dfe558819aaa0c207d3fd5e5aa02cd8b23cb3600af4caf8b7c981295f599a9b1f6cfffb35c2e462f82d68b8f062ff91ae6f48e3fa54a9e2d94", 0xf9}, {}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="ccd87d36f6eb26c2ee09287d3f3f9081055faaabb9a201ae6d7a005b44fafb2e50575a831ff602e905acb5b1f6973664f2ff468c6520c14eb5d1f35c55adf27c084fd4a7b3d82fbacb7c1bd98010d4730a61225bd1b515d107b42193f7f804f93016e70277b06572f686deea47b0e5bb85e7f6865e3c2c10f28df3e490b59b19", 0x80}, {&(0x7f0000001340)="72044571912c48846c7b27012286e65cb03c6fc3ca0118e11e9aff03f3aff3beadb6a79b49fdb79adca639bcbbcfa7c8493792e97b4676427b238c0c8762cde5c5f6588ffd99d7a8d0b3142ff5e2b58a5e1a1c6077b34b37dffa5f4b27067160b2cdd835617217266b41439cf6931a5526d5b94c818ffa00fd581c8da14eb96f7dd301c27c61c3d2b1432ecfb3d2d14be361ae8786be7c2a6e6af8cf94dc7477", 0xa0}], 0x5, 0x6) msgctl$IPC_RMID(r0, 0x0) [ 323.799146][T13009] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 323.882402][T13015] BPF:[1] ENUM [ 323.886768][T13018] BPF: Invalid name_offset:14 [ 323.910572][T13015] BPF:size=4 vlen=0 [ 323.932286][T13018] BPF: Invalid name_offset:14 [ 323.957323][T13015] BPF: [ 323.976284][T13015] BPF:Invalid name [ 324.002044][T13015] BPF: [ 324.002044][T13015] [ 324.037828][T13015] BPF:[1] ENUM [ 324.051705][T13015] BPF:size=4 vlen=0 [ 324.072486][T13015] BPF: [ 324.090491][T13015] BPF:Invalid name [ 324.107524][T13015] BPF: [ 324.107524][T13015] 20:06:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000000)) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') 20:06:09 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="8000007e5004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 20:06:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:06:09 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x790000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 326.607528][T13044] BPF:[1] ENUM [ 326.611265][T13044] BPF:size=4 vlen=0 [ 326.618992][T13044] BPF: [ 326.625282][T13044] BPF:Invalid name [ 326.635339][T13044] BPF: [ 326.635339][T13044] [ 326.642340][T13047] BPF: Invalid name_offset:14 20:06:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') recvfrom$netrom(r1, &(0x7f00000000c0)=""/4096, 0x1000, 0x8000, &(0x7f0000000000)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 326.653795][T13049] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 326.659156][T13047] BPF: Invalid name_offset:14 [ 326.671634][T13044] BPF:[1] ENUM [ 326.721346][T13044] BPF:size=4 vlen=0 20:06:09 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005002000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 326.751386][T13044] BPF: [ 326.802538][T13044] BPF:Invalid name 20:06:09 executing program 4: sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() ppoll(&(0x7f0000001080)=[{}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, r0) tkill(r0, 0x15) waitid(0x1, r0, 0x0, 0x2, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000000)=0xfffff001) msgsnd(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r2, 0x0) [ 326.833770][T13044] BPF: [ 326.833770][T13044] 20:06:10 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb90000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 326.921823][T13068] BPF: Invalid name_offset:14 20:06:10 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005003000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 326.969153][T13068] BPF: Invalid name_offset:14 [ 327.054435][T13076] BPF:[1] ENUM [ 327.080505][T13076] BPF:size=4 vlen=0 [ 327.093819][T13078] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 327.099041][T13076] BPF: [ 327.131947][T13076] BPF:Invalid name [ 327.150845][T13076] BPF: [ 327.150845][T13076] [ 327.182667][T13082] BPF: Invalid name_offset:14 [ 327.187785][T13076] BPF:[1] ENUM [ 327.207677][T13076] BPF:size=4 vlen=0 [ 327.231738][T13076] BPF: [ 327.232207][T13082] BPF: Invalid name_offset:14 [ 327.250818][T13076] BPF:Invalid name [ 327.278408][T13076] BPF: [ 327.278408][T13076] 20:06:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 20:06:12 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005005000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 20:06:12 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xd07300, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 329.804244][T13102] BPF:[1] ENUM [ 329.810991][T13107] BPF: Invalid name_offset:14 [ 329.845306][T13102] BPF:size=4 vlen=0 [ 329.860317][T13108] BPF: Invalid name_offset:14 [ 329.869659][T13102] BPF: [ 329.883016][T13102] BPF:Invalid name [ 329.891462][T13109] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 329.899453][T13102] BPF: [ 329.899453][T13102] 20:06:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 329.972415][T13102] BPF:[1] ENUM 20:06:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x900, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)="e7379366817804b155b016e0c82c559e440560833554b52c9191de4b30e910498142bf1f88caaf411a8ffdd38be289adcd7905788e454a65931a87ba129efed319b4237b1cac8587f0e1e83791f909ccec3c288969a7c808e4a6df119fe9a8bfb83fe3d008b11884a9e8826abb5152c10f82a4dc887eee5650cd40aaeea5944a0f4ce39a", 0x84) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) alarm(0xfff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x7, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x11, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) r4 = accept4(r3, &(0x7f0000000180)=@sco={0x1f, @fixed}, &(0x7f0000000040)=0x80, 0x80000) sendmsg$nl_generic(r4, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="180000001e00000228bd7000fedbdf250000000004001b8031c5524bd59fa523ef708ef0d532714422eeb36953e204b0aac9b8a4215fa32a233abd05d29c4f60be0d077afc4444fc712c3c9546a7a8b3c5fc1d5e06cb"], 0x18}, 0x1, 0x0, 0x0, 0x10}, 0x4000041) [ 330.003578][T13102] BPF:size=4 vlen=0 20:06:13 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005006000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 20:06:13 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xe05300, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 330.033570][T13102] BPF: [ 330.036719][T13102] BPF:Invalid name [ 330.069135][T13102] BPF: [ 330.069135][T13102] 20:06:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 330.192329][T13133] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 330.217126][T13134] BPF: Invalid name_offset:14 20:06:13 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005007000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x8000, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x4, 0x80, 0x5, 0x0, 0x1, 0x7, 0x0, 0x1, 0x9, 0x81, 0x6, 0x2b, 0x7f, 0x3f}, 0xe) r1 = semget$private(0x0, 0x4000000009, 0x0) semop(r1, &(0x7f0000000380)=[{}, {}, {0x1, 0x4}, {}], 0x180) semtimedop(r1, &(0x7f0000000240)=[{0x1, 0x1}, {0x3, 0x602, 0x800}], 0x2, &(0x7f00000002c0)={0x77359400}) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="af"], 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x40080, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000140)={@private0={0xfc, 0x0, [], 0x1}, 0x0, 0x2, 0x2, 0x0, 0xffff, 0x997}, &(0x7f0000000180)=0x20) msgctl$IPC_RMID(0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r3, r3) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) getpeername$l2tp6(r4, &(0x7f00000001c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x20) [ 330.240743][T13134] BPF: Invalid name_offset:14 [ 330.257573][T13137] BPF:[1] ENUM [ 330.277916][T13137] BPF:size=4 vlen=0 20:06:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) [ 330.301809][T13137] BPF: [ 330.319560][T13137] BPF:Invalid name [ 330.344191][T13137] BPF: [ 330.344191][T13137] [ 330.382761][T13137] BPF:[1] ENUM 20:06:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 330.403621][T13137] BPF:size=4 vlen=0 20:06:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 330.441824][T13137] BPF: [ 330.449840][T13151] BPF: Invalid name_offset:14 [ 330.477621][T13137] BPF:Invalid name 20:06:13 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfeffff, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 330.497424][T13137] BPF: [ 330.497424][T13137] [ 330.536462][T13155] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 330.642916][T13162] BPF:[1] ENUM [ 330.657168][T13162] BPF:size=4 vlen=0 [ 330.677732][T13162] BPF: [ 330.698005][T13162] BPF:Invalid name 20:06:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) [ 330.744564][T13162] BPF: [ 330.744564][T13162] [ 330.811290][T13162] BPF:[1] ENUM [ 330.832701][T13162] BPF:size=4 vlen=0 [ 330.854242][T13162] BPF: [ 330.870748][T13162] BPF:Invalid name [ 330.890633][T13162] BPF: [ 330.890633][T13162] [ 330.902614][T13170] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 20:06:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x7, &(0x7f0000000000)=0x200, 0x4) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x11, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000140)={'wg2\x00', &(0x7f0000000040)=@ethtool_test={0x1a, 0x2, 0x97, 0x3, [0x71, 0x1, 0x7]}}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0xfffffffe, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r2, &(0x7f00000017c0), 0x0, 0x3) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x10000, 0x0) 20:06:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="51d79b0adce356ac2b31a5065cfd29c5bb0977cab7b81f156e6c5b4912f22fb7a53d454ded2e80814109ed58fb6c4d0572cddde04d"], 0x0, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x5, 0x1}) msgctl$IPC_RMID(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) 20:06:14 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 331.087179][T13180] BPF:[1] ENUM [ 331.115314][T13180] BPF:size=4 vlen=0 [ 331.139606][T13180] BPF: [ 331.161734][T13151] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 331.179884][T13180] BPF:Invalid name [ 331.202162][T13189] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 331.220254][T13180] BPF: [ 331.220254][T13180] [ 331.244605][T13192] BPF: Invalid name_offset:14 [ 331.257661][T13180] BPF:[1] ENUM [ 331.261517][T13180] BPF:size=4 vlen=0 [ 331.282710][T13180] BPF: [ 331.298564][T13180] BPF:Invalid name [ 331.322257][T13180] BPF: [ 331.322257][T13180] 20:06:14 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="80000000500a000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="9707a12c84c36b93edcea03e66d30c5483acf850049af547fd691339eacab474ed7e39d9693674facd27632b3e09f0f8e11f3a0931dbebea8d70efd6b1f6e98634839e995ceb847b9274b690f9fc2af3ab89b014d86397a4410037f1f9c95750dbcaa2cd0ce5983fbcc46db4d2ab7671974f0abb6c0e7cb53dfed6f62b9c9d734d92"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={r5, @in={{0x2, 0x4e23, @remote}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000000c0)={r6, 0x10, &(0x7f0000000040)=[@in={0x2, 0x4e23, @remote}]}, &(0x7f0000000200)=0x10) 20:06:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:06:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:14 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 331.470440][T13203] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 331.520849][T13208] BPF:[1] ENUM 20:06:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xca) msgctl$IPC_RMID(r0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f00000000c0)) [ 331.544121][T13208] BPF:size=4 vlen=0 [ 331.545431][T13212] BPF: Invalid name_offset:14 [ 331.561560][T13208] BPF: [ 331.576159][T13208] BPF:Invalid name [ 331.587705][T13212] BPF: Invalid name_offset:14 [ 331.594858][T13208] BPF: [ 331.594858][T13208] 20:06:14 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004020019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 331.630627][T13208] BPF:[1] ENUM [ 331.655538][T13208] BPF:size=4 vlen=0 [ 331.695607][T13208] BPF: [ 331.714168][T13208] BPF:Invalid name [ 331.733304][T13208] BPF: [ 331.733304][T13208] [ 331.745215][T13225] BPF: Invalid name_offset:14 [ 331.784904][T13225] BPF: Invalid name_offset:14 20:06:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@md5={0x1, "03396f2af400161207660b30fafb68b7"}, 0x11, 0x2) r1 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r1}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) 20:06:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:06:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:15 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:15 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x15) sched_getaffinity(r1, 0x8, &(0x7f0000000000)) msgsnd(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0e84174cf206f3950ed145d8139197371e1391d70c411357d250038dc29456e4ee1ca3294ae3ed69e33d571efb6cf01dfa76be9d3e9ed3038c7bbe2345871cedf5303bd42841e42b8e6c1b0421b5862f4a38d426a95fe8802927dee5dbbf9369dd79eb397c1ca48aa2290db1559076df75dd5262bc33cd2ad81282cd03f2381433d9d3eab64b2b179dc5fbf50000000000000000"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:06:15 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004030019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 332.169644][T13239] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 332.184640][T13244] BPF: Invalid name_offset:14 [ 332.193778][T13238] BPF:[1] ENUM [ 332.197556][T13238] BPF:size=4 vlen=0 [ 332.219375][T13238] BPF: [ 332.222692][T13238] BPF:Invalid name [ 332.232720][T13244] BPF: Invalid name_offset:14 20:06:15 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004040019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 332.320524][T13238] BPF: [ 332.320524][T13238] 20:06:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:06:15 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x2}, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x301, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x15) write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) r4 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r4, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="f3"], 0x0, 0x0) msgctl$IPC_RMID(r4, 0x0) 20:06:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x7a9642, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000000c0)=""/61) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa1990, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GET_LEASE(r1, 0xc01064c8, &(0x7f0000000140)={0x5, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0]}) fsopen(&(0x7f0000000000)='ceph\x00', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r3 = dup2(r2, r2) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) mount(&(0x7f00000001c0)=@sg0='/dev/sg0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='ntfs\x00', 0x11000, &(0x7f0000000280)='ceph\x00') setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000180)=0x80000000, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r4, &(0x7f00000017c0), 0x3a8, 0x0) [ 332.499625][T13261] BPF: Invalid name_offset:14 20:06:15 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004050019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 332.536127][T13261] BPF: Invalid name_offset:14 [ 332.552956][T13269] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 332.671085][T13285] BPF: Invalid name_offset:14 20:06:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) 20:06:15 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004060019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 332.704620][T13285] BPF: Invalid name_offset:14 20:06:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, &(0x7f0000000040)=0x1, 0x4) creat(&(0x7f0000000000)='./file0\x00', 0xaa) [ 332.850438][T13294] BPF: Invalid name_offset:14 [ 332.866194][T13296] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 332.885253][T13294] BPF: Invalid name_offset:14 [ 332.928952][T13253] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 332.939079][T13238] BPF:[1] ENUM [ 332.942796][T13238] BPF:size=4 vlen=0 [ 332.961730][T13238] BPF: [ 332.983911][T13238] BPF:Invalid name [ 333.011818][T13238] BPF: [ 333.011818][T13238] 20:06:16 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:16 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004070019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 333.206319][T13315] BPF: Invalid name_offset:14 20:06:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000002880)='/dev/input/mice\x00', 0x101000) bind$qrtr(r1, &(0x7f00000028c0)={0x2a, 0x4, 0xfffffffe}, 0xc) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) [ 333.249459][T13315] BPF: Invalid name_offset:14 [ 333.261869][T13321] BPF:[1] ENUM [ 333.307638][T13321] BPF:size=4 vlen=0 [ 333.325386][T13321] BPF: [ 333.334110][T13323] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 333.350287][T13321] BPF:Invalid name [ 333.370315][T13321] BPF: [ 333.370315][T13321] [ 333.411869][T13321] BPF:[1] ENUM [ 333.437143][T13321] BPF:size=4 vlen=0 [ 333.499605][T13321] BPF: [ 333.515027][T13321] BPF:Invalid name [ 333.533736][T13321] BPF: [ 333.533736][T13321] 20:06:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x20, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 20:06:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:06:18 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="8000000050047e0019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:18 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x5000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xce, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xee1d, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000180)=0x2) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r2, r2) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) ioctl$SIOCX25SCALLUSERDATA(r4, 0x89e5, &(0x7f00000000c0)={0x78, "8f5ee250f9002c5c120685c96c17ae987f979f743b8ec123bcfd9ea62baa0c3e4356980603aafbb8a9bd296e2b620e7bc210927b5dd5067fffbf38d969b9f05f1aba2c9b37cb8566ff9815135c20c8bca0d86a226fadc9ac8976f8b95347041f0ca5ac81ed757b3a4d9278f6e4017517fd649d5b2288f43026052a15cad11e3a"}) [ 335.500795][T13346] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 20:06:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x20, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 335.589998][T13354] BPF: Invalid name_offset:14 [ 335.600779][T13355] BPF: Invalid name_offset:14 [ 335.617043][T13358] BPF:[1] ENUM [ 335.636713][T13358] BPF:size=4 vlen=0 [ 335.657799][T13358] BPF: [ 335.675941][T13358] BPF:Invalid name 20:06:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 335.695692][T13358] BPF: [ 335.695692][T13358] [ 335.708025][T13365] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 335.735946][T13358] BPF:[1] ENUM 20:06:18 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000319000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 335.752443][T13358] BPF:size=4 vlen=0 [ 335.800323][T13358] BPF: 20:06:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) sched_setattr(r0, &(0x7f0000000080)={0x38, 0x2, 0x5c, 0x2, 0x1, 0x1, 0x0, 0x0, 0x40020000, 0x1}, 0x0) r3 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r3, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r3, 0x0) 20:06:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x20, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 335.820570][T13358] BPF:Invalid name [ 335.837875][T13358] BPF: [ 335.837875][T13358] 20:06:19 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 335.912975][T13376] BPF: Invalid name_offset:14 20:06:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x14500, 0x0) write$P9_RMKNOD(r1, &(0x7f0000000040)={0x14, 0x13, 0x2, {0x80, 0x0, 0x3}}, 0x14) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) [ 335.976740][T13384] BPF:[1] ENUM [ 335.980879][T13383] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 335.995376][T13384] BPF:size=4 vlen=0 [ 336.013878][T13384] BPF: [ 336.027067][T13384] BPF:Invalid name [ 336.045006][T13384] BPF: [ 336.045006][T13384] [ 336.075485][T13384] BPF:[1] ENUM [ 336.102073][T13384] BPF:size=4 vlen=0 [ 336.135701][T13384] BPF: [ 336.164569][T13384] BPF:Invalid name [ 336.190582][T13384] BPF: [ 336.190582][T13384] [ 336.412695][T13376] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 336.591650][T13376] BPF: Invalid name_offset:14 20:06:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) 20:06:21 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x24, r2, 0x209, 0x0, 0x0, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}]}, 0x24}}, 0x0) r5 = socket$inet6(0xa, 0x80003, 0x6b) r6 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r6, &(0x7f0000000240)={0x11, 0x0, r7}, 0x14) getsockname$packet(r6, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_CARRIER={0x5}]}, 0x28}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, r2, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @mcast1}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_IFINDEX={0x8, 0xb, r8}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @dev={0xac, 0x14, 0x14, 0x42}}, @FOU_ATTR_PEER_V4={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0xc}}]}, 0x48}, 0x1, 0x0, 0x0, 0x90}, 0x800) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="51430a43afaaaaea2aa83d7c52c742891c21b20a3c59870ab09731798bd546fa542bbf39466bec"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:06:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/hwrng\x00', 0x100200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000001100)=""/201) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r3, r3) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000000)={&(0x7f00000000c0)="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", 0x1000, 0x1}) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(r4, 0xc00464be, &(0x7f0000000040)={r5}) preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) 20:06:21 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000519000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 338.530440][T13415] BPF:[1] ENUM [ 338.547763][T13415] BPF:size=4 vlen=0 [ 338.565064][T13415] BPF: [ 338.576234][T13418] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 338.579413][T13420] BPF: Invalid name_offset:14 [ 338.602049][T13415] BPF:Invalid name [ 338.618928][T13420] BPF: Invalid name_offset:14 [ 338.627201][T13415] BPF: [ 338.627201][T13415] 20:06:21 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000619000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 338.680708][T13415] BPF:[1] ENUM 20:06:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1000000000}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYRES32=r0], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 338.717816][T13415] BPF:size=4 vlen=0 [ 338.756348][T13415] BPF: [ 338.780559][T13415] BPF:Invalid name 20:06:21 executing program 1: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 20:06:21 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) [ 338.820435][T13415] BPF: [ 338.820435][T13415] [ 338.889948][T13441] BPF: Invalid name_offset:14 [ 338.960076][T13449] BPF:[1] ENUM [ 338.961776][T13447] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 338.979548][T13449] BPF:size=4 vlen=0 20:06:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) write$P9_RCLUNK(r2, &(0x7f0000000000)={0x7, 0x79, 0x1}, 0x7) msgsnd(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4d50585c226c63ce04ee8248d112b86981507b90463081e7fa59c530ffa8dec797e5c0e00106d6e9468568a0d68439aed4d843a7f8abc0677ee05aab8b8294df"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 339.008983][T13449] BPF: [ 339.046185][T13449] BPF:Invalid name [ 339.080894][T13449] BPF: [ 339.080894][T13449] [ 339.157416][T13449] BPF:[1] ENUM [ 339.205409][T13449] BPF:size=4 vlen=0 [ 339.230806][T13449] BPF: [ 339.252750][T13449] BPF:Invalid name [ 339.279558][T13449] BPF: [ 339.279558][T13449] [ 339.412514][T13441] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 339.440374][T13441] BPF: Invalid name_offset:14 20:06:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() ppoll(&(0x7f0000001080)=[{}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, r0) tkill(r0, 0x15) 20:06:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) r3 = accept4$rose(0xffffffffffffffff, &(0x7f0000000000)=@short={0xb, @dev, @remote, 0x1, @default}, &(0x7f0000000040)=0x1c, 0x80800) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000100)={r0, r3, 0x200, 0x12, &(0x7f00000000c0)="3658809f488300a5da68e7a8fc197d4dfdbc", 0x1f, 0x8, 0x3f, 0x0, 0x6, 0x2, 0xfff, 'syz1\x00'}) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r5}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r4, 0xa, 0x12) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x6c120, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r7 = dup2(r6, r6) connect$netlink(r7, &(0x7f0000000080)=@unspec, 0xc) ioctl$sock_rose_SIOCRSCLRRT(r7, 0x89e4) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r8, &(0x7f00000017c0), 0x3a8, 0x0) 20:06:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) 20:06:24 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:24 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) r3 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r5}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r4, 0xa, 0x12) dup2(r4, r5) prlimit64(r3, 0x9, &(0x7f0000000000)={0x100000000007, 0x880000001}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r6, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r6, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r6, 0x0) 20:06:24 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000719000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:24 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004007e19000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 341.680879][T13487] BPF: Invalid name_offset:14 [ 341.697146][T13487] BPF: Invalid name_offset:14 [ 341.713660][T13492] BPF:[1] ENUM [ 341.725099][T13493] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 341.748489][T13492] BPF:size=4 vlen=0 [ 341.770374][T13492] BPF: 20:06:24 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000219000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 341.779601][T13498] BPF: Invalid name_offset:14 [ 341.788696][T13492] BPF:Invalid name [ 341.809496][T13498] BPF: Invalid name_offset:14 [ 341.823071][T13492] BPF: [ 341.823071][T13492] [ 341.858988][T13492] BPF:[1] ENUM [ 341.876368][T13492] BPF:size=4 vlen=0 [ 341.896022][T13492] BPF: [ 341.907946][T13492] BPF:Invalid name [ 341.943884][T13492] BPF: [ 341.943884][T13492] 20:06:25 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x20000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/hwrng\x00', 0x100200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000001100)=""/201) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r3, r3) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000000)={&(0x7f00000000c0)="311d9ff68cb520a50d45e8eb16eb844060485d423878c62ca8a9c084871db82d297f6ec60154f0b04275f9bc994e98656f96329df55a1316b16366136d95f0a3cb70d52335501d6a59d4ea099829b4cb98e31fe8f0ff060a03dfe1cb3cfd6e13781a201ed88f1eeb25e061f7d1616b7718a023ccb40658867f614efa1fc54b171a7651396905568698161745d38b4f5c94a35deb0a3f401ab68b56a75823a93ff8bcfa0cc09d4648f06d78335fd9409718708196ed3dc00aac85e7816f76c7c7bde547a1d45a9967e786320cd38637ebda7c5aafc91590f7e29f2e9c2a623a8b09a7b344f005411564085cfee0dd1254f3d756a6d75f9bc0ca7ad02f97b4d137442f1707c0b840324393ebe92a1497a3349cfbb6613b9edb62080475839cd7a8e205f647e39f29e4353f38b938cb8cde6c6cb9de37bf4f3b2d9a2d35b8683c4bbd43c978a62f7f963c9a92484816320973dff253ca24971ade751213aaec55c2f553fc8d3c0cfa3942d32455fcd3fe2fda54bd0a51f576cf619b5aa52c87105e516033ed968cf095497669a2fa0885ac47df99474dd079b272216ca9da8c710a33b97b2ff8a86f133b51dbbc76e55b4409edcd7dc635f751f24f13797156339a7f66e1d574b9c9c7b626a6f635b9b936b24c7ab1113aa52145b54c8d0d5368aea4843035a263fdca7f731af45f5f564bc869c807371fc765200334193eb623d2877994563361aad38bfed7fa0e91638c37bb784ad3e4ec3d48a3f742ff5a163370332ea6ba9026013ddfc19c8766dee27944ff32bb776bbe408e3cbafe341aec2a3f16c37e3279e570b2a918bd2a45515f1b50882e77bcc4126c86cffbbd74642613d67f09eac9a460c76028fe2f2cb60b539635060238a2e20358ac73b40027af481abf5f42a6b9445a58f3f4c4ec7ff584fd2848a9a3a1f8b089d737ebac501d1d03ce986a3ad3865c2a04d38e5809ee52a26c2effb273f21d1c18b9e4f8d45f290ca50de4201c325346e5dbdccd4c3ba33396dccc4048280521c5bb80d1d3ac0385e4b668c13d375cfb20195daffc5201703a75e27eb356d51b7317089f4e08c37688a57e67b8d2983794f37e4e3b42080f8194f36c5659737f4671d55920727e5c4da46d4bd4c47bb0cbc93746f0b0cae2f7bb4b8708a06b7becfec1f2e7892d88f037fc8ccfc69c8d1c9810890ec380e6ed2319f2435f41e240cd8f628981772211406ea9ff58fe55b1e49361a80122c938bba7c52cad653ce4c4d6d70ebc019b7ad430e76de21abc9177ff926d946926527eae7ed4547290105c3010aac2befda357c740df3c8af8d1ed6af41f2f1071cdf32f851948986fd4f129514e5debe0df782938f547177319ebb814d2281c345d9b83b481b78cf9726ceb3b1eac6e91c923cd618abe91a71cce412d19b3464bd3b4301a345fa306d5ac8b68e2b5ce3168e2e4f6b90431929158734da83cd6403cbd9ccf5a07e611a9ea2619cda224de833b5dba227d006ab5002a0c0b6cec306e884a8e918a1009be1e31e6ea75e0ff855ab816067cbb5fda4b540dba515235bf0fff62add3fbb6ccd3bbe3108758d7194fcded7e41373cf0d2301c9945fac1f6f52dacf2a34f40550bfac7d1dc2fc883c8e1a8020b6e02c44ba3b95152bb3456f140ee27fc1ed5bbc692ecbcacab2da484f894ee87fd8b4e3ba2826fc613472b1a148c534bc35af48e62cf1b32068f7bb8bcd3e6e0a9c16e041ddf5da1f420e6e1b1cc1bf89fc4e6cdece0c31b43dc93a0413df9dc0f7fed36596b30a2aa97d973c66f5a3a4768de077a914a36b715e33eee03a19189a8d96405955635583a5f679558e9d721494b765147acd2487b4e20deb901ae4dcbec86b7735471d5bbbb507ca5e2279ec62636d2feb80ef2d1e7d64a88c6ee8530221bcd2d38ece51b7468d86c6cdc972e77e2eba3167ec7dada3d77b734450b8fa94a22f6251996da6c0cbb2446f2c17dadc62b508e18a14866644102706d531a098c52eb779bbf2684cf4fea496e875b01853d8a437edaac6c537e10b5c48a3b6dcb4fa0b03d939950bd773bf430693e58dd9d2b03e6e9258899c413e451a1743e87ef0ad03dfb3e4b227ee8814c1d8d8645dc2c9c5f3c6ef516c91eae36b4303ce56059752c41955a421e16916b6c20dc1d47042dee9f4eeea0b3a5abe532195649fb99c15aa8850813c3074c3a015e9a03b653f2421537b389a08a9f014a3a35048a2470c907a617d1d460718ea7c038d8c1d51fc3029fde89b1066374ceba946763ebb2fe5ac58517f07fe76af45bddae84afe3071d4efd595e92719e6e2987ea2f94dfecbf0398770dd1be1b57b479d064f0994af71a16cac7dea1475c777ed7d236bd7b490fd0b0f3d38c817611383a723c60579a44813de5556604cd61a65693f8dc95b49abb6bb52be4b07b560f29af5f270815ace81eaaf57d2b6c591089f93770fea8df1ab545b6b73491f780394fc1e7ff067f062ccb80f4ef4ee1d829fe2d7f5893935f3505f11bcd0c70f6ced11d06205ae61953d60d9d8ef7bb5c7ea0b6ca4135ca69032d07f16f4027a8b81817cbc7ea233dc4e7aae7f5fb6f62b7e213f5e762fb196455bc833ec5300722e44e3fb3a59b47590fcd3c810e95f79243f177ca5adb12a4f80c40abddadc10ef9ae2269143d03731b92107013cebfe343dbe43b417db693b1486a92e8b99fd832dc6628670d2477310f800ce6443b3043b8616e05b36a9270a905400d82ad50d68a45b04c30e51b39b9c111b2992d0667ab2946720fad5aa95131fe33454491f9a976a3708fd83322ea71ef4025a1311fd578bee381b9a442f1e73fa9191f3bda885012460e445cb8b6240a4e9b83d225c65ca6268a4e551614ee7b4b4f6716b441ac5a04ffe6de46bab5a5097a3b466e825a99b9aaa4908fca3d06cc5098faaaa39db366bd632d17115892e37eaf98c3e955c7063546bcad68f6058381b53ee47f7231555712e28204f2386f0116687c597b804800dd656fa039a9a1eab33e9671e01718497cc64aa4f173c433f7bda8ba09caef1c50c77b67cc11cfadd17636361dfa72f406561e5149b4cc1dbe2afca2a66ecf7fdff9d7a29d28cc1f1cfc05637c640ee43c1b99d41ed4faa1e9113c88899f75d148d69a2023b66c9047b1b64ab2469470690ced1aefa027ba2f7425d99535a70806e505e005c9a4b9f60522b91f70d8f94c8083e43844b727f1f27297039a2116bf372f44379b1c87d6f60f851ef7eba7c733ab7d19bcddf1a5fa0e90d660f4c06a9c0a2a6b31fb18a3eba5968a7046a2c84f860cf6a960dcd992321ba146938173a9e4ce46ea8963b8fe59aae85b460c62113ca25844e65caab36c63d706c5b58d18d39dd1fea866cfe885837ad5676253b4720c2e3164fd6853f560b215e1824caace3b13319a6cec10d47482f4ee2de13772635dc8813165b48a2c1d7ff68c585b12a1900ee5d440a2793b554c0916d8eec71423abbdc3b160ee7d2dd63f21893428d97ffb82bcb0e2c05ef29edd79456369aa9137842c738a8d9b86f4c34a041b5457acd75ac79361518c02fd42cb7f37f585ecec0ddfea39be83272523428cbc2a892446c66478c77db8474fca0732f8f1f156ea34498e3da238cb910798027085dd7b4c0122839fa4853346efcdf38c867b1aab569c4ac3c01e546df1ff470b406e4c9fc38018b31a822de754d8dd2b5f09d894860d36ddc4b5510ee6956279262b1ea3944d725ff518bddb05ab94d4d28943da78e4ac3e6adf1d34800bf3e37fb013fb81fdf813f7931418d345af63bc26cef6b04a04aff92a3b882a34e98e9f6868e04936704933fd5e72d7096edb5f05d90010fc3cbdfcf4bc9e4ce77b478e00bdc496700247d1ce94461fbce8d3d91a4d442f7979589dca29e1ba2e41c1ca35bb60e456a2aac0aa95f9e9c9a1226c9d0c79f518f18f04f7fbd17c21c557da92adb90b2adcf09d3ae736095f5e2591485d1ee7b076b4500658bd2112decc1915a7c37a7cfb4488557e5f0270a5f08b757da3063197a97839bada4ff6b3f86d8c44be654ca26d7cdf8f2c673e7fcbef79b203c7b4728b4a1e1c4ffe140f0d7097a4f51c5c044563e3ad3cb6adc90ef640e8fb943a4880efcb78b29c70489efe3eba3ef31bcf52d5f54f63d7485a79ef755973d85a8f2a2e99d9a79a47ef94320211575a69485e5ae18682958c462631f7ad4f3df4e9dcad0a0323286521417931038166e0e5c14077c92301a09bee53bd3122c2fec4f7a884e376c86b66b60fec4ce8b11b894ecd20be170f9b66b42428fd3d92490b2dd6de2a8c854125b4c4fdacf24e36bb6bcb594304e7540f8c6bfd3d6b7cbd8aca6dcb102758929486ff1044dfdb9893361342a4363767754776ab4c2cefee0789df0f4942aa068bf947384dd76a9993e8367a37fda6cf2ea87e5979529e4f8660f0a405b36ef3fbaa5414bf78683f7cef43926ee756300d01fec682d93eaa99a67d2e74b4d5b81e4eeb718cea1e18d9ec062212688090fccf1918e911db3edf8f71296341631f549be83c141cf4f00daaac5b802e7f78724f9d0a96976590470d14abef6c18f8056d524f9a429daf53dff56be609cfbc39f3cabc0c7c65131e4fa15eab4a2ff4831a9e67b8b320ba11bb8abc9db7bc78cf22dddde3fd32b6cb827808a9e84bf82a061c8d09477303933e2a34510295f31d85b99dfdbcee8af3b75f88f890eb639b9e8d29c1d4db7f045c98021130e440666da04c55735854f031013c245f647828407c320b31829298c8337508320b4b29f79754b142f05c2997e0314bb31f6b26083a2b12857d7a3f239ad8da0e13cd198cf3b133a729def4ccf69b508ffa34fd2717a689fd553aef22fbfc8e77247aa8aac36915931bb5c25226c1fd625e33896a5b5ed74f5e7dab5b6f0156ca80e3ea44149a3fdcd1667b58c8c9aa7f428f85e3e74100b3f369d5aaf0c1e8a51ae106fcad3a4b2f7ce53042aa6d1e8379175a383285fa00983466f445f1c28392896e7390f8db900db0e44054646337feab0d0124ee343d667a142664ff8b3e75911f5bfecadd463b5de040492d577967b63596b6bd1f639dd44c342f29abf9318751ef5bbf4c84d2a076ace07c79da9b4bf6755aed35068fe2a3bd51bf5333fbcb2c4d697a6f9e7a8dbf6ea65e018e743100eef54447ff79abc7f5f1243633072ff8910578978f420844adeeab0032a1a753189d37910e3fbc15070e9bd187f7707c74d263d279eb5cc3cf32453e397eb073f0e211417f2dae9ef8cc5dbea4318cdc07c3d5b0759ee4dd9cff74b4c4be7b8d3e58d413a81b4d55bfeb36b101b0509184aa691a3e5e8d0f53d86576bd5e382ff26e3a24694855d23665bdd59e1376e674511c96d63e77c3d71da83325a2e72456b0a514cf811b5a919bd592e3af71faaa0cbb8599cead8728d2546ba3367bfe71ab990c7af58f3cd5ab30362636a1a90052c33a8477bc23ee92db73daedb5a2ef5613726c3fe45b01687d3335536b6dd4523eea67bc5b651cc6faa89e2c25d149db72c1e3a10dcce9a3f760968292b6b98bf201368a6c63277de9b52296a3cd85bbc74c730e4764dcaf00dbe4730715f465f2abea6330ed164433fa36001fb1f8a6de95540c8325f7443b784985a7a80b45945331dc57467e2a1811de1058951733d65a2df0dd087875da82c791d70780f08b7b3c8610194c5b3bc6ab36ae77a82a346670794db00b4f67dc9a3707e3f35b83cd401f0aa7f9f7632033d29ce041d2286bf453ead332d87373", 0x1000, 0x1}) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(r4, 0xc00464be, &(0x7f0000000040)={r5}) preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) [ 341.965525][T13516] BPF: Invalid name_offset:14 [ 342.022136][T13516] BPF: Invalid name_offset:14 20:06:25 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000319000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 342.138275][T13526] BPF:[1] ENUM [ 342.160091][T13526] BPF:size=4 vlen=0 [ 342.185363][T13526] BPF: [ 342.203915][T13526] BPF:Invalid name [ 342.228761][T13528] BPF: Invalid name_offset:14 [ 342.242236][T13526] BPF: [ 342.242236][T13526] 20:06:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f0000000040)={0x43d, 0x9, 0xffffff7c, 0x3ff, 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x50840}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) preadv(r2, &(0x7f00000002c0), 0x0, 0x7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r3, r3) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000100)={0x3, [0x0, 0x1000, 0x4]}, 0xa) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) r6 = pidfd_getfd(r4, r5, 0x0) write$P9_RSETATTR(r6, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) [ 342.288840][T13528] BPF: Invalid name_offset:14 [ 342.313920][T13526] BPF:[1] ENUM [ 342.352744][T13526] BPF:size=4 vlen=0 [ 342.383056][T13526] BPF: [ 342.410682][T13526] BPF:Invalid name [ 342.429587][T13526] BPF: [ 342.429587][T13526] 20:06:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() ppoll(&(0x7f0000001080)=[{}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, r0) tkill(r0, 0x15) 20:06:27 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000419000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:27 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x21000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 20:06:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f0000000040)={0x43d, 0x9, 0xffffff7c, 0x3ff, 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x50840}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) preadv(r2, &(0x7f00000002c0), 0x0, 0x7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r3, r3) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000100)={0x3, [0x0, 0x1000, 0x4]}, 0xa) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) r6 = pidfd_getfd(r4, r5, 0x0) write$P9_RSETATTR(r6, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) 20:06:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000000)) [ 344.773361][T13554] BPF:[1] ENUM [ 344.791833][T13554] BPF:size=4 vlen=0 [ 344.806121][T13560] BPF: Invalid name_offset:14 [ 344.818884][T13554] BPF: [ 344.834138][T13554] BPF:Invalid name [ 344.851778][T13554] BPF: [ 344.851778][T13554] [ 344.870567][T13560] BPF: Invalid name_offset:14 20:06:28 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000519000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 344.899318][T13554] BPF:[1] ENUM [ 344.929173][T13554] BPF:size=4 vlen=0 [ 344.946729][T13554] BPF: [ 344.961763][T13554] BPF:Invalid name 20:06:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r1, r1) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, &(0x7f0000000140)={{0x1, 0x2, 0xffffffff, 0x0, 0x2}, 0x1, 0x4, 'id0\x00', 'timer0\x00', 0x0, 0x1ff, 0x7, 0x7fffffff, 0x1}) msgctl$IPC_RMID(r0, 0x0) [ 344.981492][T13554] BPF: [ 344.981492][T13554] 20:06:28 executing program 5: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x53e000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:28 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x470b0000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 345.048782][T13572] BPF: Invalid name_offset:14 20:06:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r3 = dup2(r2, r2) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000007040)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0xfffffffffffffd3a, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="0907000000000008000005"], 0x14}, 0x1, 0x0, 0x0, 0x800}, 0xd004) sendmsg$NL80211_CMD_NEW_MPATH(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xb348, 0x3}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc040000}, 0x80c0) ioctl$BLKROSET(r3, 0x125d, &(0x7f00000000c0)=0x7e) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r5 = dup2(r4, r4) connect$netlink(r5, &(0x7f0000000080)=@unspec, 0xc) ioctl$KDSKBMETA(r5, 0x4b63, &(0x7f0000000100)=0x4) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x602c41, 0x0) ioctl$SIOCX25SFACILITIES(r6, 0x89e3, &(0x7f0000000040)={0x5e, 0x50, 0x7, 0x8, 0x3, 0x81}) [ 345.100422][T13572] BPF: Invalid name_offset:14 20:06:28 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000619000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 345.171974][T13583] BPF:[1] ENUM [ 345.187411][T13584] BPF:[1] ENUM [ 345.204485][T13583] BPF:size=4 vlen=0 [ 345.226975][T13583] BPF: [ 345.235128][T13584] BPF:size=4 vlen=0 [ 345.243169][T13583] BPF:Invalid name [ 345.266047][T13583] BPF: [ 345.266047][T13583] [ 345.269921][T13584] BPF: [ 345.314293][T13584] BPF:Invalid name [ 345.324301][T13592] BPF: Invalid name_offset:14 [ 345.331680][T13583] BPF:[1] ENUM [ 345.349949][T13584] BPF: [ 345.349949][T13584] [ 345.355613][T13583] BPF:size=4 vlen=0 [ 345.362905][T13592] BPF: Invalid name_offset:14 [ 345.406355][T13583] BPF: [ 345.409361][T13583] BPF:Invalid name [ 345.472908][T13583] BPF: [ 345.472908][T13583] 20:06:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() ppoll(&(0x7f0000001080)=[{}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, r0) tkill(r0, 0x15) 20:06:30 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000000)) dup2(r1, r2) tkill(r0, 0x15) 20:06:30 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000719000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000140)=0xc) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, r1, 0x0, 0x0, 0x0, 0x10}}) msgsnd(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="9ea1393272fe5cda425ba76c8c60554acb1f85ad75bb27dc3a0c8fb54714c19f4e791bacf3d3d64bdaf4fedfdb83ddce14e99edce8bbd47ea942b0589aa1ef7f55c3d79400754a598e4fa596d21230f3a23b9334cff75c3d48140e25e31c2f0a61a501bd8139ba3aa4472ef64ebe48a00e7ff1a6fbd93bb14328330930838bfbb0ce231bc6778a51b4f22e60207cbb59df94fadd74be295c8dd790b471a4293eb7b778e92e3e147d3c92"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) dup2(r2, r2) accept$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000100)=0x1c) 20:06:30 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x48000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x101080, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x9c01}) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f00000000c0)) ioctl$TIOCL_BLANKSCREEN(r2, 0x541c, &(0x7f0000000040)) [ 347.822299][T13615] BPF:[1] ENUM [ 347.843896][T13615] BPF:size=4 vlen=0 20:06:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x3, 0x2, 0x2}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="51f49a15ba9b2a1a11ee7bdf88756bcf050000003b2111e127c7d581cbbb6e5625e7f87efd308e"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000000)={[{0x944, 0x8, 0x5e, 0x6, 0x0, 0x20, 0x0, 0x4, 0x0, 0x2, 0x5, 0x1, 0x3}, {0x7, 0x6, 0x0, 0x2, 0xdd, 0x5, 0x80, 0x0, 0x7, 0x20, 0x78, 0x12, 0xff}, {0x0, 0x0, 0x0, 0x1, 0x4, 0x3, 0x38, 0x0, 0x7, 0x7f, 0x4, 0x6, 0x7fffffff}], 0x5}) [ 347.864298][T13615] BPF: [ 347.871786][T13621] BPF: Invalid name_offset:14 [ 347.884551][T13615] BPF:Invalid name [ 347.901952][T13615] BPF: [ 347.901952][T13615] [ 347.908741][T13621] BPF: Invalid name_offset:14 20:06:31 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004007e19000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 347.926138][T13615] BPF:[1] ENUM [ 347.936640][T13615] BPF:size=4 vlen=0 [ 347.950041][T13615] BPF: [ 347.960671][T13615] BPF:Invalid name [ 347.975862][T13615] BPF: [ 347.975862][T13615] 20:06:31 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x480b0000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 348.108949][T13639] BPF: Invalid name_offset:14 20:06:31 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019020300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 348.156607][T13645] BPF:[1] ENUM [ 348.160363][T13639] BPF: Invalid name_offset:14 [ 348.179569][T13645] BPF:size=4 vlen=0 [ 348.201745][T13645] BPF: [ 348.225668][T13645] BPF:Invalid name 20:06:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 348.247729][T13645] BPF: [ 348.247729][T13645] 20:06:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000)='NLBL_CIPSOv4\x00') sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 348.285890][T13645] BPF:[1] ENUM [ 348.307833][T13645] BPF:size=4 vlen=0 [ 348.330003][T13645] BPF: [ 348.348216][T13645] BPF:Invalid name [ 348.369707][T13645] BPF: [ 348.369707][T13645] [ 348.383288][T13658] BPF: Invalid name_offset:14 [ 348.454632][T13658] BPF: Invalid name_offset:14 [ 350.715103][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! 20:06:33 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r0, 0xa, 0x12) dup2(r0, r1) fcntl$setown(r0, 0x8, 0x0) tkill(0x0, 0x15) 20:06:33 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x490b0000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:06:33 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019030300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x4, 0x3, 0x8, 0x7f, 0x4, @mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x40, 0x20, 0x1, 0x3f}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) 20:06:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r3 = dup2(r2, r2) connect$netlink(0xffffffffffffffff, &(0x7f0000000080)=@unspec, 0xfffffffffffffe8e) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r6 = dup2(r5, r5) connect$netlink(r6, &(0x7f0000000080)=@unspec, 0xc) ioctl$KVM_SET_PIT(r6, 0x8048ae66, &(0x7f0000000200)={[{0x7f, 0x20, 0xc1, 0x5, 0x0, 0x9f, 0x40, 0x7, 0x7, 0x80, 0xff, 0x80, 0xffffffff}, {0x50, 0x9, 0x5, 0x0, 0x6, 0x5, 0x0, 0x1f, 0x20, 0x58, 0x81, 0x4, 0x1f}, {0x9, 0x583, 0xfd, 0x8, 0x5, 0x7, 0x5, 0x80, 0x3, 0xb0, 0x9, 0x80, 0x91}], 0x6}) tkill(0x0, 0x15) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/time_for_children\x00') fcntl$addseals(r4, 0x409, 0xa) recvmsg$qrtr(r3, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/149, 0x95}, {&(0x7f0000000040)=""/50, 0x32}, {&(0x7f0000000180)=""/13, 0xd}], 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="6800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000061340d1ad8b3532600000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000418b81803ea43570876ce5aa945e"], 0x2f0, 0x101}, 0x38, 0x2) [ 350.887079][T13680] BPF:[1] ENUM [ 350.907885][T13680] BPF:size=4 vlen=0 [ 350.938838][T13680] BPF: [ 350.975710][T13680] BPF:Invalid name [ 350.980815][T13691] BPF: Invalid name_offset:14 [ 351.009262][T13680] BPF: [ 351.009262][T13680] [ 351.038600][T13691] BPF: Invalid name_offset:14 20:06:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) sched_setattr(r0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = msgget$private(0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) msgctl$IPC_SET(r3, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, r4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) msgsnd(r3, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r3, 0x0) [ 351.085230][T13680] BPF:[1] ENUM 20:06:34 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019040300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 351.109566][T13680] BPF:size=4 vlen=0 [ 351.136868][T13680] BPF: [ 351.157481][T13680] BPF:Invalid name 20:06:34 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000000c0)={0x1, 0xffff, 0x2, 0x6, 0x8000, 0x7c0}) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) write$P9_RWALK(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="710000006f010008000404000000fcffffffffffffff0000000000070000000000000000010000000000000000000000400100000008000000000000008002000000000000000000000001020000000100000000000000000000000000000004040000000100"/113], 0x71) r3 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r5}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r4, 0xa, 0x12) dup2(r4, r5) fcntl$setown(r4, 0x8, r3) tkill(r3, 0x15) r6 = syz_open_procfs(r3, &(0x7f0000000080)='sessionid\x00') preadv(r6, &(0x7f00000017c0), 0x3a8, 0x0) 20:06:34 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4a0b0000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 351.207902][T13680] BPF: [ 351.207902][T13680] [ 351.239510][T13708] BPF: Invalid name_offset:14 20:06:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) ioprio_set$uid(0x0, r2, 0x2000) setresuid(0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x401}, 0x10000, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) modify_ldt$write2(0x11, &(0x7f0000000000)={0x8001, 0xffffffffffffffff, 0x4000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, 0x1412, 0x100, 0x70bd28, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x10) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={r6, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000300)={r6, 0x4}, 0x8) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="40415adc1acac5fb85008e2c61c206f0c38af6c8697665e77ebbb5eb338b31e38bd7449754483b4b6b757ec072b1d0a29907fc0c1bf2a73a4a78ee86407a0ee18040216642bb55562c9b1a98e1aa92535960e98e2edf8b348d593baca1bfe114f1c24d0ae69214416ebe9ee856913e24304b5a9964db8aa4b31f796e0440ffb05bfd50bd5a6e9ff594dc05fc2e93e976a0fa19d22937a5f2984cf2e9b974bd7c18c615a00a7d09f15fe8fc40369bdf49a5a05c6b27710ae4f8470c80109df8dc67fca86a88e49889", 0xc8}], 0x1, 0x8) preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) [ 351.268221][T13709] BPF: Invalid name_offset:14 20:06:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000000)={0x240000, 0x7, 0x1000, 0x0, 0xd, "73025929565829ca149f3e86a5c3d0037a82f6"}) msgctl$IPC_RMID(r0, 0x0) [ 351.385864][T13720] BPF:[1] ENUM [ 351.405347][T13720] BPF:size=4 vlen=0 [ 351.440560][T13720] BPF: [ 351.466070][T13720] BPF:Invalid name [ 351.492019][T13720] BPF: [ 351.492019][T13720] [ 351.533359][T13720] BPF:[1] ENUM [ 351.561091][T13720] BPF:size=4 vlen=0 [ 351.589953][T13720] BPF: [ 351.613050][T13720] BPF:Invalid name [ 351.633025][T13720] BPF: [ 351.633025][T13720] 20:06:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r0, 0xa, 0x12) dup2(r0, r1) fcntl$setown(r0, 0x8, 0x0) tkill(0x0, 0x15) 20:06:34 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019050300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:06:34 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4b0b0000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:34 executing program 4: prlimit64(0x0, 0xd, &(0x7f0000000280)={0x9, 0x8f}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r5, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, r5}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, r1}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="f4"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 351.917747][T13737] BPF:[1] ENUM [ 351.922096][T13739] BPF: Invalid name_offset:14 [ 351.937270][T13737] BPF:size=4 vlen=0 [ 351.952366][T13739] BPF: Invalid name_offset:14 [ 351.960784][T13737] BPF: [ 351.975261][T13737] BPF:Invalid name 20:06:35 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019060300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 352.006029][T13737] BPF: [ 352.006029][T13737] [ 352.038478][T13737] BPF:[1] ENUM [ 352.065719][T13737] BPF:size=4 vlen=0 20:06:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, 0x0, @perf_bp={0x0}, 0x10800, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x145000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r6, 0x54a1) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) msgsnd(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r5, @ANYRES16=r3, @ANYBLOB="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", @ANYRES16=r0, @ANYRESHEX=r4], 0x0, 0x800) msgctl$IPC_RMID(r0, 0x0) [ 352.088674][T13737] BPF: [ 352.105628][T13737] BPF:Invalid name [ 352.128951][T13737] BPF: [ 352.128951][T13737] 20:06:35 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 352.240844][T13759] BPF: Invalid name_offset:14 20:06:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r1 = dup2(r0, r0) connect$netlink(r1, &(0x7f0000000080)=@unspec, 0xc) ioctl$SIOCPNDELRESOURCE(r1, 0x89ef, &(0x7f0000000000)=0x3) r2 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r2}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {r4, r5/1000+10000}}) [ 352.303403][T13759] BPF: Invalid name_offset:14 20:06:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r1 = dup2(r0, r0) connect$netlink(r1, &(0x7f0000000080)=@unspec, 0xc) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000000)={0x1, 0x0, 0x100, 0x6, {0x10000, 0x80, 0x0, 0x8}}) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r2, 0x0) [ 352.328384][T13765] BPF:[1] ENUM [ 352.343415][T13765] BPF:size=4 vlen=0 [ 352.363839][T13765] BPF: [ 352.388423][T13765] BPF:Invalid name 20:06:35 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019070300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 352.409172][T13765] BPF: [ 352.409172][T13765] 20:06:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 352.467592][T13765] BPF:[1] ENUM [ 352.488852][T13765] BPF:size=4 vlen=0 [ 352.518258][T13765] BPF: [ 352.538524][T13778] BPF: Invalid name_offset:14 [ 352.538911][T13765] BPF:Invalid name [ 352.575111][T13765] BPF: [ 352.575111][T13765] [ 352.609270][T13778] BPF: Invalid name_offset:14 20:06:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r0, 0xa, 0x12) dup2(r0, r1) fcntl$setown(r0, 0x8, 0x0) tkill(0x0, 0x15) 20:06:35 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000dfd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 20:06:35 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x60000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:35 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="8000000050040000197e0300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x4, 0x8}, 0xc) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x7, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x262e985ec738a140, &(0x7f0000000100), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) ioctl$VIDIOC_CROPCAP(r3, 0xc02c563a, &(0x7f0000000300)={0x7, {0x4, 0x2, 0x4, 0x80000001}, {0x9, 0x300000, 0x3f, 0x40002}, {0x81, 0x48}}) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=""/26, 0x1a, 0x9ac42000}, 0x100) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000140)="268fc5ae9e5f0a625149dddd821957072d4f7901225aef864b0cc787bd345f41430cd604bae9f4caba49bc4ae396d0e600283193e1f7037051985ce700554a91340fd3ba907c0eaa60951bc446f18ca47ae087578170cc5b8b1c4218a43f2ea463722df97a56e9dbfed59b477cccc83722658b0e271e5d93ab448bf45d", &(0x7f0000000040)=@udp=r2}, 0x20) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="db095daa8e080000000000000040cb5b345a1b7af07fe31433d1ca22d372030bb04de7cecdffcbd22052557990eccd211775f846d40504a71fa097e336e922e8fa3a865409137b822d35d8a647cb90f481c467e0dfe75d14d373770f544dc7855c0c6e14838d024d2b456e59bc"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 352.904924][T13791] BPF: Invalid name_offset:14 [ 352.921242][T13793] BPF:[1] ENUM [ 352.950402][T13793] BPF:size=4 vlen=0 [ 352.967616][T13791] BPF: Invalid name_offset:14 [ 352.990836][T13793] BPF: 20:06:36 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000700e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 353.013726][T13793] BPF:Invalid name 20:06:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 353.051053][T13793] BPF: [ 353.051053][T13793] 20:06:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2c2062, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0xff, 0x9, 0x1, 0x2b, 0x0, 0x7f, 0x10081, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x8, 0x7, 0x3f, 0x0, 0x4, 0x7, 0x6}, 0x0, 0xf, r1, 0x2) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x70, 0xe0, 0x1, 0x3d, 0x20, 0x0, 0x81, 0x20000, 0x6f78011f562fd49, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0x80, 0x1, 0x1b2, 0x7, 0x6, 0x3, 0x8}, 0xffffffffffffffff, 0x10001, 0xffffffffffffffff, 0x1b) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) [ 353.112135][T13793] BPF:[1] ENUM [ 353.152160][T13793] BPF:size=4 vlen=0 [ 353.152166][T13793] BPF: [ 353.152179][T13793] BPF:Invalid name [ 353.177496][T13812] BPF: Invalid name_offset:14 20:06:36 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x68000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 353.237368][T13812] BPF: Invalid name_offset:14 [ 353.237392][T13793] BPF: [ 353.237392][T13793] 20:06:36 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000a00e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 353.437974][T13823] BPF:[1] ENUM [ 353.461331][T13823] BPF:size=4 vlen=0 20:06:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 353.488715][T13823] BPF: [ 353.506014][T13823] BPF:Invalid name [ 353.534707][T13823] BPF: [ 353.534707][T13823] [ 353.540924][T13825] BPF: Invalid name_offset:14 [ 353.569753][T13825] BPF: Invalid name_offset:14 20:06:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r2 = semget$private(0x0, 0x4000000009, 0x0) semop(r2, &(0x7f0000000380)=[{}, {}, {0x1, 0x4}, {}], 0x180) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r5 = semget(0x1, 0x4, 0x641) semtimedop(r5, &(0x7f0000000100)=[{0x1, 0x8ad5, 0x800}, {0x2, 0x1000, 0x1800}, {0x4, 0x5, 0x1000}, {0x0, 0x7, 0x1000}, {0x1, 0x2, 0x1800}], 0x5, &(0x7f00000000c0)={r3, r4+60000000}) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 353.587648][T13823] BPF:[1] ENUM [ 353.626516][T13823] BPF:size=4 vlen=0 [ 353.655520][T13823] BPF: [ 353.674920][T13823] BPF:Invalid name [ 353.716524][T13823] BPF: [ 353.716524][T13823] 20:06:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:36 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000400e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:36 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x687c0300, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="5110fc484d6aeaca397d6ed2c65e4ae0df6ad696ea90ec5d883495175546d42ad44b9c052b525b075f2e069618bce37de5416aefcedebbecbdf6433f09a3f0af30daaf0708dbb303f6b1f23d88cab4b81f644cbea947de19701ba48d025457d20a9a6586513c75a3e028edbcfc88638fc8780e94939647fc5d40921d5fd35ebd33cb801467250c2c99ed94be2c258f9e40b8edf57d7b77d236c4faa4d0c4feeb2a086b9a6d8643b814090dc5fbc9f6144bce569d33c69a894addd57548869ad895d4a3d742c7173353be37b01dc34af2ec27b7771e89cf38633ce272bfc4f647"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:06:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) r5 = fcntl$dupfd(r4, 0x406, r0) setsockopt$CAN_RAW_JOIN_FILTERS(r5, 0x65, 0x6, &(0x7f00000000c0), 0x4) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x8, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r7 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x101000, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r7, 0x2287, &(0x7f0000000040)=0x7) preadv(r6, &(0x7f00000017c0), 0x3a8, 0x0) [ 353.931985][T13845] BPF: Invalid name_offset:14 [ 353.941472][T13846] BPF:[1] ENUM [ 353.971508][T13846] BPF:size=4 vlen=0 [ 353.995567][T13845] BPF: Invalid name_offset:14 [ 354.028438][T13846] BPF: [ 354.059886][T13846] BPF:Invalid name 20:06:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:06:37 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000700e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 354.095886][T13846] BPF: [ 354.095886][T13846] [ 354.163656][T13846] BPF:[1] ENUM 20:06:37 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) fsetxattr$security_capability(r0, &(0x7f0000000240)='security.capability\x00', &(0x7f0000000480)=@v2={0x2000000, [{0x9, 0x80000001}, {0xffff, 0x6}]}, 0x14, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = msgget$private(0x0, 0x0) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r3 = dup2(r2, r2) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000200)=[@in6={0xa, 0x4e24, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={r6, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000000)={r6, 0x3ff}, 0x8) msgctl$IPC_SET(r1, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffe, 0x1}) msgsnd(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="81cd4ef75916fd3d8003cb43782262f87bd2a16238ab104d16541c84a51a563cbcce13cd06801f068a6344c4b0b829fd6a4032c9eff80c649ad8c826baaece8cf6c9bf240df3450b55b5df2cbb8a0fd78a73570e0f9eba7d071ac0266638dafce3a6a3f23140811557b8d8ffa0ad2ff731639c59a420ca8484bd455484d151030e31cc32b40c7a9deb0ed84d138c429435069faa99aa4b9d7d4b7fd72e63982f34af6c3bb26213e73660fd4ad95472ecc390eb302470bc141ddd"], 0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) [ 354.185890][T13846] BPF:size=4 vlen=0 20:06:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 354.210172][T13846] BPF: [ 354.223284][T13846] BPF:Invalid name [ 354.249057][T13846] BPF: [ 354.249057][T13846] 20:06:37 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 354.265895][T13868] BPF: Invalid name_offset:14 [ 354.300198][T13868] BPF: Invalid name_offset:14 20:06:37 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000800e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 354.483028][T13879] BPF:[1] ENUM [ 354.497919][T13880] BPF: Invalid name_offset:14 [ 354.519780][T13879] BPF:size=4 vlen=0 20:06:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 354.555769][T13880] BPF: Invalid name_offset:14 [ 354.565521][T13879] BPF: [ 354.590642][T13879] BPF:Invalid name 20:06:37 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000a00e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 354.626093][T13879] BPF: [ 354.626093][T13879] [ 354.678994][T13879] BPF:[1] ENUM [ 354.715722][T13879] BPF:size=4 vlen=0 [ 354.745501][T13879] BPF: [ 354.753655][T13892] BPF: Invalid name_offset:14 [ 354.770050][T13879] BPF:Invalid name 20:06:37 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000302e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 354.813810][T13879] BPF: [ 354.813810][T13879] [ 354.815134][T13892] BPF: Invalid name_offset:14 20:06:38 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x74000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 355.035405][T13902] BPF: Invalid name_offset:14 [ 355.036019][T13901] BPF:[1] ENUM [ 355.076253][T13902] BPF: Invalid name_offset:14 [ 355.110579][T13901] BPF:size=4 vlen=0 [ 355.135839][T13901] BPF: [ 355.150474][T13901] BPF:Invalid name [ 355.174487][T13901] BPF: [ 355.174487][T13901] [ 355.218673][T13901] BPF:[1] ENUM [ 355.247591][T13901] BPF:size=4 vlen=0 [ 355.273212][T13901] BPF: [ 355.291912][T13901] BPF:Invalid name [ 355.311499][T13901] BPF: [ 355.311499][T13901] 20:06:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x250}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x10, &(0x7f0000000000), &(0x7f0000000040)=0x4) 20:06:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r2 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) 20:06:40 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000303e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x11, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000001440)={'batadv0\x00', 0x0}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r3 = dup2(r2, r2) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) getsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000001480)={@remote, 0x0}, &(0x7f00000014c0)=0x14) r5 = socket$inet6(0xa, 0x80003, 0x6b) r6 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r6, &(0x7f0000000240)={0x11, 0x0, r7}, 0x14) getsockname$packet(r6, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_CARRIER={0x5}]}, 0x28}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001a40)={&(0x7f0000001500)={0x500, 0x0, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8}, {0xbc, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xe416}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0xfd}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0xa2a}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x2f857e08}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0xdb7f}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x80000000}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}]}}]}, 0x500}, 0x1, 0x0, 0x0, 0x4}, 0x1) 20:06:40 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7a000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 357.101806][T13923] BPF:[1] ENUM [ 357.110106][T13924] BPF: Invalid name_offset:14 [ 357.121977][T13923] BPF:size=4 vlen=0 20:06:40 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000304e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 357.141994][T13923] BPF: [ 357.144948][T13924] BPF: Invalid name_offset:14 [ 357.164528][T13923] BPF:Invalid name [ 357.183617][T13923] BPF: [ 357.183617][T13923] 20:06:40 executing program 3: sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 357.252123][T13923] BPF:[1] ENUM [ 357.283341][T13923] BPF:size=4 vlen=0 20:06:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r2 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) [ 357.312925][T13923] BPF: [ 357.330340][T13923] BPF:Invalid name 20:06:40 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7e000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 357.360337][T13939] BPF: Invalid name_offset:14 [ 357.365292][T13923] BPF: [ 357.365292][T13923] 20:06:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x15) sched_getparam(r1, &(0x7f0000000000)) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 357.400731][T13939] BPF: Invalid name_offset:14 20:06:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r3 = dup2(r2, r2) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) write$FUSE_NOTIFY_INVAL_INODE(r3, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x1, 0xffffffff00000000, 0x44297206}}, 0x28) 20:06:40 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000305e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 357.529386][T13953] BPF:[1] ENUM [ 357.557754][T13953] BPF:size=4 vlen=0 [ 357.590989][T13953] BPF: 20:06:40 executing program 3: sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 357.619097][T13953] BPF:Invalid name [ 357.657532][T13960] BPF: Invalid name_offset:14 [ 357.677111][T13953] BPF: [ 357.677111][T13953] [ 357.723823][T13960] BPF: Invalid name_offset:14 [ 357.753254][T13953] BPF:[1] ENUM 20:06:40 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000306e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 357.786222][T13953] BPF:size=4 vlen=0 20:06:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{0x304}, "56a79261f46287fb", "41fcd669637b7ff25e3468802ff98d7f", "69b7b390", "7ddf263f1e331ccd"}, 0x28) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r6 = dup2(r5, r5) connect$netlink(r6, &(0x7f0000000080)=@unspec, 0xc) ioctl$PIO_CMAP(r6, 0x4b71, &(0x7f00000000c0)={0x5f98000000000000, 0x0, 0x4, 0x6, 0x9, 0x8b}) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r7 = dup2(r4, r4) connect$netlink(r7, &(0x7f0000000080)=@unspec, 0xc) ioctl$SIOCX25GDTEFACILITIES(r7, 0x89ea, &(0x7f0000000100)) 20:06:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6618a90300f55a073302b3353a085bb1d600006df40700000067593ce09b3b406349b6685db7847a7ec79d5ddadfe2b8862bc13024b7526e87b22a974eec8afa615a7cf2fb44fb370ec4f75800000000fd33a8dc1a5c94da2d14e04ef6a1a2b472edebba83b81e2abdab03292d2c162c10c1403f4278114483b2296880083caa873a9568"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 357.824504][T13953] BPF: [ 357.841981][T13953] BPF:Invalid name [ 357.897568][T13953] BPF: [ 357.897568][T13953] 20:06:41 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x907c0300, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r2 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) [ 357.970921][T13978] BPF: Invalid name_offset:14 20:06:41 executing program 3: sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 358.013474][T13978] BPF: Invalid name_offset:14 20:06:41 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000307e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 358.116600][T13988] BPF:[1] ENUM [ 358.142833][T13988] BPF:size=4 vlen=0 [ 358.202797][T13988] BPF: [ 358.226835][T13988] BPF:Invalid name [ 358.261126][T13988] BPF: [ 358.261126][T13988] [ 358.277381][T13995] BPF: Invalid name_offset:14 [ 358.330334][T13988] BPF:[1] ENUM [ 358.334952][T13995] BPF: Invalid name_offset:14 20:06:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 358.374711][T13988] BPF:size=4 vlen=0 20:06:41 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="80000000500400001900037ee60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 358.429178][T13988] BPF: 20:06:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$isdn(0x22, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) 20:06:41 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 358.458154][T13988] BPF:Invalid name [ 358.498002][T13988] BPF: [ 358.498002][T13988] 20:06:41 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xac7c0300, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x7, &(0x7f0000000000)=0x200, 0x4) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x11, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f00000001c0), &(0x7f0000000300)=0x4) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e21, @loopback}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)={{0x3, 0x0, 0x0, r2, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xfffffffffffffffc, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}) msgsnd(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="8b63f32a081dc27b3aaf1916fa35e4a64431d5e788047c0f9d000000000082aacee56d1f09eae81e5e67bd277f3cea24ad507918328c183a058f75cf00"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 358.623208][T14012] BPF: Invalid name_offset:14 [ 358.701269][T14012] BPF: Invalid name_offset:14 [ 358.717818][T14020] BPF:[1] ENUM [ 358.744276][T14020] BPF:size=4 vlen=0 [ 358.772333][T14020] BPF: 20:06:41 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60300006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 358.794842][T14020] BPF:Invalid name 20:06:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000000)={0x659e, 0x200, "3ac102f2f709625142ae4c11068b8a46ba34dfec6ecfef2e", {0xdf, 0x7ff}, 0x1}) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000240)={'filter\x00', 0x0, 0x4, 0xd7, [], 0x5, &(0x7f00000000c0)=[{}, {}, {}, {}, {}], &(0x7f0000000140)=""/215}, &(0x7f00000002c0)=0x78) [ 358.837769][T14020] BPF: [ 358.837769][T14020] [ 358.895183][T14020] BPF:[1] ENUM 20:06:42 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 358.915493][T14020] BPF:size=4 vlen=0 [ 358.956422][T14020] BPF: 20:06:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 358.977000][T14020] BPF:Invalid name [ 358.981021][T14032] BPF: Invalid name_offset:14 [ 359.012939][T14020] BPF: [ 359.012939][T14020] 20:06:42 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xd07c0300, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 359.032121][T14032] BPF: Invalid name_offset:14 20:06:42 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60400006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 359.198927][T14046] BPF:[1] ENUM 20:06:42 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000040)={0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="51d66d6c7073e41ff15e0c4ce1a330b3e0164eb069bb837a7416fbff6691420c54afc098a4548647d564f545618a6f", 0x2f, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000200)=@v1={0x0, @aes128, 0x2, "2dd531ae737147b7"}) keyctl$read(0xb, r2, &(0x7f00000001c0)=""/46, 0x2e) r3 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f00000001c0)='/dev/snd/controlC#\x00', 0xfffffffffffffffd) keyctl$unlink(0x9, r2, r3) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r4, &(0x7f00000017c0), 0x3a8, 0x0) [ 359.239718][T14048] BPF: Invalid name_offset:14 [ 359.248483][T14046] BPF:size=4 vlen=0 20:06:42 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 359.296766][T14046] BPF: [ 359.298809][T14048] BPF: Invalid name_offset:14 [ 359.342876][T14046] BPF:Invalid name 20:06:42 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60500006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 359.374668][T14046] BPF: [ 359.374668][T14046] [ 359.437373][T14046] BPF:[1] ENUM 20:06:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 359.467125][T14046] BPF:size=4 vlen=0 [ 359.498820][T14046] BPF: [ 359.529791][T14046] BPF:Invalid name 20:06:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f00000002c0)={"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"}) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 359.567182][T14046] BPF: [ 359.567182][T14046] [ 359.581677][T14065] BPF: Invalid name_offset:14 20:06:42 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xda000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 359.658633][T14065] BPF: Invalid name_offset:14 20:06:42 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:42 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60900006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 359.909255][T14080] BPF:[1] ENUM [ 359.939961][T14080] BPF:size=4 vlen=0 [ 359.971672][T14080] BPF: [ 359.983459][T14080] BPF:Invalid name [ 359.988796][T14084] BPF: Invalid name_offset:14 20:06:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 360.035667][T14080] BPF: [ 360.035667][T14080] [ 360.057503][T14084] BPF: Invalid name_offset:14 20:06:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x68) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x20, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xfffff7fffffffffc, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) r2 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x908c}, {0xffffffffffffffff, 0x85c0}, {0xffffffffffffffff, 0x1}], 0x3, 0x0, 0x0, 0x5c) ioctl$int_in(r3, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r3, 0xa, 0x12) r5 = dup2(r3, r4) fcntl$setown(r3, 0x8, r2) tkill(r2, 0x15) perf_event_open(&(0x7f0000000140)={0x1, 0x6d, 0x0, 0x2, 0x0, 0x0, 0x0, 0x41c0, 0x10022, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x4417, 0x27, 0xfffffffc, 0x8, 0x8fd2, 0x8001, 0x3}, r2, 0xe, r1, 0x9) syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) write(r6, &(0x7f0000000000)="f1e29ba3772f1bf557f7eda9c5257e0adcf3fe507b646122c8ac3a0c18ecf8ed4c718636508edf3201ff8e983c2a8f85457682c450938445614a07d9", 0x3c) connect$netlink(0xffffffffffffffff, &(0x7f0000000080)=@unspec, 0xc) io_uring_register$IORING_REGISTER_EVENTFD(r5, 0x4, &(0x7f00000000c0), 0x1) 20:06:43 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60a00006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 360.099536][T14080] BPF:[1] ENUM 20:06:43 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 360.146601][T14080] BPF:size=4 vlen=0 [ 360.207695][T14080] BPF: [ 360.230846][T14080] BPF:Invalid name [ 360.262533][T14080] BPF: [ 360.262533][T14080] 20:06:43 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 360.306589][T14100] BPF: Invalid name_offset:14 20:06:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 360.360630][T14100] BPF: Invalid name_offset:14 20:06:43 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60003006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x2, 0x10000020, 0x80, 0x3, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="55da3fb3d25a196efe8daeb642a03af0d0a7c457fd8e3cf6a387d476bb3d4e9faf8a832db409459077abb7a4b69c43c212647056208c2223272706ccedda39402dc956a8345a9f188784de02c1da2a0b6acede17f98007c45106b1c74953"], 0x0, 0x0) mlockall(0x7) msgctl$IPC_RMID(r0, 0x0) 20:06:43 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 360.494964][T14112] BPF:[1] ENUM [ 360.525486][T14112] BPF:size=4 vlen=0 [ 360.561786][T14112] BPF: [ 360.567154][T14112] BPF:Invalid name [ 360.611295][T14112] BPF: [ 360.611295][T14112] [ 360.612645][T14120] BPF: Invalid name_offset:14 [ 360.659101][T14112] BPF:[1] ENUM [ 360.678558][T14120] BPF: Invalid name_offset:14 [ 360.704338][T14112] BPF:size=4 vlen=0 20:06:43 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60102006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 360.731821][T14112] BPF: [ 360.758941][T14112] BPF:Invalid name 20:06:43 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfcfdffff, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 360.793125][T14112] BPF: [ 360.793125][T14112] 20:06:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 360.940572][T14135] BPF: Invalid name_offset:14 [ 360.948570][T14137] BPF:[1] ENUM [ 360.985594][T14137] BPF:size=4 vlen=0 [ 360.988589][T14135] BPF: Invalid name_offset:14 [ 361.017833][T14137] BPF: [ 361.053665][T14137] BPF:Invalid name [ 361.075512][T14137] BPF: [ 361.075512][T14137] [ 361.123503][T14137] BPF:[1] ENUM [ 361.151164][T14137] BPF:size=4 vlen=0 [ 361.191324][T14137] BPF: [ 361.220031][T14137] BPF:Invalid name [ 361.238176][T14137] BPF: [ 361.238176][T14137] 20:06:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x68) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r3, r3) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) connect$l2tp6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x8, @mcast1, 0x9, 0x3}, 0xffffffffffffffb1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-blowfish-asm\x00'}, 0x58) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r6 = dup2(r5, r5) connect$netlink(r6, &(0x7f0000000080)=@unspec, 0xc) ioctl$VT_SETMODE(r6, 0x5602, &(0x7f0000000180)={0x7, 0xe2, 0xff, 0x80, 0x80}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r7, &(0x7f00000017c0), 0x3a8, 0x0) 20:06:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:46 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60103006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:06:46 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xff000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) sendmsg$key(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x10, 0x4, 0x7, 0x12, 0x0, 0x70bd28, 0x25dfdbfd, [@sadb_x_kmaddress={0x7, 0x19, 0x0, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e23, 0x10001, @empty, 0x29ff}}, @sadb_x_filter={0x5, 0x1a, @in=@empty, @in=@remote, 0x708475b4416d6096, 0x20, 0x4}, @sadb_spirange={0x2, 0x10, 0x4d3, 0x4d4}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3f, 0x20, 0x86, 0x3, 0x80000001}]}, 0x90}}, 0x40000) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="47ef2a62a5cc1334cfc4967183ea9e92a5dbfb4d29740acadc3fc8e525d86d63bcee0b96ae49cc47383971980029ee5a70cbd34cdc05dfe791bd246265f74a1f99fc43d4bb351c3dc7c132bb"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 363.215397][T14164] BPF:[1] ENUM [ 363.223951][T14164] BPF:size=4 vlen=0 [ 363.230057][T14165] BPF: Invalid name_offset:14 [ 363.232202][T14164] BPF: [ 363.237701][T14164] BPF:Invalid name [ 363.248339][T14164] BPF: [ 363.248339][T14164] 20:06:46 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x11, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) recvmmsg(0xffffffffffffffff, &(0x7f00000058c0)=[{{&(0x7f0000000140)=@generic, 0x80, &(0x7f00000012c0)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/185, 0xb9}, {&(0x7f00000000c0)=""/48, 0x30}], 0x3, &(0x7f0000001300)=""/147, 0x93}, 0x1}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000013c0)=""/194, 0xc2}, {&(0x7f00000014c0)=""/127, 0x7f}, {&(0x7f0000001540)=""/107, 0x6b}, {&(0x7f00000015c0)=""/58, 0x3a}], 0x4, &(0x7f0000001640)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000002640)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000002980)=[{&(0x7f00000026c0)=""/215, 0xd7}, {&(0x7f00000027c0)=""/127, 0x7f}, {&(0x7f0000002840)=""/100, 0x64}, {&(0x7f00000028c0)=""/180, 0xb4}], 0x4, &(0x7f00000029c0)=""/127, 0x7f}, 0x1f}, {{0x0, 0x0, &(0x7f0000002b40)=[{&(0x7f0000002a40)=""/219, 0xdb}], 0x1, &(0x7f0000002b80)=""/4096, 0x1000}, 0x71f}, {{&(0x7f0000003b80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f00000050c0)=[{&(0x7f0000003c00)=""/111, 0x6f}, {&(0x7f0000003c80)=""/94, 0x5e}, {&(0x7f0000003d00)=""/108, 0x6c}, {&(0x7f0000003d80)=""/73, 0x49}, {&(0x7f0000003e00)=""/4096, 0x1000}, {&(0x7f0000004e00)=""/155, 0x9b}, {&(0x7f0000004ec0)=""/156, 0x9c}, {&(0x7f0000004f80)=""/161, 0xa1}, {&(0x7f0000005040)=""/96, 0x60}], 0x9, &(0x7f0000005180)=""/120, 0x78}, 0x1de2}, {{&(0x7f0000005200)=@ethernet={0x0, @local}, 0x80, &(0x7f00000052c0)=[{&(0x7f0000005280)=""/23, 0x17}], 0x1, &(0x7f0000005300)=""/225, 0xe1}, 0xf96}, {{0x0, 0x0, &(0x7f0000005480)=[{&(0x7f0000005400)=""/70, 0x46}], 0x1, &(0x7f00000054c0)=""/62, 0x3e}, 0x6}, {{&(0x7f0000005500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000057c0)=[{&(0x7f0000005580)=""/77, 0x4d}, {&(0x7f0000005600)=""/91, 0x5b}, {&(0x7f0000005680)=""/50, 0x32}, {&(0x7f00000056c0)=""/227, 0xe3}], 0x4, &(0x7f0000005800)=""/149, 0x95}, 0x5}], 0x8, 0x10021, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) ioctl$HIDIOCGNAME(r2, 0x80404806, &(0x7f0000000000)) msgsnd(r0, &(0x7f0000005ac0)=ANY=[@ANYBLOB="d4684ba2e157d510ace2ff55909306804d7edb57b307dcff6cdeea594b9137efed375168f49cf638ea7c50467e550e204f63b6566110919c6a17ca19525ddd8954dcf2b5e69290c57adedb0df8a31ee1fc48f0d139b30ad9cf5398e4933a55a0798e5ed1f9e208c1eeeb0e4ec68661909a00000000"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 363.273672][T14164] BPF:[1] ENUM [ 363.285039][T14164] BPF:size=4 vlen=0 [ 363.296148][T14165] BPF: Invalid name_offset:14 [ 363.310594][T14164] BPF: 20:06:46 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60104006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 363.329172][T14164] BPF:Invalid name 20:06:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 363.374201][T14164] BPF: [ 363.374201][T14164] 20:06:46 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xff600000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 363.432762][T14180] BPF: Invalid name_offset:14 [ 363.451009][T14181] BPF: Invalid name_offset:14 20:06:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x80000000, 0x10400) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x86) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) 20:06:46 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60105006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 363.625994][T14196] BPF:[1] ENUM [ 363.642284][T14196] BPF:size=4 vlen=0 [ 363.676697][T14196] BPF: [ 363.717923][T14196] BPF:Invalid name [ 363.747786][T14196] BPF: [ 363.747786][T14196] [ 363.809736][T14196] BPF:[1] ENUM 20:06:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r1 = socket(0x10, 0x80002, 0x0) close(r1) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)={0x24, r2, 0x7, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x48, r2, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}]}, 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x8010) r5 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r5, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r5, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r5, 0x0) [ 363.840018][T14209] BPF: Invalid name_offset:14 [ 363.847008][T14196] BPF:size=4 vlen=0 [ 363.879511][T14196] BPF: [ 363.906200][T14196] BPF:Invalid name [ 363.906776][T14209] BPF: Invalid name_offset:14 [ 363.941587][T14196] BPF: [ 363.941587][T14196] 20:06:47 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffdfc, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:47 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60106006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x20, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400080, 0x0) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 20:06:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 364.170789][T14228] BPF: Invalid name_offset:14 [ 364.179888][T14229] BPF:[1] ENUM 20:06:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 364.219245][T14229] BPF:size=4 vlen=0 [ 364.229343][T14228] BPF: Invalid name_offset:14 [ 364.258513][T14229] BPF: 20:06:47 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60107006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 364.319499][T14229] BPF:Invalid name [ 364.374016][T14229] BPF: [ 364.374016][T14229] [ 364.401971][T14229] BPF:[1] ENUM 20:06:47 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0, r0}, 0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 364.438145][T14229] BPF:size=4 vlen=0 [ 364.479179][T14229] BPF: [ 364.484702][T14249] BPF: Invalid name_offset:14 [ 364.488372][T14229] BPF:Invalid name [ 364.523876][T14229] BPF: [ 364.523876][T14229] 20:06:47 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffe00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 364.544476][T14249] BPF: Invalid name_offset:14 20:06:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:06:47 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e6017e006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 364.728189][T14261] BPF:[1] ENUM 20:06:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = msgget$private(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x0, 0x7ffe, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) fstat(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) msgctl$IPC_SET(r0, 0x1, &(0x7f0000001300)={{0xffffffffffffffff, r2, 0x0, 0x0, r3}, 0x0, 0x0, 0x0, 0x82, 0x80, 0x0, 0x0, 0x1}) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b928641b1f30851"], 0x0, 0x0) r4 = msgget$private(0x0, 0x0) msgsnd(r4, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgrcv(r4, &(0x7f00000002c0)={0x0, ""/4096}, 0x1008, 0x2, 0x3000) msgctl$IPC_RMID(r0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x3) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x11, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000200)={{0x6c, @dev={0xac, 0x14, 0x14, 0x2c}, 0x4e21, 0x4, 'sh\x00', 0x4, 0x1, 0x5d}, {@rand_addr=0x64010101, 0x4e23, 0x1, 0x17, 0xd36}}, 0x44) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000001380)={0x2, 'veth0_to_bridge\x00', {0x4ef1}}) [ 364.768162][T14261] BPF:size=4 vlen=0 20:06:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 364.799622][T14261] BPF: [ 364.803639][T14267] BPF: Invalid name_offset:14 [ 364.843349][T14261] BPF:Invalid name [ 364.858439][T14267] BPF: Invalid name_offset:14 [ 364.884586][T14261] BPF: [ 364.884586][T14261] 20:06:48 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100036c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 364.946205][T14261] BPF:[1] ENUM 20:06:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 364.996671][T14261] BPF:size=4 vlen=0 20:06:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 365.035942][T14261] BPF: 20:06:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) openat$cgroup(r2, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 365.080000][T14261] BPF:Invalid name [ 365.099198][T14284] BPF: Invalid name_offset:14 [ 365.123407][T14261] BPF: [ 365.123407][T14261] 20:06:48 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffff6, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 365.152813][T14284] BPF: Invalid name_offset:14 20:06:48 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100056c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 365.312601][T14298] BPF:[1] ENUM [ 365.344612][T14298] BPF:size=4 vlen=0 20:06:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = gettid() ppoll(&(0x7f0000001080)=[{}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, r1) tkill(r1, 0x15) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r3 = dup2(r2, r2) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000040)) ptrace$getsig(0x4202, r1, 0x2, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x80003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0xffffffffffffffff, 0xfffffffc, 0x0, 0x0, 0xea}, 0x0, 0x4, 0xffffffffffffffff, 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) preadv(r4, &(0x7f00000017c0), 0x3a8, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r5, 0x40485404, &(0x7f0000000180)={{0xfffffffffffffffd, 0x2, 0x8, 0x1, 0x8}, 0xffffffffbd2fd5d5, 0x7f}) 20:06:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 365.397977][T14298] BPF: [ 365.415808][T14298] BPF:Invalid name [ 365.430775][T14303] BPF: Invalid name_offset:14 20:06:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 365.469927][T14298] BPF: [ 365.469927][T14298] [ 365.485946][T14303] BPF: Invalid name_offset:14 20:06:48 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100066c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000040)={0xfc, 0x6, 0x8, 0x1e, &(0x7f0000000000)=""/30, 0xc6, &(0x7f0000000140)=""/198, 0xea, &(0x7f00000002c0)=""/234}) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0x6, 'ipvlan1\x00'}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r3, r3) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f00000000c0)) msgctl$IPC_RMID(r0, 0x0) [ 365.533801][T14298] BPF:[1] ENUM [ 365.571226][T14298] BPF:size=4 vlen=0 [ 365.621914][T14298] BPF: [ 365.635247][T14298] BPF:Invalid name [ 365.667325][T14298] BPF: [ 365.667325][T14298] 20:06:48 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 365.747429][T14323] BPF: Invalid name_offset:14 [ 365.786797][T14323] BPF: Invalid name_offset:14 20:06:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:48 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100076c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:06:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) r1 = dup(0xffffffffffffffff) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r2, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x800) [ 365.924628][T14331] BPF:[1] ENUM [ 365.948620][T14331] BPF:size=4 vlen=0 [ 365.973121][T14331] BPF: [ 365.991375][T14331] BPF:Invalid name [ 366.006456][T14337] BPF: Invalid name_offset:14 [ 366.014972][T14331] BPF: [ 366.014972][T14331] [ 366.048078][T14337] BPF: Invalid name_offset:14 [ 366.063655][T14331] BPF:[1] ENUM 20:06:49 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e601007e6c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 366.118028][T14331] BPF:size=4 vlen=0 20:06:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 366.171435][T14331] BPF: [ 366.189460][T14331] BPF:Invalid name [ 366.215845][T14331] BPF: [ 366.215845][T14331] [ 366.349197][T14355] BPF: Invalid name_offset:14 [ 366.670863][T14353] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 366.789758][T14353] BPF: Invalid name_offset:14 20:06:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff2000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x41c1, 0x10100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xba7, 0x0, @perf_config_ext={0xe5cb, 0x5}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003640)={&(0x7f0000001100)=@id={0x1e, 0x3, 0x2, {0x4e22, 0x1}}, 0x10, &(0x7f00000025c0)=[{&(0x7f0000001140)="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", 0x1000}, {&(0x7f0000002140)="d982b2ab75eba7be7e06e1963af74604e41983c71bd7822c46caa33dfa4dea3ebf9f0a81f746cd9edf341a460e666059613df4ac75bcb82905bdcb433b3c09993bbfc2e966", 0x45}, {&(0x7f00000021c0)="6209a58a895c944df6e9bf49dfe436860dbf0439fa538b923a36ee17762893442d74aadde31f02e26cd6a52e0b6b09b198f81bcf7dc2771db04180d3e85c504b2feb4bba2f9703f69924208c6dd008183ca9a6b2ec8b6ced59b310d39454ddb51a7b2f52bedc8fbc75aa4eabff350c9b67a8da71cffd0019bf9b19e06981aca3a054ba6b08580243ec5d887e3198183d0a9428c43905150acb5d0f1173d06d5bae02b8b1a959f036be603be9f82143ece2712b41137dc6f5906a14a383e50c3b48286d86f9c8b1623cbc37e340cbe6cb35092c641b40e29c6eeb93b3d9ec656139b4cc65e4a6fabd7ab8f681", 0xec}, {&(0x7f00000022c0)="514cc4762cd007df6ce32690fdf930f2b541b2df519eaff478c6c8f74a9e6e449534b210937efa8e75ccd96d584209ce27e3e31abbd26d9c21eee2d54c3d25593a0c8283a5617bd7c3161ae7d95c3b5b0bbc347f4f31322582cd300e82fc4861cff37e6b9a0feaeb1d3312d6eb09ae91bf6f1a7fd9b15ac5b7277fb3deafeb49a1d5ca2ee04d034285af06b3317ca0c16bcfcf7526e0b1135471885a8f4b4401c2602229d0aa7ea4420e35024b27367c194af9608c32d972925fdbf9f0031753075ad46d69ffd7d5a119199a6a8f6dc45c95bee1799db129612940c75f8b74b0e4b2", 0xe2}, {&(0x7f00000023c0)="f86d60d1b624d97db73b65290be233a376a804e95f26c5c70777cb2a116bd0477f4c4526ff3d21e29ef063b903c3a1b43c7c2467cf295f577f88bdf5db153bf82e82f5cd", 0x44}, {&(0x7f0000002440)="6c36462dc29b16484a8ac4fe728e50a1882fc43515f186201509bdab5bc1f864cc930ac3396e26c8910cc2d539010ac65d96146460c98877ba8c3acb6142901974dc0a35c3d99808f4f7a437e207f25bb6cf3f359f7f74547a2d3dec00ee15972907432f77157fa7120050e6af5b5434bf9d8551", 0x74}, {&(0x7f00000024c0)="9ef3e957cec396f25b42eb9c9031aeabdc5868ae743e662fc26f1b304fb9c3f1ac4d189ec7cc466fae8e45e1cd6e8389272c458e934b4b67c5999f9b082c056f30b0769ecbe8fd422130e0381750396d21d09dfbb14c2e3ea20a16d07870be33a66ca88cb2cf466e38389875d27a2dca1d7aa06f8303873a271a03e2dd462a2e04b5310271b4d2e3cce33c8cc3051d489b35c1dfe5328a325cb4371c1163cbc77a638a6c616c5e22037a7594266fc9bdec04bc037a2513b77af1c9755c0ffde5529898eb2fb85f9108c08d88caa613a9d9156a80b3922a39dbb7e3219f6a76e92b87ee861904bb754b9d", 0xea}], 0x7, &(0x7f0000002640)="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", 0x1000, 0x200008c5}, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x7, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000003680)={@in={{0x2, 0x4e24, @remote}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000005e80)=""/4096, 0xd5}, {&(0x7f0000003780)=""/113, 0x71}, {&(0x7f0000004e80)=""/4095, 0xfff}, {&(0x7f0000003940)=""/102, 0x66}, {&(0x7f0000003880)=""/188, 0xbc}, {&(0x7f00000039c0)=""/172, 0xac}], 0x6, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) accept$inet(r2, &(0x7f0000000000)={0x2, 0x0, @private}, &(0x7f00000010c0)=0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r3, r3) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) read$char_usb(r4, &(0x7f00000000c0)=""/4096, 0x1000) preadv(r1, &(0x7f0000003800), 0x0, 0x9) 20:06:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:06:51 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2100000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="07dc"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) r1 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000040)={0x0, 0x81, 0x0, 0x0, 0xff}) 20:06:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:51 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e601000025000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 368.504708][T14373] BPF: Invalid name_offset:14 20:06:51 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100002e000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 368.529230][T14377] BPF:[1] ENUM [ 368.533209][T14373] BPF: Invalid name_offset:14 [ 368.548152][T14377] BPF:size=4 vlen=0 [ 368.566337][T14377] BPF: [ 368.590193][T14377] BPF:Invalid name [ 368.606403][T14377] BPF: [ 368.606403][T14377] [ 368.636281][T14377] BPF:[1] ENUM [ 368.649407][T14377] BPF:size=4 vlen=0 [ 368.667532][T14377] BPF: 20:06:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:06:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 368.683222][T14377] BPF:Invalid name [ 368.702779][T14394] BPF: Invalid name_offset:14 [ 368.715873][T14377] BPF: [ 368.715873][T14377] 20:06:51 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x400000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYRES32=r1], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 368.750113][T14394] BPF: Invalid name_offset:14 20:06:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x9c01}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'wg1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r3, r3) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r4, 0xc0a85352, &(0x7f00000000c0)={{0xfc, 0x2}, 'port1\x00', 0xf0, 0x41, 0x5, 0x7, 0x3, 0x0, 0x5, 0x0, 0x1, 0x2}) 20:06:51 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100002f000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 368.886415][T14407] BPF:[1] ENUM [ 368.909294][T14407] BPF:size=4 vlen=0 [ 368.942127][T14412] BPF: Invalid name_offset:14 [ 368.957637][T14407] BPF: 20:06:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 368.987678][T14407] BPF:Invalid name [ 368.998147][T14412] BPF: Invalid name_offset:14 20:06:52 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100005c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 369.065265][T14407] BPF: [ 369.065265][T14407] [ 369.148071][T14407] BPF:[1] ENUM 20:06:52 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0xe0940, 0x0) sendto$llc(r0, &(0x7f00000002c0)="2b7a9101029f0710e14eba363a72f591f41397bb4d967f2ad731b25c24d26867a1592101f48f9ac1814ccd0de6c3c07aefdf0b936e9f67b4cb8d7f0b24bfffd62fe7ef44497a1445639d62e46b4b27ed235d53c7b9b69c1cfe10670dfc48dadd6720f67036d022a205912f16eb47c58b20cbe701408f821dc42d634d0ad5ad8db18fa9fa2b1dc97f837faf0e05ba7dd32bada32e32f3b49f1bce27d915b068b9a4837c9ada615fb6b39919132217d20f85a6ae657db4d38ad3df08e50536e82dacde09d44711c3c074a6e3fb9ad1464e0121858484d94594e24ebf59ee5bad223de77b40060ed9a8c21d3bbdf7c4031b44776fd7e506c20d23726ec49d591c1734f550bd39a09cae22b24d1af374c255e3e6b91aa613134390ce64078583357525d40f0b6bbf4bc1d1da208b87bf780fd1169251759820f2c7e02aa893c9b18c7310166ed5bb923e1fd3a4fb4ca64de84ecc3bd630bd9285a4a69593b1f03a7beb92a18a3e4134b0cf6a10ecc9c936a5be43a65ff10065641961b039fa9f68220647be5403cb088e6ca9eff7bc2fe167f66e4abb876aec3a39c69d2e77645633d74e6cff79e8823396ccbb2a47de6c575641f9a1d025886824be321ac10b1917db7b8539ca268c5b89abd4f0b952468be522bec57e5b578583e4eacc22334d3498177a5da1862e433e2a8bc6ff55f56846c3fd26c369d77d494c689484c9f111c2ca672b5f6dd84806346b924bdcfb7964efbc65d36e062b7a3313f2171ff098d2407901bb5707785d6cf54ab7146f1ca76899ec9b4fd069ed20ab055e9cb9c5994764b150d76fd100d8ada9bdc6b4822510d8a613893715035a7a30b8c3567863dfce3e7538cd74d35eddd005a6812f8e824def21be6b0ce182c734bf3230d7fedf449aee8cc2e7b1e76e96fcbb1a580211da2df36a7fd31cebb514b6bb06104fe6b393369caf50d89baa08799f5179902b1525b515058143fddab77322bcd4774cb22f72f3c88ef953d41e62879639e3c27dc5c84c435189ecf8dfc666dff81a8f1ce9e347dbdb0433f2ef879f0679e13c46ad50562649116604a177680f9aebc25dd787221f8b1662608bab56d977b7712fe5e033f7ab280e1971c9340aa8586ec40477972f7ad25e2faec35e6df1b957c4fddb00ebeac61cc5e4a66536ad0322a99ffb75f7928628dea2c962b7fe3d091f49b712e493436e9c4a02d9dde87876cd1247b0385ac750756da47b19395f1cf97451897c5e42376662543a1ca7039e8db8af6c7f3ce6020d4ff3384202ee9031ba320f7f8ac7dc8f0260ae488d68197fb0e885a89ea7c0e701bb04a454dd8bbce450c82154f66e2e5bf8b41a3c0b32b65466e9c5d4ec53eaa481a9c77b171daca430d857e1efa98ccfbecaa99c81a1168090d1dab0fb78e4b50fa7ced567644aa353cf8114a1a1626a53ddd2dec74d3bbf95d389bc16cd904c80e3bf65dbe4642efd108b4449497d2296c56eb4f33daaf90b6d8e8157fdffd3c310bfefca17334260cf1cb25fbc2b52e11192060934b5668409442a1552e3c5399ccd7d7000496d09d3f341dfeebd636cba737ac8a4347eb68f5bebc7af01e827fe5342d834dca1804ddbb38edb438d8c9513eb7ad81eb5cb5902d9ca37821e76c357c4109d8b290780d66d5d92076becadfedb4a53428191a2e17f6275854cc814316d9e40bf933a209babf921f0a0c4117c0734abc9311c1e3cf5b3d43e34027ae4a9bf5822d713d2f5a757b387aad7b281c65a5cb79a30f3bf09c85e40898bd822acae5bcf0aea0fa4f69cb08d9a7015b81ebb1af7804003205ab04ca9dc09a5566309dd73f0d49b55cdbaf185036e3db837b28d14d721c59f85971e67dfa92dff5176700273464fbe176e50ddc53aa208da7ee60016893baa21e652acb2f1e88a73424fe106bdaa53569019f45b2e4836b83fced7d090295e0aa4407969ba45312becf88914b2ae3b84f9e120cb1d31a6abb09c395339afc8ae11be8907ebfa87cd433fd6fab5b744c8f6901b2883ad705ae6b93c869fff135c963b34d1cda3ac3be5699cfa94763525eeffc08725a6fda9e46c520643727b63fc6e8e951bde4bdb242e201bbb987c7e2d1936926f1f21e8484d11d144920edca964037be319b470578b16eaaab07d87e55860a138d3668ac52d0cb89092ae4cb783b2499e146a95a978fe4849625817c8dfa8a29024e26295bf32dad99a704120a49606ad36b8cf545e3145af79a78e2e24ed25aa53ca80f38df0934420ffba905205ec6c09776f3ec88a54e60b504cc248bc008fc4c652c17d0e77da466769232165753feeae119da4fcd4e11b6da8532162102e28fa256897f29481412f9282f8b4e3dbdd2070c2e4df9a235662276a3c106b197d019001f8a55a04fae1591bda5555c4512ae15a2f26465a9240f34a539ea18b411e75e01ae8538af061fdd4f0e7e78578e9d6dec00ed3541f26093e3ffb1b2a2ec9c5b442e3ec75bd7246b6af37ad56c6e33285d37618511aff6b6eb1cfef29e2f5fec3990da88c8b30dffd6ba429b6694004cb85c047d82c3ea86da723775a1b1c9e4173aa1b6785570ceb0713ab1c75cea1bab89745accf41c7f5a84f6db82ffd132c0cf962386f8270ed6fad79fecdff78dcc398dba3e9169c6a1eed76012427338a3649ca58066600996c24c5a5e527d02f356ee3132f13215ba925d4b2f725609fb17b1d9a80a005c6bb010c3e2d7a70956b0b38e440589de25fbdef86e3b79e57c3fa69d6ce77497916ef0254a3f043dfe3ff6304575172721036849efb0a6aaf3200b670b89ce533c4bc58e7bd6d0a6d692f9a02c5755bdef4bb05182c249a73181447831ccd38c8c847e616b1fc0d048a3d99a3b98669d6d2d8bb5ac621c9ebc25a1618657796a7a3829d93d51eda686094a21ec2b01edfbdf2cacfb31224711d8b03ba548f3a16fc3d3f55a5f740cc618f65b4e3048525219a83ca3e5d16eecc8adcd7bbabeb2bf82432866d9f549e42f6a413b5f767c84e10e54c6457c4a6e87b296e5235cd1f1d678b8a6cbad1ab897f922cb11d2ee0420fb5ea8847bd90610f487d837034c5f1afd30b6bc77abed1f62b96420fcf29b4e1ab5f08ae6efe86ff5059e3fae9f0e84c2af8fe53f667e218e074261a3a9236177ec61af6b2c1ee5bd9aa6bc17594d88575724c0da70eab07e1d2de60f00696d5eb81e1e2d6a260feb0db3157f75493d896e2399de77e52b2379ee6443775d83360641742fe06aae441938512a1442c279d0d84a77bf91208b4a85958c1e945440edfb14bfef550b41e9280bf850ec6a47843b989f1e57ff1e022e05dcd7a1218686e1f6bab83af4d0422272abb355dcff04aad70e2ea65e5dbf7d727199cfbe84e147c6c62eeacea832f4395f4d26c78c64f8c69234967305455acfaa3754394c1a7a70afb4556a4e61884bd0836f4ed2b2ab82a027628a6bc17bf4a65dd155e6802087ef386b8342f9b18b2fc3ed72de0785e818a319761a239707f6508dd5e4d4f2032dd2cb0ac70e6db27b4a6b6fbbc63eeeb25e730d26e08bd8d1c1ebaac386c98acac598ac8a16272e327ac08a21318fb527841ad98e2f134cf3a5712825f7a9ad8f5ab78bb8806152fbe4e64db8804545b22e2050de998e5f885b17ab1c59817ef57aefac9796d453e8b86a69e2ccc4cbcb86824ebb6e407db9e7acacbbda56753fc09f9c774fdf0182596c1f92e1a6a2d6f35c049f1bda990018d0d1929b76b775ca4457cfd406e6dcebd1f987b243257d5c2824e0945e06274b1c537477a62b1da40d56beaa8e4e611a0b382e9679ee8d75cd4bb58ca1c09e32ad077b76a88ce19ce00047e77c3ab765e0148e5d6a15c1c357d5c47e592807a4b4fbd7944d0232873adc0cff46f3e9f826f69e8ba09f1de66ac42d922040907f6b56ce645abac7b87f67850f179f2530dcd8db7a334126b7e50b55fe371420ddb8eb4021cc76951fe40fdf2c6ec1ec022a33c7b5dcd903fd7c35930ae204fc1f465e2a2a2fa071d113ddfb755595a8c5d37ef2412a5bffd02b5dc9b57ce3645225c911f0daf225f1966d5c7e73cff2f325260aef7424fd14fbb31655a41288dfeca215d455c68331a1a01dd77d04ad52db5ab27ae5ee7716eadfa255699305714012d772d6f314c2576a0e1890566703b563e7a010353975931b68dca06b26124b81bf009d2496b87aad8de80f4d83f40f9c0c165db6ab97eb4dcfc569fdd4771464f5c6142044bc920018c8a7a8753e7c3150c06aef46d8fa301167bef13b3e317311090c40436340b925a5edf0d40fbe3e1979e6fae22a32eb390103cdfcf686b368fc021279923b27f5078966e80e5086e2d619e519be85fe337624652269d80f18c9b90abbdf08334400bd5d5f678f02246918e20ee4de3ace875e27678460a6f5cbcbe521988cb573e0e3bf5e24dc470aa1a6027640cb249c7fbb7765742b5b2db48cf37fa4a0a44377b89ff76f1d95226b2a17e4b3928039ac26f55fc4fdf7b443f9db6956b3826676a9424b7feb22df9c4ea289970112d85e965a3e03a0713e4e154005c9021a6b37ee22c48221de7355b36427f2cd09c958710f6654d5a23772cdd380efefbb11d6bc46e9a660ac2738fb817c7cd1729466decef38191e0b8f6fb8883543fa8daafb6200b366650099af789c610af0635d7768c23810729b4c1f6d887c23a8ad2b54bbb33dd1b0510c311d3e5c1680fa65e3f810bacfa382b2fe84c6c448a92fd7a6a0e5d5960769ab958d6e1169335d564415ddcbace5d667f13d09a7e5c6339e6168358346d3c21290cf2ad16a3d2b3bb05049d17002c78d7184b126a40aa410b31a7799fa7e3010a8d80e0ebda33bf258cb4bf4dcd47cf520b9be8f8919df59f41cfcb3333f038deafe9bb84b47d37d36a1da46138fd23ba8e64a410046d814c1e895d5339bb50a2630264f18c28600f4a6702b12447b2c92c4695c992ead1366d2e6241bf881d1d6134ea7bcf82007b69c1c829c9482f0e2c1053d3e6ef9b24cd35d2a8f58980c93c24fe267f98857b1adc3246c8256096bf9e4230ce3cee3524fa70331d134012889260731ffa503ca31022484200db24f3568077d180c85df6a4cf77de5b08860f2f255684abfabc6ba54c9ecc718f9709ac3a21cfc8ebc355255d8af8e7c74d69f60add5985643db40379eef7c638234b8684d84ea8ea3d11ed12fdade2f282bc32099858841065605401519ec0bcba05395ff92f1e346c82dc1c3e4ff1a0d8340a80b733501553b6a9442bea29cbf4c3d182384a285e2b92c84270b843aed9bcf4a56f34a0dd3cc373fd78ae576fdda5e2b705a5cfa028af41c6204656a2dce100fa3849cc86f82bcce3503963dc06f8ca9b9dfe2608b9cdb531a35ca8d46db0b5a764e6bf3e217f0b39831a23c7a61941fe0030dac063addf6e64153b7b13fae7810f4a87956f448b5f45d554961de60982502e21c10c838cc692f46949d6b67fc351fa65f7972cea2661688741f40e927354ff5f5ba0dc76dba2eed60c7720dfcce9280590524f78a664b4bdb9be25e1c835682c3aafe8e7e084e4088949f73157fce7e4f719ce2d8a1d25c912dadf1876843b560e8a73cdbd61d8397a0580e65ff32f048275ca5f96ea9ba660c4b8ce88dd2a7d363bd71edda1681b52d8e760e8261afdd353202fef529d311ab714cf5ef60985ac1ed44d13a56bbf51fd6e96de813954f53cdd5e8f937805a8be78ca098bc64f5bc8c7f700175062327bf0b45f400b260962c762267a90705352d254c5b", 0x1000, 0x4000004, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='com.apple.system.Security\x00', &(0x7f0000000140)=""/148, 0x94) r1 = msgget$private(0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) r3 = fcntl$getown(r2, 0x9) msgctl$IPC_SET(r1, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) msgsnd(r1, &(0x7f00000012c0)=ANY=[], 0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) [ 369.175229][T14407] BPF:size=4 vlen=0 [ 369.207286][T14434] BPF: Invalid name_offset:14 [ 369.220380][T14407] BPF: [ 369.245758][T14407] BPF:Invalid name [ 369.270804][T14434] BPF: Invalid name_offset:14 [ 369.289743][T14407] BPF: [ 369.289743][T14407] 20:06:52 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100026c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:52 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x60ffffffffff, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0xffff, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 20:06:52 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) pipe2(&(0x7f00000000c0), 0x800) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) sendto$netrom(r2, &(0x7f0000000140)="066c34a8d750e0e84d9a2bc2b1819e0420a14381cf978596f7ce191466841387360ef86abc2de74b8f8e9cbcbfbcc120d324182d8dd6aac3e4ee8db59269bfaf277e5441ca428841e8de7ee19b604e14226a61a1871a36f4319bf78439e8273410bc0cf5c0c0a8253cc483f1000a3f3f141b88ef2af8a2ce7bfbfa96530a467b526c7fdc5290cd", 0x87, 0x0, &(0x7f0000000000)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x4}, [@null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default]}, 0x48) [ 369.482104][T14447] BPF: Invalid name_offset:14 [ 369.523807][T14450] BPF: Invalid name_offset:14 [ 369.545243][T14454] BPF:[1] ENUM [ 369.574460][T14454] BPF:size=4 vlen=0 [ 369.610021][T14454] BPF: [ 369.629887][T14454] BPF:Invalid name 20:06:52 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100036c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 369.652443][T14454] BPF: [ 369.652443][T14454] 20:06:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 369.706191][T14454] BPF:[1] ENUM [ 369.722486][T14454] BPF:size=4 vlen=0 [ 369.767397][T14454] BPF: 20:06:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/234, 0x4}, 0x20) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) [ 369.788926][T14454] BPF:Invalid name [ 369.800050][T14468] BPF: Invalid name_offset:14 [ 369.818301][T14454] BPF: [ 369.818301][T14454] 20:06:52 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x790000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 369.860085][T14468] BPF: Invalid name_offset:14 [ 369.991924][T14478] BPF:[1] ENUM [ 370.009452][T14478] BPF:size=4 vlen=0 [ 370.057173][T14478] BPF: 20:06:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:06:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) sendmsg$IPSET_CMD_ADD(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x58, 0x9, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x28, 0x7, 0x0, 0x1, [@IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x7}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x41}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0xc013}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x5}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x14) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:06:53 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100046c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:53 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) [ 370.083063][T14478] BPF:Invalid name [ 370.102049][T14478] BPF: [ 370.102049][T14478] 20:06:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x7, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @private1}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r5, 0x6}, 0x8) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 370.166850][T14478] BPF:[1] ENUM [ 370.196938][T14490] BPF: Invalid name_offset:14 [ 370.205355][T14478] BPF:size=4 vlen=0 [ 370.214999][T14478] BPF: [ 370.241701][T14490] BPF: Invalid name_offset:14 [ 370.246826][T14478] BPF:Invalid name 20:06:53 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100056c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 370.283256][T14478] BPF: [ 370.283256][T14478] 20:06:53 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7fffffffefff, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 370.475190][T14510] BPF:[1] ENUM [ 370.491036][T14510] BPF:size=4 vlen=0 [ 370.510275][T14512] BPF: Invalid name_offset:14 [ 370.515150][T14510] BPF: [ 370.533076][T14510] BPF:Invalid name [ 370.570330][T14510] BPF: [ 370.570330][T14510] [ 370.608148][T14510] BPF:[1] ENUM [ 370.647682][T14510] BPF:size=4 vlen=0 [ 370.676088][T14510] BPF: [ 370.699745][T14510] BPF:Invalid name 20:06:53 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb90000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 370.733268][T14510] BPF: [ 370.733268][T14510] 20:06:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000000)={0xd334, 0x20000800, 0xffffffffffffffff, 0x1, 0x2, 0x1, 0x1}, 0x10) msgctl$IPC_RMID(r0, 0x0) [ 370.878039][T14525] BPF:[1] ENUM [ 370.882211][T14525] BPF:size=4 vlen=0 [ 370.889587][T14525] BPF: [ 370.897601][T14525] BPF:Invalid name [ 370.908997][T14525] BPF: [ 370.908997][T14525] [ 370.927271][T14525] BPF:[1] ENUM [ 370.937285][T14525] BPF:size=4 vlen=0 [ 370.948791][T14525] BPF: [ 370.956924][T14525] BPF:Invalid name [ 370.965733][T14525] BPF: [ 370.965733][T14525] 20:06:54 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 371.133365][T14534] BPF:[1] ENUM 20:06:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000180)='/dev/md0\x00', 0x600, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000001c0)={0x2, 0xdb, 0x2, 0x0, 0x0, [{{r0}, 0x3}, {{r2}, 0x9}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000000800)={0x0, 0x9, &(0x7f0000000400)={&(0x7f0000000000)={0x3c, r4, 0x536ae464467e3e0b, 0x0, 0x0, {0x5}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x3c, r4, 0x4, 0x70bd2c, 0x25dfdbff, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4841}, 0x40) r5 = msgget$private(0x0, 0xc6) msgctl$IPC_SET(r5, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f00000002c0)={0x43, 0x9, 0x2, {0x6, 0x1000, 0x55, 0x3, 0xff, 0x5, 0x7fffffff, 0x8, 0x8ec}}, 0x43) msgsnd(r5, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r5, 0x0) [ 371.155408][T14534] BPF:size=4 vlen=0 [ 371.178784][T14534] BPF: [ 371.196838][T14534] BPF:Invalid name [ 371.218707][T14534] BPF: [ 371.218707][T14534] [ 371.259466][T14534] BPF:[1] ENUM 20:06:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000010}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x8, 0x70bd2d, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1880}, 0x4000000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvram\x00', 0x50200, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(r3, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)={0x16c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x20, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x51885956}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6f8365aa}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x12fe65ff}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xd4, 0x8, 0x0, 0x1, [{0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x75}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1cb542a9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbb}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x431b95d3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x17db1799}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x50}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5d2968d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xed}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x40000000}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3fcac542}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc5}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x39}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x448adfcd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3473c6a9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4a97f0b}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x54, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x16c}, 0x1, 0x0, 0x0, 0x40}, 0x20004044) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r4, &(0x7f00000017c0), 0x3a8, 0x0) [ 371.282258][T14534] BPF:size=4 vlen=0 [ 371.308105][T14534] BPF: [ 371.326929][T14534] BPF:Invalid name [ 371.359494][T14534] BPF: [ 371.359494][T14534] 20:06:54 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x60740000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 371.500332][T14553] BPF:[1] ENUM [ 371.519077][T14553] BPF:size=4 vlen=0 [ 371.532611][T14553] BPF: [ 371.543048][T14553] BPF:Invalid name [ 371.546783][T14553] BPF: [ 371.546783][T14553] [ 371.551048][T14512] BPF: Invalid name_offset:14 [ 371.639087][T14553] BPF:[1] ENUM [ 371.661532][T14553] BPF:size=4 vlen=0 [ 371.680002][T14553] BPF: [ 371.690928][T14553] BPF:Invalid name [ 371.704986][T14553] BPF: [ 371.704986][T14553] 20:06:56 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100066c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:56 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xd0730000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:56 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) prlimit64(r0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01, 0xffffffffffffffff}}) msgsnd(r3, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r3, 0x0) 20:06:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0xaf, 0x6, 0xff, 0x9, 0x0, 0x6, 0x8c084, 0x5, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x90, 0x1, @perf_config_ext={0x7fffffff, 0x89c}, 0xaa27, 0x0, 0x2, 0x7, 0x4, 0xa50, 0xfff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 20:06:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 373.187054][T14581] BPF: Invalid name_offset:14 [ 373.190954][T14580] BPF:[1] ENUM [ 373.197854][T14580] BPF:size=4 vlen=0 [ 373.221732][T14580] BPF: [ 373.238363][T14580] BPF:Invalid name [ 373.241477][T14581] BPF: Invalid name_offset:14 [ 373.263899][T14580] BPF: [ 373.263899][T14580] 20:06:56 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100076c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r3, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 373.324782][T14580] BPF:[1] ENUM [ 373.329564][T14580] BPF:size=4 vlen=0 [ 373.339214][T14580] BPF: [ 373.345504][T14580] BPF:Invalid name [ 373.364078][T14580] BPF: [ 373.364078][T14580] 20:06:56 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xe0530000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:56 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e601007e6c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 373.464002][T14597] BPF: Invalid name_offset:14 20:06:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$IMADDTIMER(r2, 0x80044940, &(0x7f0000000000)=0x32) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x7, &(0x7f0000000000)=0x200, 0x4) bind$inet(r4, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_int(r5, 0x1, 0x2e, &(0x7f0000000140)=0xfffffffe, 0x30) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x11, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) getsockname$l2tp(r4, &(0x7f00000000c0)={0x2, 0x0, @empty}, &(0x7f00000001c0)=0x10) [ 373.584367][T14605] BPF:[1] ENUM [ 373.614788][T14605] BPF:size=4 vlen=0 [ 373.622006][T14608] BPF: Invalid name_offset:14 [ 373.644854][T14605] BPF: 20:06:56 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e601000025000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 373.680807][T14608] BPF: Invalid name_offset:14 [ 373.691707][T14605] BPF:Invalid name [ 373.719300][T14605] BPF: [ 373.719300][T14605] 20:06:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r3, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 373.792236][T14605] BPF:[1] ENUM [ 373.798095][T14605] BPF:size=4 vlen=0 [ 373.849011][T14605] BPF: [ 373.863447][T14605] BPF:Invalid name [ 373.879760][T14605] BPF: [ 373.879760][T14605] [ 373.895786][T14618] BPF: Invalid name_offset:14 [ 373.928891][T14618] BPF: Invalid name_offset:14 20:06:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:06:59 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfeffff00000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:59 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100002e000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r3, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:06:59 executing program 1: r0 = semget(0x0, 0x1, 0x0) semctl$SEM_INFO(r0, 0x4, 0x13, &(0x7f00000000c0)=""/4096) r1 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r1}, 0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) 20:06:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r1 = dup2(r0, r0) connect$netlink(r1, &(0x7f0000000080)=@unspec, 0xc) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r5 = dup2(r4, r4) connect$netlink(r5, &(0x7f0000000080)=@unspec, 0xc) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x2, 0x0, 0x4, 0x8, 0x1, {r2, r3/1000+60000}, {0x1, 0x8, 0x6, 0x2, 0x20, 0x0, "b8387b8a"}, 0x7f, 0x3, @fd, 0x3ff, 0x0, r5}) ioctl$MEDIA_REQUEST_IOC_QUEUE(r6, 0x7c80, 0x0) ioctl$HIDIOCGRAWNAME(r1, 0x80404804, &(0x7f0000000000)) r7 = msgget$private(0x0, 0x229) connect$netlink(0xffffffffffffffff, &(0x7f0000000080)=@unspec, 0xc) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f00000001c0)={0xffffffff, 0x1, 'client1\x00', 0xffffffff80000000, "cef56a7eb4aeaac5", "5c11ed90f030cbd03dfca32be8ccdff213d4308721ee4c7346cb317d19000cfb", 0x172, 0x2}) msgctl$IPC_SET(r7, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r7, &(0x7f00000002c0)=ANY=[@ANYBLOB="009eb729994e5ed1522cf3e9c3d0b741794e4b997cd6008192d2f866dd92b3b24f22b6d6dc884b95b54a05a9fcc99e46b30d234187e13c74f0b52a59fa927cb2bc851929fc7f8328fbc5b0ee480b5b0277302b068f6d9dfc40bc5900a0945d0f436c0752498ec2a3c24dad5685616bcabf41752436d9ef29615e188d183519d89d9e3076f728c6586feb21b822dca9b7ea3f3cca000f575cdffcac4283221fb162e37fbabb84ee7af910f404fe906484df94d7992039afa0c129f788ab953720cf18e3488691842fff2a84fb5cba9eacaa00"/219], 0x0, 0x0) msgctl$IPC_RMID(r7, 0x0) [ 376.304062][T14644] BPF: Invalid name_offset:14 [ 376.328177][T14644] BPF: Invalid name_offset:14 [ 376.339203][T14647] BPF:[1] ENUM [ 376.356349][T14647] BPF:size=4 vlen=0 [ 376.375763][T14647] BPF: 20:06:59 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100002f000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mlockall(0x5) r0 = msgget$private(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r1, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01, 0x0, r1}, 0x0, 0x0, 0x0, 0x3}) msgsnd(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r3 = dup2(r2, r2) getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f00000000c0)=0x2) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) accept$inet6(r3, &(0x7f0000000000), &(0x7f0000000040)=0x1c) ioctl$VIDIOC_G_SELECTION(r3, 0xc040565e, &(0x7f0000000200)={0xb, 0x2, 0x1, {0x8, 0x76e1, 0x8, 0x4}}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f00000001c0)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}, 0x1}) [ 376.414595][T14647] BPF:Invalid name [ 376.436200][T14647] BPF: [ 376.436200][T14647] 20:06:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180)={r3, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:06:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={r6, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={r6, 0xfffffff7}, 0x8) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000000)={&(0x7f0000ff3000/0x1000)=nil, 0x400, 0x1, 0x20, &(0x7f0000ff7000/0x2000)=nil, 0xfffff3c3}) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r7, &(0x7f00000017c0), 0x3a8, 0x0) getrusage(0x1, &(0x7f00000000c0)) [ 376.469304][T14647] BPF:[1] ENUM [ 376.535963][T14647] BPF:size=4 vlen=0 [ 376.546933][T14664] BPF: Invalid name_offset:14 [ 376.563608][T14647] BPF: [ 376.583017][T14647] BPF:Invalid name 20:06:59 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100005c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:06:59 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x100000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 376.615000][T14647] BPF: [ 376.615000][T14647] [ 376.750311][T14675] BPF: Invalid name_offset:14 [ 376.776967][T14675] BPF: Invalid name_offset:14 [ 376.839890][T14681] BPF:[1] ENUM [ 376.867636][T14681] BPF:size=4 vlen=0 [ 376.893876][T14681] BPF: [ 376.912404][T14681] BPF:Invalid name [ 376.940866][T14681] BPF: [ 376.940866][T14681] [ 376.991900][T14681] BPF:[1] ENUM [ 377.006788][T14681] BPF:size=4 vlen=0 [ 377.020800][T14681] BPF: [ 377.031570][T14681] BPF:Invalid name [ 377.048672][T14681] BPF: [ 377.048672][T14681] 20:07:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, 0x0) ppoll(&(0x7f0000001080)=[{}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, r0) tkill(r0, 0x15) 20:07:02 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c020000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180)={r3, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:07:02 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x200000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:02 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x3bf5c542, 0xc0640) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:07:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v1={0x1000000, [{0x5ada, 0x1ff}]}, 0xc, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) [ 379.407031][T14704] BPF:[1] ENUM [ 379.420902][T14704] BPF:size=4 vlen=0 [ 379.432950][T14707] BPF: Invalid name_offset:14 [ 379.440642][T14704] BPF: [ 379.456522][T14704] BPF:Invalid name 20:07:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180)={r3, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 379.477438][T14704] BPF: [ 379.477438][T14704] [ 379.489254][T14707] BPF: Invalid name_offset:14 20:07:02 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='U'], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 20:07:02 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c030000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 379.525472][T14704] BPF:[1] ENUM [ 379.544611][T14704] BPF:size=4 vlen=0 20:07:02 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 379.596420][T14704] BPF: [ 379.608127][T14704] BPF:Invalid name [ 379.625839][T14704] BPF: [ 379.625839][T14704] 20:07:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x15) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x6367, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r4, &(0x7f00000017c0), 0x3a8, 0x0) 20:07:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={r6, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={r6, 0xfffffff7}, 0x8) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000000)={&(0x7f0000ff3000/0x1000)=nil, 0x400, 0x1, 0x20, &(0x7f0000ff7000/0x2000)=nil, 0xfffff3c3}) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r7, &(0x7f00000017c0), 0x3a8, 0x0) getrusage(0x1, &(0x7f00000000c0)) [ 379.707074][T14724] BPF: Invalid name_offset:14 [ 379.738634][T14724] BPF: Invalid name_offset:14 [ 379.807449][T14734] BPF:[1] ENUM [ 379.825110][T14734] BPF:size=4 vlen=0 [ 379.851771][T14734] BPF: [ 379.879340][T14734] BPF:Invalid name [ 379.904788][T14734] BPF: [ 379.904788][T14734] [ 379.955490][T14734] BPF:[1] ENUM [ 379.983689][T14734] BPF:size=4 vlen=0 [ 380.013705][T14734] BPF: [ 380.035951][T14734] BPF:Invalid name [ 380.063369][T14734] BPF: [ 380.063369][T14734] 20:07:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, 0x0) ppoll(&(0x7f0000001080)=[{}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, r0) tkill(r0, 0x15) 20:07:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:07:05 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c040000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x68) r1 = perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4804c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) preadv(r4, &(0x7f00000023c0)=[{&(0x7f00000000c0)=""/97, 0x61}, {&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000140)=""/47, 0x2f}, {&(0x7f0000000240)=""/83, 0x53}, {&(0x7f00000002c0)=""/64, 0x40}, {&(0x7f0000000300)=""/51, 0x33}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/17, 0x11}, {&(0x7f0000002380)=""/45, 0x2d}], 0xa, 0xa2) ioctl$FBIOGET_FSCREENINFO(r2, 0x4602, &(0x7f0000002480)) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r5 = dup2(r3, r3) connect$netlink(r5, &(0x7f0000000080)=@unspec, 0xc) ioctl$DRM_IOCTL_AGP_INFO(r5, 0x80386433, &(0x7f0000000180)=""/166) readahead(r1, 0x0, 0x3f) 20:07:05 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x400000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={r6, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={r6, 0xfffffff7}, 0x8) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000000)={&(0x7f0000ff3000/0x1000)=nil, 0x400, 0x1, 0x20, &(0x7f0000ff7000/0x2000)=nil, 0xfffff3c3}) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r7, &(0x7f00000017c0), 0x3a8, 0x0) getrusage(0x1, &(0x7f00000000c0)) [ 382.493426][T14759] BPF:[1] ENUM [ 382.500098][T14759] BPF:size=4 vlen=0 [ 382.520893][T14762] BPF: Invalid name_offset:14 [ 382.530018][T14759] BPF: [ 382.551328][T14759] BPF:Invalid name 20:07:05 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c050000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 382.580219][T14762] BPF: Invalid name_offset:14 [ 382.592902][T14759] BPF: [ 382.592902][T14759] 20:07:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 382.635747][T14759] BPF:[1] ENUM [ 382.663901][T14759] BPF:size=4 vlen=0 20:07:05 executing program 1: r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) r3 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x2a0202) ioctl$VIDIOC_DV_TIMINGS_CAP(r3, 0xc0905664, &(0x7f00000001c0)={0x0, 0x0, [], @bt={0x200, 0x400, 0xffff, 0x4, 0x7fff, 0x0, 0x1, 0x4}}) fcntl$setsig(r1, 0xa, 0x12) r4 = dup2(r1, r2) tkill(r0, 0x15) move_pages(r0, 0x2, &(0x7f00000000c0)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil], &(0x7f0000000100)=[0xe9d6, 0xfffffff9, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) r5 = socket$alg(0x26, 0x5, 0x0) ioctl$SNDCTL_DSP_SETFMT(r4, 0xc0045005, &(0x7f0000000280)=0x3) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r5}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') connect$caif(r6, &(0x7f0000000040)=@util={0x25, "b9bcc47104a92bafc5c5a6e1d31e7524"}, 0x18) prctl$PR_GET_FP_MODE(0x2e) preadv(r6, &(0x7f00000017c0), 0x3a8, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) 20:07:05 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x500000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 382.687961][T14759] BPF: [ 382.704227][T14759] BPF:Invalid name [ 382.726594][T14759] BPF: [ 382.726594][T14759] [ 382.766464][T14777] BPF: Invalid name_offset:14 20:07:05 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c060000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 382.807347][T14777] BPF: Invalid name_offset:14 [ 382.911750][T14787] BPF:[1] ENUM 20:07:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$IMADDTIMER(r2, 0x80044940, &(0x7f0000000000)=0x32) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x7, &(0x7f0000000000)=0x200, 0x4) bind$inet(r4, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_int(r5, 0x1, 0x2e, &(0x7f0000000140)=0xfffffffe, 0x30) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x11, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) getsockname$l2tp(r4, &(0x7f00000000c0)={0x2, 0x0, @empty}, &(0x7f00000001c0)=0x10) [ 382.934920][T14787] BPF:size=4 vlen=0 [ 382.952965][T14791] BPF: Invalid name_offset:14 [ 382.965058][T14787] BPF: [ 382.968005][T14787] BPF:Invalid name [ 382.995773][T14791] BPF: Invalid name_offset:14 [ 383.011264][T14787] BPF: [ 383.011264][T14787] [ 383.060031][T14787] BPF:[1] ENUM [ 383.093296][T14787] BPF:size=4 vlen=0 [ 383.118704][T14787] BPF: [ 383.137216][T14787] BPF:Invalid name [ 383.162278][T14787] BPF: [ 383.162278][T14787] 20:07:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, 0x0) ppoll(&(0x7f0000001080)=[{}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, r0) tkill(r0, 0x15) 20:07:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:07:08 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c070000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:08 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x600000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$IMADDTIMER(r2, 0x80044940, &(0x7f0000000000)=0x32) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x7, &(0x7f0000000000)=0x200, 0x4) bind$inet(r4, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_int(r5, 0x1, 0x2e, &(0x7f0000000140)=0xfffffffe, 0x30) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x11, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) getsockname$l2tp(r4, &(0x7f00000000c0)={0x2, 0x0, @empty}, &(0x7f00000001c0)=0x10) [ 385.641900][T14817] BPF: Invalid name_offset:14 [ 385.651161][T14818] BPF:[1] ENUM [ 385.657285][T14818] BPF:size=4 vlen=0 [ 385.680483][T14820] BPF: Invalid name_offset:14 [ 385.687558][T14818] BPF: [ 385.712714][T14818] BPF:Invalid name 20:07:08 executing program 5: socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r3, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 385.737202][T14818] BPF: [ 385.737202][T14818] [ 385.792376][T14818] BPF:[1] ENUM 20:07:08 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c7e0000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 385.823533][T14818] BPF:size=4 vlen=0 20:07:09 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 385.862534][T14818] BPF: [ 385.865428][T14818] BPF:Invalid name [ 385.890396][T14818] BPF: [ 385.890396][T14818] [ 385.903699][T14835] BPF: Invalid name_offset:14 [ 385.943886][T14835] BPF: Invalid name_offset:14 20:07:09 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000300010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:09 executing program 5: socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r3, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:07:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1, 0x8, 0x81, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401, 0x5}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x1ff, 0x4) r3 = dup2(r2, r2) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000000)=0x6, &(0x7f0000000040)=0x1) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r5 = dup2(r4, r4) connect$netlink(r5, &(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfd, 0x100}, 0xc) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r7 = dup2(r6, r6) connect$netlink(r7, &(0x7f0000000080)=@unspec, 0xc) renameat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', r7, &(0x7f0000000140)='./file0\x00', 0x4) ioctl$PIO_UNIMAPCLR(r5, 0x4b68, &(0x7f00000000c0)={0x6, 0x6, 0x1000}) [ 386.057558][T14845] BPF:[1] ENUM [ 386.075847][T14845] BPF:size=4 vlen=0 [ 386.107221][T14845] BPF: [ 386.118667][T14849] BPF: Invalid name_offset:14 [ 386.124817][T14845] BPF:Invalid name [ 386.143311][T14845] BPF: [ 386.143311][T14845] [ 386.157376][T14849] BPF: Invalid name_offset:14 [ 386.190296][T14845] BPF:[1] ENUM [ 386.227806][T14845] BPF:size=4 vlen=0 [ 386.245809][T14845] BPF: [ 386.263824][T14845] BPF:Invalid name [ 386.285009][T14845] BPF: [ 386.285009][T14845] 20:07:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:07:11 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000500010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:11 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x800000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:11 executing program 5: socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r3, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:07:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) syncfs(r0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cefe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x41c1, 0x40004, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff80000000, 0xea80}, 0x448, 0x6, 0x0, 0x6, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x7, &(0x7f0000000000)=0x200, 0x4) bind$inet(r6, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000440)={@in6={{0xa, 0x0, 0x0, @private1={0xfc, 0x1, [], 0x1}, 0x1}}, 0x0, 0x40, 0x0, 0x0, "000000c5430000000000000000200051c5bf0000fdffffff0000002000000000000000ef05e518df04000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(r6, 0x0, 0x0, 0x200007fc, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000100), 0x4) r7 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ocfs2_control\x00', 0x200000, 0x0) setsockopt$inet_opts(r7, 0x0, 0xd, &(0x7f0000000400)="babe9f5da8b79ee3cf4e63e6", 0xc) recvmsg(r6, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x2100) recvfrom$l2tp(r6, &(0x7f0000000140)=""/151, 0x97, 0x1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={{r2, r3/1000+60000}, {r4, r5/1000+10000}}) 20:07:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 388.737074][T14877] BPF:[1] ENUM [ 388.753633][T14876] BPF: Invalid name_offset:14 [ 388.760120][T14877] BPF:size=4 vlen=0 [ 388.788665][T14877] BPF: [ 388.813331][T14877] BPF:Invalid name [ 388.848021][T14877] BPF: [ 388.848021][T14877] [ 388.894702][T14877] BPF:[1] ENUM 20:07:12 executing program 5: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r3, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:07:12 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa00000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)={'batadv0\x00', r3}) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r4, &(0x7f00000017c0), 0x3a8, 0x0) [ 388.917376][T14877] BPF:size=4 vlen=0 [ 388.922785][T14877] BPF: [ 388.926489][T14877] BPF:Invalid name [ 388.931861][T14877] BPF: [ 388.931861][T14877] 20:07:12 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000600010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 389.010094][T14897] BPF: Invalid name_offset:14 [ 389.023662][T14898] BPF: Invalid name_offset:14 [ 389.036143][T14896] BPF:[1] ENUM [ 389.062678][T14896] BPF:size=4 vlen=0 [ 389.088237][T14896] BPF: [ 389.107520][T14896] BPF:Invalid name [ 389.135452][T14896] BPF: [ 389.135452][T14896] 20:07:12 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000700010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:12 executing program 5: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r3, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 389.405002][T14913] BPF: Invalid name_offset:14 [ 389.443530][T14913] BPF: Invalid name_offset:14 20:07:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:07:14 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 20:07:14 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c007e00010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:14 executing program 5: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r3, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:07:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000180)='/dev/md0\x00', 0x600, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000001c0)={0x2, 0xdb, 0x2, 0x0, 0x0, [{{r0}, 0x3}, {{r2}, 0x9}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000000800)={0x0, 0x9, &(0x7f0000000400)={&(0x7f0000000000)={0x3c, r4, 0x536ae464467e3e0b, 0x0, 0x0, {0x5}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x3c, r4, 0x4, 0x70bd2c, 0x25dfdbff, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4841}, 0x40) r5 = msgget$private(0x0, 0xc6) msgctl$IPC_SET(r5, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0xee01}}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f00000002c0)={0x43, 0x9, 0x2, {0x6, 0x1000, 0x55, 0x3, 0xff, 0x5, 0x7fffffff, 0x8, 0x8ec}}, 0x43) msgsnd(r5, &(0x7f0000000100)=ANY=[@ANYBLOB='Q'], 0x0, 0x0) msgctl$IPC_RMID(r5, 0x0) [ 391.846612][T14934] BPF: Invalid name_offset:14 [ 391.859365][T14938] BPF:[1] ENUM [ 391.882314][T14938] BPF:size=4 vlen=0 [ 391.907664][T14934] BPF: Invalid name_offset:14 [ 391.948106][T14938] BPF: [ 391.981606][T14938] BPF:Invalid name 20:07:15 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000030000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 392.007054][T14938] BPF: [ 392.007054][T14938] 20:07:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x48, 0x3, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x4}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x4, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x3}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x7}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}]}, @NFT_MSG_DELOBJ={0x50, 0x14, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x1}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x9}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x7}]}, @NFT_MSG_DELTABLE={0x78, 0x2, 0xa, 0x5, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0xef79}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_FLAGS={0x8}]}, @NFT_MSG_DELSET={0x1c, 0xb, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x9}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0xfffffff9}]}], {0x14}}, 0x154}}, 0x4001) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="9f712cbc00000800040005000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x24000005) [ 392.054187][T14938] BPF:[1] ENUM [ 392.073804][T14938] BPF:size=4 vlen=0 20:07:15 executing program 5: socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r3, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:07:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x7, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @private1}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r5, 0x6}, 0x8) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 392.099037][T14938] BPF: [ 392.117697][T14938] BPF:Invalid name [ 392.149500][T14938] BPF: [ 392.149500][T14938] [ 392.158742][T14956] BPF: Invalid name_offset:14 20:07:15 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x470b000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 392.198819][T14956] BPF: Invalid name_offset:14 20:07:15 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000040000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 392.359175][T14975] BPF:[1] ENUM [ 392.429332][T14975] BPF:size=4 vlen=0 [ 392.430248][T14979] BPF: Invalid name_offset:14 [ 392.469052][T14975] BPF: [ 392.481223][T14979] BPF: Invalid name_offset:14 [ 392.515141][T14975] BPF:Invalid name [ 392.556648][T14975] BPF: [ 392.556648][T14975] [ 392.600246][T14975] BPF:[1] ENUM [ 392.633190][T14975] BPF:size=4 vlen=0 [ 392.652990][T14975] BPF: [ 392.671758][T14975] BPF:Invalid name [ 392.696074][T14975] BPF: [ 392.696074][T14975] 20:07:18 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000050000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:07:18 executing program 5: socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r3, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:07:18 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4800000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xac, r1, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xf}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x20}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0xa4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x27}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}]}, 0xac}, 0x1, 0x0, 0x0, 0x20004044}, 0x4000050) r2 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r2}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r3, r3) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) ioctl$KDSKBENT(r4, 0x4b47, &(0x7f0000000340)={0x3, 0x2, 0x2}) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) r7 = dup(r6) sendmsg$L2TP_CMD_SESSION_DELETE(r7, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2400a06}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x80, 0x0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x80}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x6}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @local}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010101}]}, 0x80}, 0x1, 0x0, 0x0, 0x80c1}, 0x2000c048) preadv(r5, &(0x7f00000017c0), 0x3a8, 0x0) 20:07:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x7, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @private1}}, 0x0, 0x40, 0x0, 0x0, "000000000000000000000000002000225f55d80700009b2a51c5bf0000fdffffff0000002000000000000000ef05e518df00000000000000000009000000000000000000000200"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x9ac42000}, 0x100) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r5, 0x6}, 0x8) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 394.963033][T15003] BPF:[1] ENUM [ 394.985875][T15003] BPF:size=4 vlen=0 [ 395.003608][T15003] BPF: [ 395.008175][T15009] BPF: Invalid name_offset:14 [ 395.018302][T15003] BPF:Invalid name [ 395.042752][T15003] BPF: [ 395.042752][T15003] 20:07:18 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000090000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 395.087834][T15009] BPF: Invalid name_offset:14 [ 395.089455][T15003] BPF:[1] ENUM [ 395.125866][T15003] BPF:size=4 vlen=0 20:07:18 executing program 5: socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r3, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 395.178043][T15003] BPF: [ 395.196965][T15003] BPF:Invalid name [ 395.225908][T15003] BPF: [ 395.225908][T15003] 20:07:18 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x480b000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 395.256064][T15028] BPF: Invalid name_offset:14 20:07:18 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c0000000a0000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 395.292979][T15028] BPF: Invalid name_offset:14 20:07:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) getsockopt$rose(r2, 0x104, 0x5, &(0x7f0000000000), &(0x7f0000000040)=0x4) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) [ 395.393987][T15036] BPF:[1] ENUM [ 395.411029][T15036] BPF:size=4 vlen=0 [ 395.434953][T15036] BPF: 20:07:18 executing program 5: socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r3, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 395.456622][T15036] BPF:Invalid name [ 395.470665][T15041] BPF: Invalid name_offset:14 [ 395.486286][T15036] BPF: [ 395.486286][T15036] [ 395.559815][T15036] BPF:[1] ENUM [ 395.580388][T15036] BPF:size=4 vlen=0 [ 395.605512][T15036] BPF: [ 395.622719][T15036] BPF:Invalid name [ 395.644752][T15036] BPF: [ 395.644752][T15036] 20:07:18 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x490b000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 395.809859][T15053] BPF:[1] ENUM [ 395.828466][T15053] BPF:size=4 vlen=0 [ 395.852130][T15053] BPF: [ 395.872188][T15053] BPF:Invalid name [ 395.897909][T15053] BPF: [ 395.897909][T15053] [ 395.939838][T15053] BPF:[1] ENUM [ 395.959070][T15053] BPF:size=4 vlen=0 [ 395.982745][T15053] BPF: [ 396.001261][T15053] BPF:Invalid name [ 396.029055][T15053] BPF: [ 396.029055][T15053] [ 396.162611][T15041] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 396.248485][T15066] BPF: Invalid name_offset:14 20:07:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080), 0x0, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:07:21 executing program 5: socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r3, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:07:21 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2100000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:07:21 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4a0b000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:21 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006cffffff1f0000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 398.051835][T15078] BPF:[1] ENUM [ 398.064886][T15078] BPF:size=4 vlen=0 [ 398.073391][T15083] BPF: Invalid name_offset:14 [ 398.087232][T15078] BPF: [ 398.097810][T15082] BPF:[1] ENUM [ 398.103977][T15083] BPF: Invalid name_offset:14 [ 398.112962][T15078] BPF:Invalid name [ 398.137062][T15078] BPF: [ 398.137062][T15078] 20:07:21 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c0000003f0000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 398.157385][T15082] BPF:size=4 vlen=0 [ 398.174437][T15078] BPF:[1] ENUM [ 398.191155][T15082] BPF: [ 398.196049][T15078] BPF:size=4 vlen=0 [ 398.217390][T15082] BPF:Invalid name [ 398.218647][T15078] BPF: [ 398.237323][T15078] BPF:Invalid name [ 398.254968][T15082] BPF: [ 398.254968][T15082] [ 398.265032][T15078] BPF: 20:07:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r5, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 398.265032][T15078] 20:07:21 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4b0b000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:21 executing program 5: socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r3, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 398.366720][T15097] BPF: Invalid name_offset:14 20:07:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 398.396425][T15097] BPF: Invalid name_offset:14 20:07:21 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c7fffffff0000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 398.448928][T15105] BPF:[1] ENUM [ 398.475709][T15105] BPF:size=4 vlen=0 [ 398.506798][T15105] BPF: [ 398.526683][T15105] BPF:Invalid name [ 398.566881][T15105] BPF: [ 398.566881][T15105] [ 398.616181][T15114] BPF: Invalid name_offset:14 [ 398.631338][T15105] BPF:[1] ENUM [ 398.672081][T15105] BPF:size=4 vlen=0 [ 398.677834][T15114] BPF: Invalid name_offset:14 [ 398.702735][T15105] BPF: [ 398.729617][T15105] BPF:Invalid name [ 398.758007][T15105] BPF: [ 398.758007][T15105] 20:07:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:07:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080), 0x0, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:07:24 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000200010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:07:24 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c00000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:07:24 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000300010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 401.174851][T15136] BPF: Invalid name_offset:14 [ 401.189843][T15140] BPF:[1] ENUM [ 401.203500][T15136] BPF: Invalid name_offset:14 [ 401.208787][T15140] BPF:size=4 vlen=0 20:07:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 401.277891][T15140] BPF: [ 401.304203][T15140] BPF:Invalid name 20:07:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 401.333764][T15140] BPF: [ 401.333764][T15140] [ 401.365146][T15151] BPF: Invalid name_offset:14 [ 401.380972][T15140] BPF:[1] ENUM [ 401.398724][T15140] BPF:size=4 vlen=0 [ 401.407096][T15151] BPF: Invalid name_offset:14 20:07:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 401.423344][T15140] BPF: 20:07:24 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000400010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 401.447650][T15140] BPF:Invalid name 20:07:24 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6000000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 401.484366][T15140] BPF: [ 401.484366][T15140] 20:07:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 401.579491][T15165] BPF: Invalid name_offset:14 [ 401.613537][T15165] BPF: Invalid name_offset:14 [ 401.702133][T15175] BPF:[1] ENUM [ 401.727094][T15175] BPF:size=4 vlen=0 [ 401.755182][T15175] BPF: [ 401.775953][T15175] BPF:Invalid name [ 401.809243][T15175] BPF: [ 401.809243][T15175] [ 401.860206][T15175] BPF:[1] ENUM [ 401.877363][T15175] BPF:size=4 vlen=0 [ 401.901093][T15175] BPF: [ 401.916525][T15175] BPF:Invalid name [ 401.933738][T15175] BPF: [ 401.933738][T15175] 20:07:27 executing program 4: socket$alg(0x26, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000040)={0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="51d66d6c7073e41ff15e0c4ce1a330b3e0164eb069bb837a7416fbff6691420c54afc098a4548647d564f545618a6f", 0x2f, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000200)=@v1={0x0, @aes128, 0x2, "2dd531ae737147b7"}) keyctl$read(0xb, r2, &(0x7f00000001c0)=""/46, 0x2e) r3 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f00000001c0)='/dev/snd/controlC#\x00', 0xfffffffffffffffd) keyctl$unlink(0x9, r2, r3) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r4, &(0x7f00000017c0), 0x3a8, 0x0) 20:07:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080), 0x0, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:07:27 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000500010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:07:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:07:27 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6800000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 404.228697][T15194] BPF:[1] ENUM [ 404.234506][T15195] BPF: Invalid name_offset:14 [ 404.245079][T15194] BPF:size=4 vlen=0 [ 404.258837][T15195] BPF: Invalid name_offset:14 [ 404.274475][T15194] BPF: 20:07:27 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000600010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 404.296400][T15194] BPF:Invalid name [ 404.342821][T15194] BPF: [ 404.342821][T15194] 20:07:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 404.391230][T15194] BPF:[1] ENUM [ 404.409555][T15194] BPF:size=4 vlen=0 [ 404.428941][T15194] BPF: [ 404.457152][T15194] BPF:Invalid name 20:07:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r2 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) 20:07:27 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x687c030000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 404.479076][T15194] BPF: [ 404.479076][T15194] [ 404.523562][T15213] BPF: Invalid name_offset:14 [ 404.558950][T15213] BPF: Invalid name_offset:14 20:07:27 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000700010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:27 executing program 4: socket$alg(0x26, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000040)={0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="51d66d6c7073e41ff15e0c4ce1a330b3e0164eb069bb837a7416fbff6691420c54afc098a4548647d564f545618a6f", 0x2f, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000200)=@v1={0x0, @aes128, 0x2, "2dd531ae737147b7"}) keyctl$read(0xb, r2, &(0x7f00000001c0)=""/46, 0x2e) r3 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f00000001c0)='/dev/snd/controlC#\x00', 0xfffffffffffffffd) keyctl$unlink(0x9, r2, r3) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r4, &(0x7f00000017c0), 0x3a8, 0x0) 20:07:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 404.635831][T15220] BPF:[1] ENUM [ 404.655220][T15220] BPF:size=4 vlen=0 [ 404.688716][T15220] BPF: [ 404.701005][T15220] BPF:Invalid name [ 404.738225][T15220] BPF: [ 404.738225][T15220] [ 404.744948][T15228] BPF: Invalid name_offset:14 [ 404.809021][T15228] BPF: Invalid name_offset:14 [ 404.818220][T15220] BPF:[1] ENUM [ 404.875365][T15220] BPF:size=4 vlen=0 [ 404.931570][T15220] BPF: [ 404.953627][T15220] BPF:Invalid name [ 404.971321][T15220] BPF: [ 404.971321][T15220] 20:07:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:07:30 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c007e00010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) msgget$private(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xfffffffffffff000) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000000)) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) 20:07:30 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c00000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:07:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') r2 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}, 0x0, 0x0, 0x200000}, &(0x7f00000001c0)=0x9c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0)={r4, 0xcc, "2eda1a7d0f292311e0dca0abb86b4c67869f095abaa8fe84f7437f4a3766f073f9082c6525a42ea07207d604a212d857d94245341fb26a1837cdfcfb900ed70ce0b6f0b9fd6ed58c64f7b5c02f9f09ff9cb92c28f41011e07e09d2752407f668ece442581d775f71bc85ca29d21b45c837a5e8145905d2890385cf3d8efadfb7dbb8be51c131e3207cd057d69f5e8b9528dbaa1fb1508c538cb5e7e562982f6e9204e1717d6c523d473997f8c3accb9ef61044c57cf1bd0c07b86ef87d6a83d2ebfe0dd3849f6b73fef029ce"}, &(0x7f0000000000)=0xd4) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 407.312569][T15253] BPF: Invalid name_offset:14 [ 407.332112][T15254] BPF:[1] ENUM [ 407.346493][T15254] BPF:size=4 vlen=0 [ 407.351049][T15253] BPF: Invalid name_offset:14 20:07:30 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000003010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 407.383732][T15254] BPF: [ 407.387549][T15254] BPF:Invalid name [ 407.465122][T15254] BPF: [ 407.465122][T15254] [ 407.500578][T15254] BPF:[1] ENUM [ 407.519622][T15254] BPF:size=4 vlen=0 [ 407.531919][T15269] BPF: Invalid name_offset:14 [ 407.537853][T15254] BPF: 20:07:30 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000005010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r3 = dup2(r2, r2) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) setsockopt$ALG_SET_AEAD_AUTHSIZE(r3, 0x117, 0x5, 0x0, 0x6) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r1, r1) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) write$vhost_msg_v2(r4, &(0x7f0000000000)={0x2, 0x0, {&(0x7f00000000c0)=""/4096, 0x1000, &(0x7f00000010c0)=""/133, 0x3, 0x3}}, 0x48) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r5, &(0x7f00000017c0), 0x3a8, 0x0) [ 407.555283][T15254] BPF:Invalid name [ 407.566346][T15269] BPF: Invalid name_offset:14 [ 407.580308][T15254] BPF: [ 407.580308][T15254] 20:07:30 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7400000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) [ 407.714578][T15278] BPF: Invalid name_offset:14 [ 407.756030][T15278] BPF: Invalid name_offset:14 [ 407.761136][T15283] BPF:[1] ENUM [ 407.787203][T15283] BPF:size=4 vlen=0 [ 407.819908][T15283] BPF: [ 407.841777][T15283] BPF:Invalid name [ 407.859364][T15283] BPF: [ 407.859364][T15283] [ 407.890690][T15283] BPF:[1] ENUM [ 407.918360][T15283] BPF:size=4 vlen=0 [ 407.940699][T15283] BPF: [ 407.953985][T15283] BPF:Invalid name [ 407.971463][T15283] BPF: [ 407.971463][T15283] 20:07:33 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x15) 20:07:33 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000006010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r3 = dup2(r2, r2) connect$netlink(r3, &(0x7f0000000080)=@unspec, 0xc) setsockopt$ALG_SET_AEAD_AUTHSIZE(r3, 0x117, 0x5, 0x0, 0x6) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r4 = dup2(r1, r1) connect$netlink(r4, &(0x7f0000000080)=@unspec, 0xc) write$vhost_msg_v2(r4, &(0x7f0000000000)={0x2, 0x0, {&(0x7f00000000c0)=""/4096, 0x1000, &(0x7f00000010c0)=""/133, 0x3, 0x3}}, 0x48) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r5, &(0x7f00000017c0), 0x3a8, 0x0) 20:07:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:07:33 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7a00000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = dup2(r1, r1) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f00000000c0)={0x1, @output={0x1000, 0x1, {0x156, 0x10001}, 0x7f, 0x2}}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r3, &(0x7f0000001300)=[{&(0x7f0000001340)=""/209, 0xfffffffffffffcb6}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/51, 0xfffffffffffffe8f}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r5 = dup2(r4, r4) connect$netlink(r5, &(0x7f0000000080)=@unspec, 0xc) fsmount(r5, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$netlink(r6, &(0x7f0000000080)=@unspec, 0xc) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000000)=0x0) process_vm_readv(r7, &(0x7f0000002700)=[{&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000001440)=""/146, 0x92}, {&(0x7f0000001500)=""/185, 0xb9}, {&(0x7f00000015c0)=""/79, 0x4f}, {&(0x7f0000001640)=""/187, 0xbb}, {&(0x7f0000001700)=""/4096, 0x1000}], 0x6, &(0x7f0000004980)=[{&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000280)=""/50, 0x32}, {&(0x7f0000004780)=""/69, 0x45}, {&(0x7f0000004800)=""/26, 0x1a}, {&(0x7f0000004840)=""/55, 0x37}, {&(0x7f0000004880)=""/196, 0xc4}], 0x7, 0x0) [ 410.433182][T15305] BPF: Invalid name_offset:14 [ 410.461202][T15306] BPF:[1] ENUM [ 410.487086][T15306] BPF:size=4 vlen=0 [ 410.493518][T15305] BPF: Invalid name_offset:14 [ 410.519796][T15306] BPF: 20:07:33 executing program 2: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000007010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 410.544413][T15306] BPF:Invalid name 20:07:33 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x5, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:07:33 executing program 4 (fault-call:8 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0174000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, r4}}}}}}]}, 0x48}}, 0x0) [ 410.598684][T15306] BPF: [ 410.598684][T15306] [ 410.636184][T15306] BPF:[1] ENUM 20:07:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f00000001c0)=0x9c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r4, 0xfff}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1004}, 0x4040000) 20:07:33 executing program 1 (fault-call:2 fault-nth:0): clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 410.665291][T15306] BPF:size=4 vlen=0 [ 410.666480][T15323] BPF:[1] ENUM [ 410.681192][T15323] BPF:size=4 vlen=0 [ 410.686711][T15323] BPF: [ 410.694916][T15323] BPF:Invalid name [ 410.698791][T15323] BPF: [ 410.698791][T15323] [ 410.708729][T15306] BPF: 20:07:33 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/219, 0x2c, 0xdb, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7e00000000000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000005004000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 410.717269][T15306] BPF:Invalid name [ 410.722267][T15306] BPF: [ 410.722267][T15306] [ 410.755539][T15327] BPF: Invalid name_offset:14 [ 410.759177][T15326] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 410.801845][T15327] BPF: Invalid name_offset:14 [ 410.818853][T15331] FAULT_INJECTION: forcing a failure. [ 410.818853][T15331] name failslab, interval 1, probability 0, space 0, times 0 [ 410.860044][T15335] BPF:[1] Invalid name_offset:7 [ 410.873415][T15340] BPF:[1] ENUM [ 410.886038][T15339] FAULT_INJECTION: forcing a failure. [ 410.886038][T15339] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 410.887211][T15331] CPU: 1 PID: 15331 Comm: syz-executor.4 Not tainted 5.8.0-rc4-next-20200710-syzkaller #0 [ 410.909393][T15331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.919450][T15331] Call Trace: [ 410.922753][T15331] dump_stack+0x18f/0x20d [ 410.927095][T15331] should_fail.cold+0x5/0x14 [ 410.931699][T15331] should_failslab+0x5/0xf [ 410.936124][T15331] slab_pre_alloc_hook.constprop.0+0xf4/0x1f0 [ 410.942203][T15331] kmem_cache_alloc_node+0x58/0x3e0 [ 410.947442][T15331] __alloc_skb+0x71/0x550 [ 410.951861][T15331] netlink_sendmsg+0x94f/0xd90 [ 410.956637][T15331] ? netlink_unicast+0x7d0/0x7d0 [ 410.961592][T15331] ? netlink_unicast+0x7d0/0x7d0 [ 410.966591][T15331] sock_sendmsg+0xcf/0x120 [ 410.971010][T15331] ____sys_sendmsg+0x6e8/0x810 [ 410.975778][T15331] ? kernel_sendmsg+0x50/0x50 [ 410.980452][T15331] ? do_recvmmsg+0x6d0/0x6d0 [ 410.985050][T15331] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 410.991033][T15331] ? _parse_integer+0x132/0x180 [ 410.995892][T15331] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 411.001899][T15331] ___sys_sendmsg+0xf3/0x170 [ 411.006493][T15331] ? sendmsg_copy_msghdr+0x160/0x160 [ 411.011780][T15331] ? __fget_files+0x272/0x400 [ 411.012881][T15340] BPF:size=4 vlen=0 [ 411.016461][T15331] ? lock_downgrade+0x820/0x820 [ 411.016481][T15331] ? find_held_lock+0x2d/0x110 [ 411.029854][T15331] ? ksys_write+0x212/0x250 [ 411.034365][T15331] ? __fget_files+0x294/0x400 [ 411.039055][T15331] ? __fget_light+0xea/0x280 [ 411.043641][T15331] __sys_sendmsg+0xe5/0x1b0 [ 411.048138][T15331] ? __sys_sendmsg_sock+0xb0/0xb0 [ 411.053161][T15331] ? do_syscall_64+0x1c/0xe0 [ 411.054431][T15340] BPF: [ 411.057742][T15331] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 411.057766][T15331] do_syscall_64+0x60/0xe0 [ 411.070862][T15331] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 411.076746][T15331] RIP: 0033:0x45cba9 [ 411.080629][T15331] Code: Bad RIP value. [ 411.084688][T15331] RSP: 002b:00007f2f19033c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 411.093097][T15331] RAX: ffffffffffffffda RBX: 0000000000503800 RCX: 000000000045cba9 [ 411.093688][T15340] BPF:Invalid name [ 411.101062][T15331] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 411.101071][T15331] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 411.101079][T15331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 411.101086][T15331] R13: 0000000000000a6c R14: 00000000004cd48b R15: 00007f2f190346d4 [ 411.154606][T15339] CPU: 0 PID: 15339 Comm: syz-executor.1 Not tainted 5.8.0-rc4-next-20200710-syzkaller #0 [ 411.164517][T15339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.174571][T15339] Call Trace: [ 411.177868][T15339] dump_stack+0x18f/0x20d [ 411.182203][T15339] should_fail.cold+0x5/0x14 [ 411.186802][T15339] __alloc_pages_nodemask+0x1db/0x2a20 [ 411.192262][T15339] ? unwind_next_frame+0xe3b/0x1f90 [ 411.197464][T15339] ? lock_acquire+0x1f1/0xad0 [ 411.202141][T15339] ? ___perf_sw_event+0x121/0x550 [ 411.207164][T15339] ? find_held_lock+0x2d/0x110 [ 411.211929][T15339] ? ___perf_sw_event+0x345/0x550 [ 411.216961][T15339] ? warn_alloc+0x120/0x120 [ 411.221466][T15339] ? __lock_acquire+0x16e3/0x56e0 [ 411.226502][T15339] ? ___perf_sw_event+0x36c/0x550 [ 411.231540][T15339] ? mark_lock+0xbc/0x1710 [ 411.235966][T15339] alloc_pages_vma+0xdd/0x720 [ 411.240647][T15339] wp_page_copy+0xb8b/0x17d0 [ 411.245228][T15339] ? do_wp_page+0x699/0x1950 [ 411.249811][T15339] ? print_bad_pte+0x640/0x640 [ 411.254578][T15339] ? lock_downgrade+0x820/0x820 [ 411.259426][T15339] ? vm_normal_page+0x148/0x380 [ 411.264276][T15339] ? handle_mm_fault+0x2112/0x45e0 [ 411.269394][T15339] do_wp_page+0x6a1/0x1950 [ 411.273811][T15339] ? do_raw_spin_lock+0x120/0x2b0 [ 411.278831][T15339] ? finish_mkwrite_fault+0x6b0/0x6b0 [ 411.284206][T15339] ? rwlock_bug.part.0+0x90/0x90 [ 411.289139][T15339] ? do_page_mkwrite+0x530/0x530 [ 411.294082][T15339] handle_mm_fault+0x36fd/0x45e0 [ 411.299023][T15339] ? apply_to_existing_page_range+0x40/0x40 [ 411.304932][T15339] do_user_addr_fault+0x598/0xbf0 [ 411.309963][T15339] exc_page_fault+0xab/0x170 [ 411.314554][T15339] ? asm_exc_page_fault+0x8/0x30 [ 411.319495][T15339] asm_exc_page_fault+0x1e/0x30 [ 411.324342][T15339] RIP: 0033:0x401b5d [ 411.328222][T15339] Code: Bad RIP value. [ 411.332285][T15339] RSP: 002b:00007fa83199aa68 EFLAGS: 00010287 [ 411.338351][T15339] RAX: 0000000000000000 RBX: 000000000050b240 RCX: 0000000020001000 [ 411.346330][T15339] RDX: 0000000000000000 RSI: 0000000008100000 RDI: 000000000fa00300 [ 411.354302][T15339] RBP: 000000000078bf00 R08: 0000000000000000 R09: fe03f80fe03f80ff [ 411.362368][T15339] R10: 0000000020010288 R11: 0000000008100000 R12: 0000000000000003 [ 411.370339][T15339] R13: 0000000000000c55 R14: 00000000004ce97c R15: 00007fa83199b6d4 [ 411.402514][T15341] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 411.466134][T15340] BPF: [ 411.466134][T15340] [ 411.475663][T15339] syz-executor.1 invoked oom-killer: gfp_mask=0x0(), order=0, oom_score_adj=1000 [ 411.485772][T15339] CPU: 0 PID: 15339 Comm: syz-executor.1 Not tainted 5.8.0-rc4-next-20200710-syzkaller #0 [ 411.495665][T15339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.505728][T15339] Call Trace: [ 411.509022][T15339] dump_stack+0x18f/0x20d [ 411.513361][T15339] dump_header+0x106/0x60f [ 411.517781][T15339] out_of_memory.cold+0xf/0x182 [ 411.522632][T15339] ? rwlock_bug.part.0+0x90/0x90 [ 411.527572][T15339] ? do_page_mkwrite+0x530/0x530 [ 411.532510][T15339] ? mem_cgroup_size+0x50/0x50 [ 411.537284][T15339] ? oom_killer_disable+0x270/0x270 [ 411.542491][T15339] ? mutex_trylock+0x246/0x2c0 [ 411.547252][T15339] ? pagefault_out_of_memory+0xed/0x11c [ 411.552802][T15339] pagefault_out_of_memory+0x109/0x11c [ 411.558269][T15339] ? out_of_memory+0x1340/0x1340 [ 411.563227][T15339] mm_fault_error+0x123/0x380 [ 411.567909][T15339] do_user_addr_fault+0x5f8/0xbf0 [ 411.572943][T15339] exc_page_fault+0xab/0x170 [ 411.577547][T15339] ? asm_exc_page_fault+0x8/0x30 [ 411.582487][T15339] asm_exc_page_fault+0x1e/0x30 [ 411.587336][T15339] RIP: 0033:0x401b5d [ 411.591216][T15339] Code: Bad RIP value. [ 411.595277][T15339] RSP: 002b:00007fa83199aa68 EFLAGS: 00010287 [ 411.601342][T15339] RAX: 0000000000000000 RBX: 000000000050b240 RCX: 0000000020001000 [ 411.609318][T15339] RDX: 0000000000000000 RSI: 0000000008100000 RDI: 000000000fa00300 [ 411.617293][T15339] RBP: 000000000078bf00 R08: 0000000000000000 R09: fe03f80fe03f80ff [ 411.625402][T15339] R10: 0000000020010288 R11: 0000000008100000 R12: 0000000000000003 [ 411.633368][T15339] R13: 0000000000000c55 R14: 00000000004ce97c R15: 00007fa83199b6d4 [ 411.762963][T15339] Mem-Info: [ 411.766211][T15339] active_anon:336821 inactive_anon:4478 isolated_anon:0 [ 411.766211][T15339] active_file:6467 inactive_file:42278 isolated_file:0 [ 411.766211][T15339] unevictable:0 dirty:145 writeback:0 [ 411.766211][T15339] slab_reclaimable:20385 slab_unreclaimable:106591 [ 411.766211][T15339] mapped:60171 shmem:4696 pagetables:13229 bounce:0 [ 411.766211][T15339] free:971584 free_pcp:707 free_cma:0 [ 411.857140][T15339] Node 0 active_anon:1347584kB inactive_anon:16712kB active_file:25728kB inactive_file:169112kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:240684kB dirty:580kB writeback:0kB shmem:17584kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 1253376kB writeback_tmp:0kB kernel_stack:20704kB all_unreclaimable? no [ 411.890751][T15339] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:32kB all_unreclaimable? no [ 411.945689][T15339] Node 0 DMA free:10332kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:4096kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 411.981396][T15339] lowmem_reserve[]: 0 2515 2515 2515 2515 [ 412.000507][T15339] Node 0 DMA32 free:113292kB min:37964kB low:46940kB high:55916kB reserved_highatomic:0KB active_anon:1343488kB inactive_anon:16712kB active_file:25728kB inactive_file:169112kB unevictable:0kB writepending:580kB present:3129332kB managed:2578208kB mlocked:0kB pagetables:53064kB bounce:0kB free_pcp:2520kB local_pcp:1100kB free_cma:0kB [ 412.065648][T15339] lowmem_reserve[]: 0 0 0 0 0 [ 412.071795][T15339] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 412.104485][T15339] lowmem_reserve[]: 0 0 0 0 0 [ 412.109981][T15339] Node 1 Normal free:3761584kB min:53972kB low:67464kB high:80956kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 412.140308][T15339] lowmem_reserve[]: 0 0 0 0 0 [ 412.145008][T15339] Node 0 DMA: 1*4kB (U) 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 1*2048kB (M) 2*4096kB (M) = 10332kB [ 412.166665][T15339] Node 0 DMA32: 3806*4kB (UME) 2068*8kB (UME) 831*16kB (UME) 408*32kB (UME) 185*64kB (UME) 133*128kB (UME) 48*256kB (M) 23*512kB (M) 4*1024kB (M) 0*2048kB 0*4096kB = 115144kB [ 412.185681][T15339] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 412.197703][T15339] Node 1 Normal: 92*4kB (UME) 208*8kB (UME) 176*16kB (UME) 76*32kB (UME) 43*64kB (UME) 23*128kB (UM) 7*256kB (U) 4*512kB (UE) 1*1024kB (M) 2*2048kB (ME) 913*4096kB (M) = 3761584kB [ 412.215681][T15339] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 412.225312][T15339] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 412.234729][T15339] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 412.244335][T15339] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 412.253693][T15339] 50895 total pagecache pages [ 412.258347][T15339] 0 pages in swap cache [ 412.262558][T15339] Swap cache stats: add 0, delete 0, find 0/0 [ 412.268613][T15339] Free swap = 0kB [ 412.272402][T15339] Total swap = 0kB [ 412.276111][T15339] 1965979 pages RAM [ 412.279976][T15339] 0 pages HighMem/MovableOnly [ 412.284642][T15339] 349900 pages reserved [ 412.288778][T15339] 0 pages cma reserved [ 412.294321][T15339] Out of memory and no killable processes... [ 412.300377][T15339] Kernel panic - not syncing: System is deadlocked on memory [ 412.307738][T15339] CPU: 1 PID: 15339 Comm: syz-executor.1 Not tainted 5.8.0-rc4-next-20200710-syzkaller #0 [ 412.317599][T15339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.327651][T15339] Call Trace: [ 412.330923][T15339] dump_stack+0x18f/0x20d [ 412.335233][T15339] panic+0x2e3/0x75c [ 412.339119][T15339] ? __warn_printk+0xf3/0xf3 [ 412.343713][T15339] ? out_of_memory.cold+0x95/0x182 [ 412.348807][T15339] ? out_of_memory.cold+0x55/0x182 [ 412.353901][T15339] out_of_memory.cold+0xa6/0x182 [ 412.358817][T15339] ? rwlock_bug.part.0+0x90/0x90 [ 412.363749][T15339] ? do_page_mkwrite+0x530/0x530 [ 412.368677][T15339] ? mem_cgroup_size+0x50/0x50 [ 412.373437][T15339] ? oom_killer_disable+0x270/0x270 [ 412.378616][T15339] ? mutex_trylock+0x246/0x2c0 [ 412.383372][T15339] ? pagefault_out_of_memory+0xed/0x11c [ 412.388994][T15339] pagefault_out_of_memory+0x109/0x11c [ 412.394435][T15339] ? out_of_memory+0x1340/0x1340 [ 412.399372][T15339] mm_fault_error+0x123/0x380 [ 412.404056][T15339] do_user_addr_fault+0x5f8/0xbf0 [ 412.409091][T15339] exc_page_fault+0xab/0x170 [ 412.413664][T15339] ? asm_exc_page_fault+0x8/0x30 [ 412.418577][T15339] asm_exc_page_fault+0x1e/0x30 [ 412.423417][T15339] RIP: 0033:0x401b5d [ 412.427291][T15339] Code: Bad RIP value. [ 412.431332][T15339] RSP: 002b:00007fa83199aa68 EFLAGS: 00010287 [ 412.437378][T15339] RAX: 0000000000000000 RBX: 000000000050b240 RCX: 0000000020001000 [ 412.445427][T15339] RDX: 0000000000000000 RSI: 0000000008100000 RDI: 000000000fa00300 [ 412.453389][T15339] RBP: 000000000078bf00 R08: 0000000000000000 R09: fe03f80fe03f80ff [ 412.461349][T15339] R10: 0000000020010288 R11: 0000000008100000 R12: 0000000000000003 [ 412.469311][T15339] R13: 0000000000000c55 R14: 00000000004ce97c R15: 00007fa83199b6d4 [ 412.478605][T15339] Kernel Offset: disabled [ 412.483155][T15339] Rebooting in 86400 seconds..