rite(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x300}]}, 0x10) 12:44:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070003000000000004"]) 12:44:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000068280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1135.170991][T32458] BPF:Unsupported btf_header [ 1135.172201][T32456] BPF:Total section length too long [ 1135.193100][T32460] BPF:Unsupported btf_header [ 1135.390774][T32571] BPF:Unsupported btf_header 12:44:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0003000000000000070000000000000004"]) 12:44:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280500002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:28 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r3, 0x0, 0x2) sendfile(r3, r4, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r4, 0x2270, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(r4, 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r5, 0x0, 0x2) sendfile(r5, r6, 0x0, 0x20008) ioctl$KVM_GET_XSAVE(r5, 0x9000aea4, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) gettid() unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x400000, 0x0) getpeername$netrom(r7, &(0x7f0000001180)={{0x3, @null}, [@remote, @netrom, @null, @default, @rose, @remote, @rose, @bcast]}, &(0x7f0000000080)=0x48) [ 1135.421511][T32572] BPF:Unsupported btf_header 12:44:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000006c280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070005000000000004"]) 12:44:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000074280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1135.669868][T32586] BPF:Total section length too long [ 1135.689463][T32589] BPF:Unsupported btf_header [ 1135.756978][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 1135.756999][ T27] audit: type=1804 audit(1577709868.981:4846): pid=32585 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/37/bus" dev="sda1" ino=17843 res=1 [ 1135.830880][ T27] audit: type=1804 audit(1577709868.981:4847): pid=32585 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/37/bus" dev="sda1" ino=17843 res=1 12:44:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280600002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000007a280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1135.882553][ T27] audit: type=1804 audit(1577709868.981:4848): pid=32585 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/37/bus" dev="sda1" ino=17843 res=1 [ 1135.909118][T32700] BPF:Unsupported btf_header 12:44:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000300)={0x5, 0xfffffffffffffd67, 0x0, 0x5, 0x0, 0x80000000, 0x0, 0x2, 0x40, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x6b, 0x7, 0x6, 0x2, 0x1ff, 0x3, 0x8, 0x100, 0x5, 0x0, 0x6, 0x5a, 0x0, 0xfff, 0xe70, 0x0, 0x7, 0x40, 0x4, 0x0, 0xe4, 0x8, 0x8, 0x8, 0xffffffff, 0x0, 0x0, 0x7, @perf_config_ext={0x0, 0x1f}, 0x30404, 0x40, 0x3, 0x0, 0x20, 0x1}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fdatasync(0xffffffffffffffff) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000680)={0x3, 0x0, [0x3, 0xff, 0xff, 0x0, 0xffff]}) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="001d1e00028e87b1265a3c8fa0bde5a95912b9b49b0e5e970acda8aae806216c448119ed6e"], 0x1, 0x3) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000240)) fcntl$getownex(r1, 0x10, &(0x7f00000006c0)={0x0, 0x0}) rt_sigqueueinfo(r2, 0xb, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x800, 0x6a, 0x7}) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000600)='security.selinux\x00', 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r5 = ioctl$TIOCGPTPEER(r4, 0x5441, 0x8) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000000)={r7, @in, 0xa9}, 0x90) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000002c0)={r7, 0x1}, &(0x7f0000000380)=0x8) ioctl$TIOCSWINSZ(r5, 0x5414, &(0x7f0000000180)={0x3f, 0x9, 0x4, 0x9}) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_TXQLEN={0x8, 0xd, 0x5}]}, 0x30}}, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) gettid() socket$inet6_tcp(0xa, 0x1, 0x0) [ 1136.051058][ T27] audit: type=1804 audit(1577709869.101:4849): pid=32585 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/37/bus" dev="sda1" ino=17843 res=1 [ 1136.062894][T32708] BPF:Total section length too long [ 1136.261268][ T27] audit: type=1804 audit(1577709869.101:4850): pid=32699 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/37/bus" dev="sda1" ino=17843 res=1 [ 1136.300654][ T27] audit: type=1804 audit(1577709869.101:4851): pid=32585 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/37/bus" dev="sda1" ino=17843 res=1 [ 1136.320551][ T347] BPF:Unsupported btf_header [ 1136.356801][ T348] BPF:Unsupported btf_header [ 1136.520230][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:44:29 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x500}]}, 0x10) 12:44:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0004000000000000070000000000000004"]) 12:44:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070006000000000004"]) 12:44:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280700002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000f8280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1136.595537][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1136.621503][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1136.777385][ T468] BPF:Unsupported btf_header 12:44:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000020000280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280800002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070007000000000004"]) [ 1137.016272][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:44:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0005000000000000070000000000000004"]) [ 1137.105375][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1137.112937][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1137.136082][ T515] BPF:Unsupported btf_header 12:44:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000030000280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000282800002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:30 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r3 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r3}, &(0x7f0000000480)=0x0) timer_settime(r4, 0x0, &(0x7f0000000400), 0x0) timer_settime(r4, 0x2, &(0x7f0000000040)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000140)) timer_settime(r4, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x10000, 0x0) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x40, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000080)='./file0\x00', r6}, 0x10) ioctl$SNDRV_PCM_IOCTL_STATUS32(r5, 0x806c4120, &(0x7f0000000180)) getpgid(r0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r7 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x9, 0x109101) ioctl$EVIOCREVOKE(r7, 0x40044591, &(0x7f00000002c0)=0x5) unlink(&(0x7f0000000140)='./file0\x00') r8 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r9 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r8, 0x0, 0x2) sendfile(r8, r9, 0x0, 0x20008) setsockopt$CAIFSO_REQ_PARAM(r8, 0x116, 0x80, &(0x7f0000000300)="f0eebb411a0050d92c3496e47087f839fa5b1214749710dc8d615b1fcd0d4d19e006a0335c72868ce7a04e4ca89411ecec271a31d3ae6bd35d6b816d2b40b46d90c93d2814b9ff00ce079b3e1277f3c40399c4b7e236ca0a2a8b322aa7f19d468953581863854104e219b2ba13feaa9c57c24464f97769b9c7d66cc471349d8313f0a38724f0c857a92661b7138354623142abd8c881bf43bbcec6b2a8b32bb1812ab88ecfe55803027229dfb442a493bf709580b5837d0a9f306745f52e77c9e2a18f5e8122a01c46e0b34c95a46524f9022ce5026cfe69083cb62252195f411e2337", 0xe3) tkill(r0, 0x1000000000016) accept(0xffffffffffffffff, &(0x7f00000004c0)=@hci, &(0x7f0000000540)=0x80) [ 1137.391244][ T598] BPF:Unsupported btf_header [ 1137.478231][ T603] BPF:Total section length too long 12:44:30 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x600}]}, 0x10) 12:44:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000040000280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0006000000000000070000000000000004"]) 12:44:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000700ff000000000004"]) 12:44:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000282e00002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:31 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, &(0x7f0000000080)={0x1, "32658c192106ef6b9f5b33fc1d847ba70761164a4341caf0bd386c7d2970d78a"}) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) [ 1137.786568][ T724] BPF:Total section length too long [ 1137.790530][ T722] BPF:Unsupported btf_header 12:44:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000050000280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1137.842367][ T722] BPF:Unsupported btf_header 12:44:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000284800002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000060000280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0007000000000000070000000000000004"]) 12:44:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000100000004"]) [ 1138.096335][ T845] BPF:Unsupported btf_header [ 1138.103078][ T847] BPF:Total section length too long 12:44:31 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x40) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) [ 1138.466765][ T966] BPF:Unsupported btf_header 12:44:31 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x700}]}, 0x10) 12:44:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000284c00002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000070000280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:31 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x101000, 0x0) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000080)=0xd1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r5 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0x20008) ioctl$DRM_IOCTL_GET_MAGIC(r4, 0x80046402, &(0x7f00000001c0)=0x6) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000500)={r6, &(0x7f0000000480)=""/69}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000180)={r6, 0x1}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) 12:44:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0008000000000000070000000000000004"]) 12:44:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000200000004"]) 12:44:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000480000280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1138.876444][ T987] BPF:Unsupported btf_header [ 1138.895218][ T989] BPF:Total section length too long [ 1138.931348][ T27] audit: type=1804 audit(1577709872.151:4852): pid=986 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/42/bus" dev="sda1" ino=17859 res=1 [ 1139.037199][ T27] audit: type=1804 audit(1577709872.261:4853): pid=986 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/42/bus" dev="sda1" ino=17859 res=1 12:44:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000286000002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1139.180841][ T1107] BPF:Unsupported btf_header 12:44:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0010000000000000070000000000000004"]) 12:44:32 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) wait4(r0, 0x0, 0x20000000, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) 12:44:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000004c0000280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1139.201299][ T1110] BPF:Total section length too long [ 1139.215873][ T1109] BPF:Unsupported btf_header 12:44:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000286800002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1139.731340][ T1232] BPF:Total section length too long 12:44:33 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0xc00}]}, 0x10) 12:44:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000300000004"]) 12:44:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0028000000000000070000000000000004"]) 12:44:33 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00', 0x4}) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = dup3(r3, 0xffffffffffffffff, 0x80000) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r5, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000180)={r6, @in6={{0xa, 0x4e20, 0x8b61, @initdev={0xfe, 0x88, [], 0x8, 0x0}, 0xfffffff7}}, 0x4, 0x2, 0x7fffffff, 0x8001, 0x1}, &(0x7f0000000240)=0xffffffffffffffcc) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) 12:44:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000286c00002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1139.968640][ T1346] BPF:Total section length too long [ 1139.978670][ T1345] input: syz0 as /devices/virtual/input/input761 [ 1140.167338][ T1461] input: syz0 as /devices/virtual/input/input762 12:44:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000287400002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000400000004"]) 12:44:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0050000000000000070000000000000004"]) [ 1140.484986][ T1475] BPF:Total section length too long 12:44:33 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x90000, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00', 0x4}) ioctl$UI_DEV_CREATE(r4, 0x5501) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00', 0x4}) ioctl$UI_DEV_CREATE(r5, 0x5501) r6 = fcntl$dupfd(r4, 0x0, r5) fsconfig$FSCONFIG_SET_PATH(r3, 0x3, &(0x7f0000000080)='self\x00', &(0x7f0000000180)='./file0\x00', r6) 12:44:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000072449920400000004"]) [ 1140.753431][ T1594] input: syz0 as /devices/virtual/input/input763 [ 1140.794792][ T1589] input: syz0 as /devices/virtual/input/input764 [ 1140.917028][ T1589] input: syz0 as /devices/virtual/input/input765 [ 1140.928682][ T1598] input: syz0 as /devices/virtual/input/input766 [ 1141.557259][ T7985] tipc: TX() has been purged, node left! [ 1142.394123][ T7985] device bridge_slave_1 left promiscuous mode [ 1142.400399][ T7985] bridge0: port 2(bridge_slave_1) entered disabled state [ 1142.464541][ T7985] device bridge_slave_0 left promiscuous mode [ 1142.470818][ T7985] bridge0: port 1(bridge_slave_0) entered disabled state [ 1143.184123][ T7985] device hsr_slave_0 left promiscuous mode [ 1143.213775][ T7985] device hsr_slave_1 left promiscuous mode [ 1143.270617][ T7985] team0 (unregistering): Port device team_slave_1 removed [ 1143.281102][ T7985] team0 (unregistering): Port device team_slave_0 removed [ 1143.292041][ T7985] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1143.327801][ T7985] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1143.414575][ T7985] bond0 (unregistering): Released all slaves [ 1143.530506][ T1606] IPVS: ftp: loaded support on port[0] = 21 [ 1143.581242][ T1606] chnl_net:caif_netlink_parms(): no params data found [ 1143.654162][ T1606] bridge0: port 1(bridge_slave_0) entered blocking state [ 1143.661296][ T1606] bridge0: port 1(bridge_slave_0) entered disabled state [ 1143.672404][ T1606] device bridge_slave_0 entered promiscuous mode [ 1143.681266][ T1606] bridge0: port 2(bridge_slave_1) entered blocking state [ 1143.691544][ T1606] bridge0: port 2(bridge_slave_1) entered disabled state [ 1143.700608][ T1606] device bridge_slave_1 entered promiscuous mode [ 1143.727906][ T1606] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1143.739213][ T1606] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1143.763434][ T1606] team0: Port device team_slave_0 added [ 1143.772817][ T1606] team0: Port device team_slave_1 added [ 1143.865941][ T1606] device hsr_slave_0 entered promiscuous mode [ 1143.934071][ T1606] device hsr_slave_1 entered promiscuous mode [ 1144.003525][ T1606] bridge0: port 2(bridge_slave_1) entered blocking state [ 1144.010919][ T1606] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1144.018328][ T1606] bridge0: port 1(bridge_slave_0) entered blocking state [ 1144.025545][ T1606] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1144.061187][ T1606] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1144.073055][ T8163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1144.081998][ T8163] bridge0: port 1(bridge_slave_0) entered disabled state [ 1144.090052][ T8163] bridge0: port 2(bridge_slave_1) entered disabled state [ 1144.115558][ T1606] 8021q: adding VLAN 0 to HW filter on device team0 [ 1144.126083][ T9641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1144.135516][ T9641] bridge0: port 1(bridge_slave_0) entered blocking state [ 1144.142562][ T9641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1144.165783][T24523] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1144.174648][T24523] bridge0: port 2(bridge_slave_1) entered blocking state [ 1144.182206][T24523] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1144.192366][T24523] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1144.201882][T24523] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1144.216766][ T1606] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1144.228501][ T1606] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1144.241318][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1144.250631][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1144.260338][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1144.269485][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1144.284889][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1144.292296][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1144.303628][ T1606] 8021q: adding VLAN 0 to HW filter on device batadv0 12:44:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000600000280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000287a00002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0060000000000000070000000000000004"]) 12:44:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000500000004"]) 12:44:37 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) r4 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r5 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000300)) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0x20008) r6 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000200)={r4, r6, 0x1f, 0x59, &(0x7f0000000180)="45e8bc9307135edf6e54a7ecee638ffe0f85d39fb51751567ba5ddd720b771202569f91396c16d2f45cd8b7f150a6b72d126922c79dff84808927a0cb649eae0a80afb051ed22e32ec91a25d827da34421585ba07b2ef920bc", 0x43, 0xa4, 0x0, 0x5, 0x4, 0x1, 0xffff, 'syz0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x20200, 0x0) ioctl$TCGETS(r7, 0x5401, &(0x7f00000002c0)) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) 12:44:37 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0xf00}]}, 0x10) [ 1144.437540][ T1616] BPF:Unsupported btf_header [ 1144.560190][ T1630] BPF:Total section length too long [ 1144.606900][ T27] audit: type=1804 audit(1577709877.831:4854): pid=1629 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/46/bus" dev="sda1" ino=17884 res=1 12:44:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000680000280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028f800002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1144.659847][ T1736] BPF:Unsupported btf_header [ 1144.679543][ T1737] BPF:Unsupported btf_header 12:44:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000600000004"]) [ 1144.738968][ T27] audit: type=1804 audit(1577709877.961:4855): pid=1741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/46/bus" dev="sda1" ino=17884 res=1 [ 1144.831925][ T1747] BPF:Total section length too long [ 1144.885578][ T27] audit: type=1804 audit(1577709877.961:4856): pid=1629 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/46/bus" dev="sda1" ino=17884 res=1 [ 1144.933355][ T1865] BPF:Unsupported btf_header 12:44:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000006c0000280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:38 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x6, 0x402000) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x81000800}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000f7e6d8da71c7e5f65d91afad7a81d7654a472fc11b4ecb996d787c7fb947f91025e989e8455d71332c1bf0d864c5fa642808d75204bd26211ded78fce52453aff6ffc68b524cc5fcc6b256ad2656482b4ee596518c0e8bc4081cc7ac8dc65d6822aaf2895783691be566fb13f029073074c4c1d47ec811aeb8aa793b8f0014c4f12c347fab1faf247564", @ANYRES16=0x0, @ANYBLOB="200028bd7000fcdbdf25010000000000000001410000001400170000000100005a5e6574683a65716c00"], 0x30}, 0x1, 0x0, 0x0, 0x4080}, 0x20) r3 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') tkill(r0, 0x1000000000016) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') [ 1144.956781][ T1870] BPF:Unsupported btf_header 12:44:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280003002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0088000000000000070000000000000004"]) [ 1145.164342][ T1879] BPF:Unsupported btf_header 12:44:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000740000280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1145.224015][ T1881] BPF:Unsupported btf_header [ 1145.229455][ T1883] BPF:Total section length too long 12:44:38 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg(r2, &(0x7f00000016c0)={&(0x7f0000000040)=@ethernet={0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x47d91e9a1d233371}}, 0x80, &(0x7f0000001400)=[{&(0x7f0000000180)="04d117400e39d72745de4c4b5415d327b311765746a81336dbaba24a14b6de6f788442ff565cb80a79d1e165246130d94b1d137094a95b9df5910a3e40ce7c71ab8040cf8f4e6bf208608455c6cfa63fa0dd8b652e9f76dfc25548febc9d1cb2bb8cb85da5576755027126b9d26a804e333c9dc5d4d4b4171db15d344c522772087935fe700ab9b616f32cd24fc83bf7406721b5a2626888b0d538860bdd8c29c3bcac25", 0xa4}, {&(0x7f0000000240)="e7dbdd8b1c3eee7dc43bc8af071c410993", 0x11}, {&(0x7f0000000280)="b51d7dd2d1b421cf0498d1c0ec1211996aeb7fd721768a82770ccd2ffa16cc93279314f5565027486f00533e371236a10896b082d4c609f147421665fe5a6a5f28151bae8f3fafb2ae51f0b7d9b9484ed482140a7d40b1897ec07899f73beb1abc371ae019532fed8b7fcdb3b7be0797ea762f87c51f4806ea07d8f356", 0x7d}, {&(0x7f0000000300)="bcfe74a364ad03373fb4b5cdc20d1ea8982282cb398f2ca5b07c4256abe6b4b08d1e5546cae0b793e13e90afd4e17564a0e961463823f077c734e671230905156cc2d47b49614ad54a596f343324a75dd88e28a7413bdb4f4b0726dbe7f8b1b83d878228df709abda8317a6ba2535cb8d9bd3b6e97497e7621c0b1ed9757badf4f80081273770ab3c39239755ade6dba44aa3fa759409c49d8b42d74a9e58befa03de3624b832126367fa8f622c467f21d9b4a06fe16207da5698fc9ed4658e25b042f5859ae279ac2e381834ed48e2a8f87bd92f35d4426250b43fee03697181e836a8020dc2b3e347e27a8f9a6eebc22e3a0", 0xf3}, {&(0x7f0000000400)="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", 0x1000}], 0x5, &(0x7f0000001480)=[{0x50, 0x115, 0x63a2, "e02221dec03cba7532964ff042edf33e6deb3ab3d19ef5d23672a1f08d170c6f430f8efa4ff5bfeddc1bb11eaedc29697ca753fc50492bc3fd4f3c3546ec"}, {0xb8, 0x15, 0x0, "6f7338bc997a771b76b9283bef34a017c86a7bf0200e324a8e0ad293e89a870ef4c90afbc0a76450df212427bb28989708e6a20e82f94de954fb6d347e4a31e5c9e9c605764e93dd1d0fade969dce8fe033ce4cd698ce61830a452aa12073472aab10c6bcca55cd218dd0a41975aa87b5376747f260e8e39928a33b37c648bb9b68a770bd66cbba13d58a5ba3060fa50cd5c2dc398e0de35187fb7651bafbaa8b3718fcc"}, {0xe8, 0x100, 0x1, "18eb35a809f5b51084f3823d93098d77276c93eeb5f3955c49cfabcd39097ca11978f4243592bc8417a823de884caf2d131b09046774266849b5468e5113397fd3a0b915e0ab60ee3e62e04896817779923edcb17e175dc53e2cc2e1dd35523b9261d94cc6775438b4578e193bb531c005e552018f0abd492689917771c39cec489d24da84054a828565dac7b838aa3e16efc003457ae67064837b2adfa739ff86fe6d2288af9c9e52ebbdaef43417f01cc3284077c760cc7561e990c9df5abcc8e50fd51df8efbd04f6a0dbadd78d12d40bd1"}, {0x38, 0x0, 0x1, "20d77791393bfbaf4a77fc15ffe7bf0d9460f6663a52f0a4c217b3faeb741f32bf6c389bf3d6"}], 0x228}, 0x20080a0) r3 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000001700)=""/216, &(0x7f0000001800)=0xd8) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) 12:44:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000700000004"]) 12:44:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000007a0000280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1145.357567][ T1994] BPF:Unsupported btf_header [ 1145.376988][ T1995] BPF:Unsupported btf_header 12:44:38 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x1400}]}, 0x10) 12:44:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280005002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000f80000280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1145.634956][ T2013] BPF:Unsupported btf_header [ 1145.683775][ T2016] BPF:Total section length too long 12:44:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280006002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000800000004"]) 12:44:39 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = getpid() ptrace(0x10, r3) ptrace$getsig(0x2, r3, 0xffffffffff600043, &(0x7f0000000000)) r4 = getpgid(r3) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00', 0x4}) ioctl$UI_DEV_CREATE(r5, 0x5501) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r7 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r6, 0x0, 0x2) sendfile(r6, r7, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r7, 0x2270, 0x0) kcmp$KCMP_EPOLL_TFD(r4, 0xffffffffffffffff, 0x7, r5, &(0x7f0000000040)={r7, r2, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) 12:44:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000030000000000070000000000000004"]) [ 1145.897673][ T2125] BPF:Unsupported btf_header [ 1145.946795][ T2126] BPF:Unsupported btf_header 12:44:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000300280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1145.971854][ T2131] input: syz0 as /devices/virtual/input/input767 [ 1146.040946][ T27] audit: type=1804 audit(1577709879.261:4857): pid=2131 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/49/bus" dev="sda1" ino=16561 res=1 [ 1146.058814][ T2140] BPF:Total section length too long [ 1146.200719][ T2249] BPF:Unsupported btf_header [ 1146.206508][ T27] audit: type=1804 audit(1577709879.401:4858): pid=2248 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/49/bus" dev="sda1" ino=16561 res=1 12:44:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280007002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000500280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1146.247743][ T2251] BPF:Unsupported btf_header 12:44:39 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00', 0x4}) write$9p(0xffffffffffffffff, &(0x7f0000000080), 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000040)={0x4, 0x7, 0x3, 0x102, 0x7}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) [ 1146.418990][ T2258] BPF:Total section length too long [ 1146.479146][ T2261] input: syz0 as /devices/virtual/input/input769 12:44:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000050000000000070000000000000004"]) 12:44:39 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x1500}]}, 0x10) 12:44:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000007c020660b00000004"]) 12:44:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280020002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1146.665153][ T2363] input: syz0 as /devices/virtual/input/input770 12:44:40 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x80, 0x0) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r3, 0x2270, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r5 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r5, 0x2270, 0x0) write$FUSE_WRITE(r5, &(0x7f0000000080)={0x18, 0x0, 0x6, {0x5}}, 0x18) creat(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r6, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00', 0x4}) ioctl$UI_DEV_CREATE(r6, 0x5501) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x20) 12:44:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070492492400000004"]) 12:44:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000060000000000070000000000000004"]) [ 1146.923268][ T2379] BPF:Total section length too long [ 1146.992961][ T27] audit: type=1804 audit(1577709880.211:4859): pid=2386 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/51/bus" dev="sda1" ino=16498 res=1 [ 1147.046970][ T2386] input: syz0 as /devices/virtual/input/input771 [ 1147.099599][ T27] audit: type=1804 audit(1577709880.211:4860): pid=2386 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/51/bus" dev="sda1" ino=16498 res=1 [ 1147.140990][ T27] audit: type=1804 audit(1577709880.241:4861): pid=2386 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/51/bus" dev="sda1" ino=16498 res=1 [ 1147.214888][ T2386] input: syz0 as /devices/virtual/input/input772 12:44:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280028002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1147.263128][ T27] audit: type=1804 audit(1577709880.361:4862): pid=2386 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/51/bus" dev="sda1" ino=16498 res=1 12:44:40 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r1 = gettid() r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r1, 0x1000000000016) 12:44:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000070000000000070000000000000004"]) [ 1147.385418][ T27] audit: type=1804 audit(1577709880.391:4863): pid=2493 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/51/bus" dev="sda1" ino=16498 res=1 [ 1147.953759][ T844] tipc: TX() has been purged, node left! [ 1148.874787][ T844] device bridge_slave_1 left promiscuous mode [ 1148.881022][ T844] bridge0: port 2(bridge_slave_1) entered disabled state [ 1148.944423][ T844] device bridge_slave_0 left promiscuous mode [ 1148.950661][ T844] bridge0: port 1(bridge_slave_0) entered disabled state [ 1149.624294][ T844] device hsr_slave_0 left promiscuous mode [ 1149.673798][ T844] device hsr_slave_1 left promiscuous mode [ 1149.730517][ T844] team0 (unregistering): Port device team_slave_1 removed [ 1149.740836][ T844] team0 (unregistering): Port device team_slave_0 removed [ 1149.751222][ T844] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1149.797149][ T844] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1149.865154][ T844] bond0 (unregistering): Released all slaves [ 1149.970913][ T2627] IPVS: ftp: loaded support on port[0] = 21 [ 1150.022677][ T2627] chnl_net:caif_netlink_parms(): no params data found [ 1150.048880][ T2627] bridge0: port 1(bridge_slave_0) entered blocking state [ 1150.056153][ T2627] bridge0: port 1(bridge_slave_0) entered disabled state [ 1150.064273][ T2627] device bridge_slave_0 entered promiscuous mode [ 1150.071733][ T2627] bridge0: port 2(bridge_slave_1) entered blocking state [ 1150.079171][ T2627] bridge0: port 2(bridge_slave_1) entered disabled state [ 1150.087531][ T2627] device bridge_slave_1 entered promiscuous mode [ 1150.159683][ T2627] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1150.170483][ T2627] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1150.197771][ T2627] team0: Port device team_slave_0 added [ 1150.205337][ T2627] team0: Port device team_slave_1 added [ 1150.276468][ T2627] device hsr_slave_0 entered promiscuous mode [ 1150.354057][ T2627] device hsr_slave_1 entered promiscuous mode [ 1150.430241][ T2627] bridge0: port 2(bridge_slave_1) entered blocking state [ 1150.437408][ T2627] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1150.444684][ T2627] bridge0: port 1(bridge_slave_0) entered blocking state [ 1150.451784][ T2627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1150.498840][ T2627] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1150.511477][ T8163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1150.523870][ T8163] bridge0: port 1(bridge_slave_0) entered disabled state [ 1150.531981][ T8163] bridge0: port 2(bridge_slave_1) entered disabled state [ 1150.547212][ T2627] 8021q: adding VLAN 0 to HW filter on device team0 [ 1150.567581][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1150.576746][ T9650] bridge0: port 1(bridge_slave_0) entered blocking state [ 1150.583838][ T9650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1150.607131][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1150.616306][ T9645] bridge0: port 2(bridge_slave_1) entered blocking state [ 1150.623381][ T9645] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1150.632342][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1150.641928][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1150.650893][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1150.662006][ T8163] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1150.673457][ T2627] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1150.685110][ T2627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1150.693383][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1150.708499][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1150.716470][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1150.727731][ T2627] 8021q: adding VLAN 0 to HW filter on device batadv0 12:44:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000600280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070b6620c000000004"]) 12:44:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028002e002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:44 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x1600}]}, 0x10) 12:44:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0036100000000000070000000000000004"]) 12:44:44 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='./file0\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) capget(&(0x7f0000000180)={0x20071026, r3}, &(0x7f00000001c0)={0x80000, 0x5, 0x2, 0x5, 0x2, 0x1}) tkill(r0, 0x1a) [ 1150.869665][ T2637] BPF:Unsupported btf_header [ 1150.935651][ T2648] BPF:Total section length too long [ 1150.994267][ T2667] capability: warning: `syz-executor.4' uses deprecated v2 capabilities in a way that may be insecure 12:44:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000700280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1151.117298][ T2765] BPF:Unsupported btf_header 12:44:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280048002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="002e110000000000070000000000000004"]) 12:44:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000007000000ff00000004"]) 12:44:44 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000000c0)={r4, @in6={{0xa, 0x4e22, 0x0, @remote, 0x1}}}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000040)={r4, 0x7}, 0x8) unlink(&(0x7f0000000140)='./file0\x00') r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r5, 0x0, 0x2) sendfile(r5, r6, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r6, 0x2270, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000000c0)={r7, @in6={{0xa, 0x4e22, 0x0, @remote, 0x1}}}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f0000000080)={0x400, 0x88a9ff2e25210ae6, 0x7, 0x5, r7}, &(0x7f0000000180)=0x10) tkill(r0, 0x1000000000016) r8 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r9 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r8, 0x0, 0x2) sendfile(r8, r9, 0x0, 0x20008) sendto$x25(r8, &(0x7f0000000200)="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", 0x1000, 0x1, &(0x7f0000001200)={0x9, @remote={[], 0x2}}, 0x12) [ 1151.387046][ T2777] BPF:Unsupported btf_header [ 1151.428741][ T2780] BPF:Unsupported btf_header 12:44:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000002000280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1151.455981][ T2785] BPF:Total section length too long [ 1151.539425][ T27] kauditd_printk_skb: 1 callbacks suppressed [ 1151.539449][ T27] audit: type=1804 audit(1577709884.761:4865): pid=2893 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/54/bus" dev="sda1" ino=17105 res=1 12:44:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000004800280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1151.615415][ T2896] BPF:Unsupported btf_header 12:44:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028004c002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1151.660034][ T27] audit: type=1804 audit(1577709884.811:4866): pid=2787 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/54/bus" dev="sda1" ino=17105 res=1 12:44:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000005"]) [ 1151.806274][ T2907] BPF:Total section length too long [ 1151.866880][ T27] audit: type=1804 audit(1577709884.821:4867): pid=2787 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/54/bus" dev="sda1" ino=17105 res=1 [ 1151.874761][ T2991] BPF:Unsupported btf_header 12:44:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000004c00280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000280000000000070000000000000004"]) 12:44:45 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x1800}]}, 0x10) 12:44:45 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x10000) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000080)={0x20, 0xfffffff9, 0x80000000, 0x100}) r1 = gettid() r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r1, 0x1000000000016) 12:44:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280060002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000006000280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1152.198759][ T3031] BPF:Unsupported btf_header [ 1152.207340][ T3033] BPF:Total section length too long 12:44:45 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x7, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040)="fc60de57ae5d3aefa38fd876610b5425b30784a86eccf0dbc2fd4c1ca753de7f1bbf1d79c83fd889e5b4f5b97f45220d8de7e40203b43151dfe1958f11701d49ec72f560232db6b6625d62c21552b8ec6b08bb1f15b4f40498", &(0x7f0000000180)="dd0b660ce5e21564556ab3865a0b8bf6f37ae720ee0495fef53e1b8174e8250db1149d73c9d551b7a2096284e1dcb1778f4d1c89f13f0130f43910be2131cce41c51c2c7bad2b4f25a9eaca4d1430bfb6e1f9287ed5c55c1007ab9076c65e3918b554d9deb3f37f9db770cf3e799d9d05e32a570bc461daddb39da2fd811c5ad48a85a62debd0f59d9c39bb4c2eca27b79e6067050d896fe07e39cc73c78ae0fce810f061d940811434634d075f2e81ddd77d6f31e662069eef02fbfb6bcdf7cdf1d64a07a98b8675670d5498976bb4d0dcba877f237b2a91a3db8be0ce0f067875aa9d3fad05bac428f33"}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r3, 0x0, 0x2) sendfile(r3, r4, 0x0, 0x20008) setsockopt$ax25_int(r3, 0x101, 0x8, &(0x7f0000000280)=0x1, 0x4) 12:44:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0088290000000000070000000000000004"]) 12:44:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280068002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000006"]) [ 1152.489490][ T3149] BPF:Unsupported btf_header 12:44:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000006800280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1152.563780][ T3158] BPF:Total section length too long [ 1152.593056][ T27] audit: type=1804 audit(1577709885.811:4868): pid=3147 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/56/bus" dev="sda1" ino=17444 res=1 [ 1152.702596][ T27] audit: type=1804 audit(1577709885.871:4869): pid=3147 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir906452586/syzkaller.vq6aq5/56/bus" dev="sda1" ino=17444 res=1 12:44:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028006c002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:46 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x2, 0x2000, &(0x7f000002a000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e, 0x0, 0x0, 0x0, 0x400000000000, 0xfffffffffffffffe]}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x6}) 12:44:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000006c00280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1152.763880][ T3291] BPF:Unsupported btf_header [ 1152.965591][ T3306] BPF:Total section length too long [ 1153.003035][ T3312] BPF:Unsupported btf_header 12:44:46 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x1c00}]}, 0x10) 12:44:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00112e0000000000070000000000000004"]) 12:44:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a']) 12:44:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000007400280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:46 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="01"], 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x100000a) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 12:44:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000007a00280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280074002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1153.253993][ T3457] BPF:Unsupported btf_header [ 1153.270978][ T3458] BPF:Unsupported btf_header 12:44:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0010360000000000070000000000000004"]) [ 1153.497420][ T3474] BPF:Total section length too long [ 1153.537719][ T3478] BPF:Unsupported btf_header 12:44:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000f800280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1153.562150][ T3481] BPF:Unsupported btf_header 12:44:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\b']) 12:44:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028007a002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1153.798029][ T3590] BPF:Unsupported btf_header 12:44:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000320000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1153.850391][ T3591] BPF:Unsupported btf_header [ 1153.897491][ T3598] BPF:Total section length too long [ 1154.027726][ T3705] BPF:Unsupported btf_header 12:44:47 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x1d00}]}, 0x10) 12:44:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00003f0000000000070000000000000004"]) 12:44:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800f8002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000200280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1154.190987][ T3713] BPF:Total section length too long [ 1154.303267][ T3783] BPF:Unsupported btf_header 12:44:49 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000880)=@nat={'nat\x00', 0x19, 0x2, 0x348, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x2, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x3c0) 12:44:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000010"]) 12:44:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000400000000000070000000000000004"]) 12:44:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002e00000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000300280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:49 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x2000}]}, 0x10) 12:44:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000400280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1156.445457][ T3842] BPF:Unsupported btf_header [ 1156.456851][ T3846] BPF:Unsupported section found [ 1156.471970][ T3843] BPF:Unsupported btf_header 12:44:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000003600000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1156.631122][ T3966] BPF:Unsupported btf_header 12:44:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000500280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, &(0x7f00000002c0)=""/223, 0xdf, 0x0, 0x0, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/34, 0x22}], 0x1}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) readv(r6, &(0x7f0000000780)=[{&(0x7f0000000100)=""/246, 0xf6}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) shutdown(r4, 0x0) shutdown(r2, 0x0) 12:44:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000500000000000070000000000000004"]) [ 1156.822828][ T3978] BPF:Invalid section offset 12:44:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000012"]) 12:44:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000600280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1156.911322][ T4069] BPF:Unsupported btf_header 12:44:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280002002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1157.054209][ T4098] BPF:Total section length too long 12:44:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280003002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1157.196731][ T4207] BPF:Unsupported btf_header 12:44:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000700280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1157.229173][ T4209] BPF:Unsupported btf_header 12:44:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000600000000000070000000000000004"]) [ 1157.300265][ T4214] BPF:Total section length too long 12:44:50 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x2100}]}, 0x10) 12:44:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280004002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000004800280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00O']) [ 1157.470868][ T4322] BPF:Unsupported btf_header [ 1157.737837][ T4340] BPF:Unsupported btf_header 12:44:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x28}, {0x80000006}]}, 0x10) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 12:44:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00e3840000000000070000000000000004"]) 12:44:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000004c00280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1157.778480][ T4341] BPF:Unsupported btf_header 12:44:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000700000000000000ff"]) [ 1158.068700][ T4354] BPF:Unsupported btf_header 12:44:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000006000280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1158.090856][ T4356] BPF:Unsupported btf_header 12:44:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000880000000000070000000000000004"]) 12:44:51 executing program 4: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/82, 0x52}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @reserved="e677be268df09956bebaedc82b3e40bc6269067d74f2b724a8fbec20616226fc"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0xfffffffffffffe52, 0x0, 0xffffffffffffff8a}, 0x0) [ 1158.296560][ T4364] BPF:Unsupported btf_header 12:44:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000006800280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1158.317315][ T4365] BPF:Unsupported btf_header [ 1158.457667][ T4374] IPVS: ftp: loaded support on port[0] = 21 [ 1158.536922][ T4379] BPF:Unsupported btf_header 12:44:51 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x2400}]}, 0x10) [ 1158.873724][ T7982] tipc: TX() has been purged, node left! [ 1160.533757][ T7982] tipc: TX() has been purged, node left! [ 1161.188954][ T4395] IPVS: ftp: loaded support on port[0] = 21 [ 1161.260737][ T4395] chnl_net:caif_netlink_parms(): no params data found [ 1161.273403][ T7982] device bridge_slave_1 left promiscuous mode [ 1161.279780][ T7982] bridge0: port 2(bridge_slave_1) entered disabled state [ 1161.336859][ T7982] device bridge_slave_0 left promiscuous mode [ 1161.343073][ T7982] bridge0: port 1(bridge_slave_0) entered disabled state [ 1162.013929][ T7982] device hsr_slave_0 left promiscuous mode [ 1162.063923][ T7982] device hsr_slave_1 left promiscuous mode [ 1162.120360][ T7982] team0 (unregistering): Port device team_slave_1 removed [ 1162.131684][ T7982] team0 (unregistering): Port device team_slave_0 removed [ 1162.142630][ T7982] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1162.167846][ T7982] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1162.223956][ T7982] bond0 (unregistering): Released all slaves [ 1162.320627][ T4395] bridge0: port 1(bridge_slave_0) entered blocking state [ 1162.328000][ T4395] bridge0: port 1(bridge_slave_0) entered disabled state [ 1162.335970][ T4395] device bridge_slave_0 entered promiscuous mode [ 1162.343923][ T4395] bridge0: port 2(bridge_slave_1) entered blocking state [ 1162.351131][ T4395] bridge0: port 2(bridge_slave_1) entered disabled state [ 1162.359326][ T4395] device bridge_slave_1 entered promiscuous mode [ 1162.377245][ T4395] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1162.388198][ T4395] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1162.407046][ T4395] team0: Port device team_slave_0 added [ 1162.414224][ T4395] team0: Port device team_slave_1 added [ 1162.475972][ T4395] device hsr_slave_0 entered promiscuous mode [ 1162.524196][ T4395] device hsr_slave_1 entered promiscuous mode [ 1162.593819][ T4395] debugfs: Directory 'hsr0' with parent '/' already present! [ 1162.654247][ T4395] bridge0: port 2(bridge_slave_1) entered blocking state [ 1162.661310][ T4395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1162.702017][ T4395] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1162.717427][ T9645] bridge0: port 2(bridge_slave_1) entered disabled state [ 1162.730333][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1162.742247][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1162.754338][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1162.764802][ T4395] 8021q: adding VLAN 0 to HW filter on device team0 [ 1162.780123][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1162.789723][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1162.798579][ T9645] bridge0: port 1(bridge_slave_0) entered blocking state [ 1162.805683][ T9645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1162.826252][ T9641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1162.835388][ T9641] bridge0: port 2(bridge_slave_1) entered blocking state [ 1162.842421][ T9641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1162.852319][ T9641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1162.870059][ T4395] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1162.880995][ T4395] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1162.895147][T24523] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1162.903547][T24523] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1162.913089][T24523] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1162.923403][T24523] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1162.942681][ T4395] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1162.952440][ T9641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1162.961568][ T9641] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1162.969263][ T9641] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 12:44:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280005002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070002000000000004"]) 12:44:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000006c00280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:56 executing program 4: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000b40)=""/114, 0x72}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)="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"}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0xfd, 0x0, 0xfffffeb1}, 0x0) 12:44:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0029880000000000070000000000000004"]) 12:44:56 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x2500}]}, 0x10) [ 1163.118201][ T4405] BPF:Total section length too long [ 1163.218234][ T4413] IPVS: ftp: loaded support on port[0] = 21 [ 1163.248722][ T4415] BPF:Unsupported btf_header 12:44:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0084e30000000000070000000000000004"]) 12:44:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000007400280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1163.389798][ T4427] BPF:Total section length too long [ 1163.433348][ T4428] BPF:Total section length too long 12:44:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280006002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:56 executing program 4: [ 1163.557578][ T4436] BPF:Unsupported btf_header 12:44:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000007a00280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1163.590447][ T4437] BPF:Unsupported btf_header [ 1163.637787][ T4443] BPF:Total section length too long 12:44:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280007002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070003000000000004"]) 12:44:57 executing program 4: 12:44:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000f800280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1163.825655][ T4453] BPF:Unsupported btf_header [ 1163.991416][ T4466] BPF:Total section length too long 12:44:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280008002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1164.024227][ T4468] BPF:Total section length too long [ 1164.063847][ T7982] tipc: TX() has been purged, node left! 12:44:57 executing program 4: [ 1164.092449][ T4472] BPF:Unsupported btf_header [ 1164.143108][ T4473] BPF:Unsupported btf_header 12:44:57 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x2800}]}, 0x10) [ 1164.327170][ T4483] BPF:Total section length too long [ 1164.341336][ T4485] BPF:Total section length too long 12:44:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ff0000000000070000000000000004"]) 12:44:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000003280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070004000000000004"]) 12:44:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280028002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:57 executing program 4: [ 1164.552578][ T4495] BPF:Unsupported btf_header 12:44:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000005280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1164.625204][ T4501] BPF:Total section length too long 12:44:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028002e002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1164.802060][ T4509] BPF:Unsupported btf_header 12:44:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000006280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000fff0000000000070000000000000004"]) [ 1164.920036][ T4514] BPF:Total section length too long 12:44:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070005000000000004"]) [ 1164.960027][ T4515] BPF:Total section length too long 12:44:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280048002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1165.096613][ T4522] BPF:Unsupported btf_header [ 1165.134987][ T4523] BPF:Unsupported btf_header [ 1165.235599][ T4531] BPF:Total section length too long 12:44:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000007280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:44:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028004c002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:44:58 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x2c00}]}, 0x10) [ 1165.440805][ T4541] BPF:Unsupported btf_header 12:44:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000020280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1165.476983][ T4543] BPF:Unsupported btf_header [ 1165.525948][ T4549] BPF:Total section length too long [ 1165.557961][ T4550] BPF:Total section length too long 12:44:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280060002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1165.790161][ T4558] BPF:Unsupported btf_header [ 1165.927016][ T4564] BPF:Total section length too long [ 1165.957867][ T4565] BPF:Total section length too long [ 1166.823769][ T7982] tipc: TX() has been purged, node left! [ 1167.494265][ T7982] device bridge_slave_1 left promiscuous mode [ 1167.500455][ T7982] bridge0: port 2(bridge_slave_1) entered disabled state [ 1167.534414][ T7982] device bridge_slave_0 left promiscuous mode [ 1167.540712][ T7982] bridge0: port 1(bridge_slave_0) entered disabled state [ 1168.304026][ T7982] device hsr_slave_0 left promiscuous mode [ 1168.343967][ T7982] device hsr_slave_1 left promiscuous mode [ 1168.390481][ T7982] team0 (unregistering): Port device team_slave_1 removed [ 1168.401150][ T7982] team0 (unregistering): Port device team_slave_0 removed [ 1168.411577][ T7982] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1168.437039][ T7982] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1168.517889][ T7982] bond0 (unregistering): Released all slaves [ 1168.620897][ T4571] IPVS: ftp: loaded support on port[0] = 21 [ 1168.672117][ T4571] chnl_net:caif_netlink_parms(): no params data found [ 1168.702307][ T4571] bridge0: port 1(bridge_slave_0) entered blocking state [ 1168.712335][ T4571] bridge0: port 1(bridge_slave_0) entered disabled state [ 1168.720384][ T4571] device bridge_slave_0 entered promiscuous mode [ 1168.728370][ T4571] bridge0: port 2(bridge_slave_1) entered blocking state [ 1168.735557][ T4571] bridge0: port 2(bridge_slave_1) entered disabled state [ 1168.743356][ T4571] device bridge_slave_1 entered promiscuous mode [ 1168.815436][ T4571] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1168.826548][ T4571] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1168.846271][ T4571] team0: Port device team_slave_0 added [ 1168.852866][ T4571] team0: Port device team_slave_1 added [ 1168.929019][ T4571] device hsr_slave_0 entered promiscuous mode [ 1168.984258][ T4571] device hsr_slave_1 entered promiscuous mode [ 1169.034129][ T4571] debugfs: Directory 'hsr0' with parent '/' already present! [ 1169.054637][ T4571] bridge0: port 2(bridge_slave_1) entered blocking state [ 1169.061704][ T4571] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1169.069306][ T4571] bridge0: port 1(bridge_slave_0) entered blocking state [ 1169.076422][ T4571] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1169.118372][ T4571] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1169.134119][ T9641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1169.147436][ T9641] bridge0: port 1(bridge_slave_0) entered disabled state [ 1169.156303][ T9641] bridge0: port 2(bridge_slave_1) entered disabled state [ 1169.176915][ T4571] 8021q: adding VLAN 0 to HW filter on device team0 [ 1169.190564][ T9641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1169.199222][ T9641] bridge0: port 1(bridge_slave_0) entered blocking state [ 1169.206416][ T9641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1169.226442][ T9641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1169.235396][ T9641] bridge0: port 2(bridge_slave_1) entered blocking state [ 1169.242483][ T9641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1169.260614][ T4571] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1169.271749][ T4571] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1169.284496][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1169.296472][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1169.305432][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1169.316193][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1169.324703][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1169.332398][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1169.351731][ T4571] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1169.361714][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1169.369330][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 12:45:02 executing program 4: 12:45:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070006000000000004"]) 12:45:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="007fff0000000000070000000000000004"]) 12:45:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000048280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280068002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:02 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x2d00}]}, 0x10) 12:45:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000004c280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028006c002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1169.651394][ T4590] BPF:Total section length too long [ 1169.661773][ T4589] BPF:Unsupported btf_header 12:45:02 executing program 4: 12:45:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000060280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1169.849169][ T4603] BPF:Unsupported btf_header 12:45:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070007000000000004"]) 12:45:03 executing program 4: 12:45:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0001480200000000070000000000000004"]) [ 1169.992143][ T4609] BPF:Total section length too long 12:45:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280074002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1170.026232][ T4611] BPF:Total section length too long [ 1170.113853][ T4619] BPF:Unsupported btf_header 12:45:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000068280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:03 executing program 4: [ 1170.237646][ T4629] BPF:Total section length too long [ 1170.254882][ T4630] BPF:Total section length too long 12:45:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028007a002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1170.339350][ T4638] BPF:Unsupported btf_header [ 1170.542369][ T4746] BPF:Total section length too long 12:45:03 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x3000}]}, 0x10) 12:45:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070008000000000004"]) 12:45:03 executing program 4: 12:45:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000006c280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000f880200000000070000000000000004"]) 12:45:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800f8002800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000032800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1170.792148][ T4764] BPF:Total section length too long [ 1170.810367][ T4766] BPF:Unsupported btf_header [ 1170.819247][ T4765] BPF:Total section length too long 12:45:04 executing program 4: 12:45:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000074280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:04 executing program 4: 12:45:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="001c8e0200000000070000000000000004"]) 12:45:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000052800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1171.119289][ T4880] BPF:Total section length too long [ 1171.235231][ T4890] BPF:Unsupported btf_header [ 1171.464082][ T4998] BPF:Total section length too long 12:45:04 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x3400}]}, 0x10) 12:45:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000030000000004"]) 12:45:04 executing program 4: 12:45:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000007a280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000062800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="004d900200000000070000000000000004"]) [ 1171.717760][ T5010] BPF:Unsupported btf_header 12:45:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000072800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1171.766931][ T5065] BPF:Total section length too long 12:45:05 executing program 4: 12:45:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000f8280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000202800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1171.906055][ T5124] BPF:Total section length too long 12:45:05 executing program 4: 12:45:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000050000000004"]) [ 1172.106424][ T5133] BPF:Total section length too long [ 1172.120097][ T5132] BPF:Unsupported btf_header 12:45:05 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x3500}]}, 0x10) 12:45:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000282800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0066980200000000070000000000000004"]) 12:45:05 executing program 4: 12:45:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000002280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800002e2800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1172.632295][ T5253] BPF:Total section length too long [ 1172.650025][ T5256] BPF:Unsupported btf_header 12:45:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000060000000004"]) 12:45:05 executing program 4: 12:45:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000003280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:06 executing program 4: 12:45:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000482800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1173.023835][ T5371] BPF:Total section length too long [ 1173.086122][ T5380] BPF:Unsupported btf_header 12:45:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0019b00200000000070000000000000004"]) [ 1173.342381][ T5490] BPF:Total section length too long [ 1173.379251][ T5491] BPF:Total section length too long 12:45:06 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x3c00}]}, 0x10) 12:45:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000070000000004"]) 12:45:06 executing program 4: 12:45:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000004280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800004c2800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1173.586600][ T5502] BPF:Unsupported btf_header 12:45:06 executing program 4: 12:45:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000602800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1173.645303][ T5543] BPF:Total section length too long 12:45:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000005280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0010b20200000000070000000000000004"]) [ 1173.920360][ T5622] BPF:Unsupported btf_header 12:45:07 executing program 4: 12:45:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000682800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1173.942627][ T5624] BPF:Total section length too long [ 1173.979219][ T5625] BPF:Total section length too long 12:45:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000006280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1174.209254][ T5737] BPF:Total section length too long [ 1174.217393][ T5738] BPF:Total section length too long [ 1174.287044][ T5741] BPF:Unsupported btf_header 12:45:07 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x3d00}]}, 0x10) 12:45:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000ff0000000004"]) 12:45:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800006c2800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:07 executing program 4: 12:45:07 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0054b80200000000070000000000000004"]) 12:45:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000007280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1174.718428][ T5855] BPF:Unsupported btf_header 12:45:08 executing program 4: 12:45:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000048280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000f00300000000070000000000000004"]) 12:45:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000001000004"]) [ 1175.057524][ T5968] BPF:Unsupported btf_header 12:45:08 executing program 4: 12:45:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000004c280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1175.412853][ T6082] BPF:Unsupported btf_header 12:45:08 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x3e01}]}, 0x10) 12:45:08 executing program 4: [ 1176.165642][ T844] tipc: TX() has been purged, node left! [ 1176.934240][ T844] device bridge_slave_1 left promiscuous mode [ 1176.940769][ T844] bridge0: port 2(bridge_slave_1) entered disabled state [ 1176.974701][ T844] device bridge_slave_0 left promiscuous mode [ 1176.981127][ T844] bridge0: port 1(bridge_slave_0) entered disabled state [ 1177.694146][ T844] device hsr_slave_0 left promiscuous mode [ 1177.753862][ T844] device hsr_slave_1 left promiscuous mode [ 1177.800369][ T844] team0 (unregistering): Port device team_slave_1 removed [ 1177.810840][ T844] team0 (unregistering): Port device team_slave_0 removed [ 1177.821689][ T844] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1177.871297][ T844] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1177.955513][ T844] bond0 (unregistering): Released all slaves [ 1178.060849][ T6200] IPVS: ftp: loaded support on port[0] = 21 [ 1178.115330][ T6200] chnl_net:caif_netlink_parms(): no params data found [ 1178.141600][ T6200] bridge0: port 1(bridge_slave_0) entered blocking state [ 1178.149228][ T6200] bridge0: port 1(bridge_slave_0) entered disabled state [ 1178.157848][ T6200] device bridge_slave_0 entered promiscuous mode [ 1178.243789][ T6200] bridge0: port 2(bridge_slave_1) entered blocking state [ 1178.250952][ T6200] bridge0: port 2(bridge_slave_1) entered disabled state [ 1178.259785][ T6200] device bridge_slave_1 entered promiscuous mode [ 1178.281985][ T6200] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1178.293015][ T6200] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1178.318487][ T6200] team0: Port device team_slave_0 added [ 1178.328434][ T6200] team0: Port device team_slave_1 added [ 1178.396358][ T6200] device hsr_slave_0 entered promiscuous mode [ 1178.447103][ T6200] device hsr_slave_1 entered promiscuous mode [ 1178.507072][ T6200] debugfs: Directory 'hsr0' with parent '/' already present! [ 1178.522217][ T6200] bridge0: port 2(bridge_slave_1) entered blocking state [ 1178.529536][ T6200] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1178.536902][ T6200] bridge0: port 1(bridge_slave_0) entered blocking state [ 1178.543950][ T6200] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1178.590303][ T6200] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1178.607481][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1178.617683][ T7951] bridge0: port 1(bridge_slave_0) entered disabled state [ 1178.627455][ T7951] bridge0: port 2(bridge_slave_1) entered disabled state [ 1178.640210][ T6200] 8021q: adding VLAN 0 to HW filter on device team0 [ 1178.653753][T24523] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1178.662504][T24523] bridge0: port 1(bridge_slave_0) entered blocking state [ 1178.669757][T24523] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1178.695468][T24523] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1178.704715][T24523] bridge0: port 2(bridge_slave_1) entered blocking state [ 1178.711764][T24523] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1178.720918][T24523] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1178.730327][T24523] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1178.739313][T24523] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1178.748348][T24523] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1178.758708][ T6200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1178.767549][ T9641] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1178.790576][ T6200] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1178.798769][ T9641] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1178.807770][ T9641] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 12:45:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000060280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000002000004"]) 12:45:12 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000080400000000070000000000000004"]) 12:45:12 executing program 4: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/74, 0x4a}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @reserved="deaf81d75881123e8b3002b402567dd97cbe00"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0xff9b, 0x0}, 0x0) 12:45:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000742800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:12 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x3f00}]}, 0x10) [ 1178.938110][ T6210] BPF:Total section length too long [ 1179.019084][ T6219] IPVS: ftp: loaded support on port[0] = 21 [ 1179.037827][ T6222] BPF:Unsupported btf_header 12:45:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000068280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:12 executing program 4: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000b40)=""/114, 0x72}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_procfs$namespace(0x0, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)="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"}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0xfd, 0x0, 0xfffffeb1}, 0x0) [ 1179.259690][ T6332] BPF:Total section length too long 12:45:12 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000280400000000070000000000000004"]) 12:45:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800007a2800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000003000004"]) [ 1179.351319][ T6336] BPF:Unsupported btf_header [ 1179.427318][ T6390] IPVS: ftp: loaded support on port[0] = 21 [ 1179.434949][ T844] tipc: TX() has been purged, node left! 12:45:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000006c280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1179.615651][ T6454] BPF:Total section length too long [ 1179.676762][ T6461] BPF:Unsupported btf_header 12:45:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000f82800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:13 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000340)}, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000015c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffc0, 0x2, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x1, @perf_bp={&(0x7f0000000500), 0x8}, 0x4, 0x403, 0x5, 0xd, 0x1, 0x72f1eaa5, 0xb33}, r2, 0x0, 0xffffffffffffffff, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000440)=@abs, &(0x7f00000004c0)=0x6e) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4, 0x6]}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x8, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x4}}}]}, 0x30}}, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x83, &(0x7f0000000180), 0x8) 12:45:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000004000004"]) 12:45:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000074280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:13 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000500400000000070000000000000004"]) [ 1179.904752][ T6568] BPF:Total section length too long 12:45:13 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x4000}]}, 0x10) [ 1180.034896][ T6582] BPF:Unsupported btf_header 12:45:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000000b00000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1180.296549][ T6698] BPF:Section overlap found 12:45:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000022800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000007a280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:13 executing program 4: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/74, 0x4a}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @identifier="4b53501754167198ee380f1b5db3227a"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0xff9b, 0x0}, 0x0) 12:45:13 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000680400000000070000000000000004"]) [ 1180.499777][ T6705] BPF:Total section length too long 12:45:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000032800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1180.530272][ T6707] BPF:Total section length too long [ 1180.613533][ T6712] BPF:Unsupported btf_header [ 1180.663351][ T6713] IPVS: ftp: loaded support on port[0] = 21 [ 1180.690609][ T6718] BPF:Total section length too long 12:45:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000042800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1180.708653][ T6719] BPF:Total section length too long 12:45:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070024499204000004"]) 12:45:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000f8280000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1180.922926][ T6831] BPF:Total section length too long [ 1180.963467][ T6833] BPF:Total section length too long 12:45:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000052800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x2b}, 0x0, @in=@dev}}, 0xe8) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="0a4800002a000517d25a80648c63940d0824fc60100004400a000000053582c137153e370935018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 12:45:14 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x4400}]}, 0x10) [ 1181.118049][ T6841] BPF:Unsupported btf_header 12:45:14 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0004800400000000070000000000000004"]) 12:45:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000005000004"]) 12:45:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000320000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000680400000000070000000000000004"]) [ 1181.610581][ T6964] BPF:Unsupported btf_header 12:45:14 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000e10700000000070000000000000004"]) 12:45:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000006000004"]) 12:45:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000280400000000070000000000000004"]) 12:45:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000320000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1182.118800][ T7082] BPF:Unsupported btf_header 12:45:15 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000040800000000070000000000000004"]) [ 1182.795127][ T844] tipc: TX() has been purged, node left! [ 1182.954243][ T844] tipc: TX() has been purged, node left! [ 1183.113789][ T844] tipc: TX() has been purged, node left! [ 1183.814388][ T844] device bridge_slave_1 left promiscuous mode [ 1183.820724][ T844] bridge0: port 2(bridge_slave_1) entered disabled state [ 1183.884576][ T844] device bridge_slave_0 left promiscuous mode [ 1183.890790][ T844] bridge0: port 1(bridge_slave_0) entered disabled state [ 1184.633928][ T844] device hsr_slave_0 left promiscuous mode [ 1184.663801][ T844] device hsr_slave_1 left promiscuous mode [ 1184.720111][ T844] team0 (unregistering): Port device team_slave_1 removed [ 1184.731296][ T844] team0 (unregistering): Port device team_slave_0 removed [ 1184.741756][ T844] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1184.787382][ T844] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1184.854638][ T844] bond0 (unregistering): Released all slaves [ 1184.973161][ T7197] IPVS: ftp: loaded support on port[0] = 21 [ 1185.025451][ T7197] chnl_net:caif_netlink_parms(): no params data found [ 1185.051676][ T7197] bridge0: port 1(bridge_slave_0) entered blocking state [ 1185.059224][ T7197] bridge0: port 1(bridge_slave_0) entered disabled state [ 1185.067031][ T7197] device bridge_slave_0 entered promiscuous mode [ 1185.074686][ T7197] bridge0: port 2(bridge_slave_1) entered blocking state [ 1185.081810][ T7197] bridge0: port 2(bridge_slave_1) entered disabled state [ 1185.089633][ T7197] device bridge_slave_1 entered promiscuous mode [ 1185.223417][ T7197] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1185.238386][ T7197] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1185.260652][ T7197] team0: Port device team_slave_0 added [ 1185.270927][ T7197] team0: Port device team_slave_1 added [ 1185.335910][ T7197] device hsr_slave_0 entered promiscuous mode [ 1185.374064][ T7197] device hsr_slave_1 entered promiscuous mode [ 1185.443758][ T7197] debugfs: Directory 'hsr0' with parent '/' already present! [ 1185.463232][ T7197] bridge0: port 2(bridge_slave_1) entered blocking state [ 1185.470320][ T7197] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1185.477698][ T7197] bridge0: port 1(bridge_slave_0) entered blocking state [ 1185.484787][ T7197] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1185.527189][ T7197] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1185.539962][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1185.552714][ T7951] bridge0: port 1(bridge_slave_0) entered disabled state [ 1185.561152][ T7951] bridge0: port 2(bridge_slave_1) entered disabled state [ 1185.578655][ T7197] 8021q: adding VLAN 0 to HW filter on device team0 [ 1185.593370][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1185.602716][ T7951] bridge0: port 1(bridge_slave_0) entered blocking state [ 1185.610077][ T7951] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1185.637222][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1185.646354][ T9655] bridge0: port 2(bridge_slave_1) entered blocking state [ 1185.653411][ T9655] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1185.662269][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1185.672038][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1185.681151][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1185.689618][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1185.698228][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1185.708134][ T7197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1185.723491][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1185.731360][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1185.742754][ T7197] 8021q: adding VLAN 0 to HW filter on device batadv0 12:45:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000062800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:19 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x4500}]}, 0x10) 12:45:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280200002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000600000004"]) 12:45:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000007000004"]) 12:45:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000001000000000070000000000000004"]) [ 1185.892203][ T7207] BPF:Total section length too long [ 1186.048141][ T7220] BPF:Unsupported btf_header 12:45:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000072800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1186.111665][ T7314] BPF:Total section length too long 12:45:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280300002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000002800000000070000000000000004"]) 12:45:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000008000004"]) [ 1186.325074][ T7337] BPF:Unsupported btf_header [ 1186.390571][ T7415] BPF:Total section length too long 12:45:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0060000000000000070000000000000004"]) 12:45:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000082800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280400002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1186.634494][ T7457] BPF:Unsupported btf_header [ 1186.754715][ T7561] BPF:Total section length too long 12:45:20 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x4800}]}, 0x10) 12:45:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000282800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280500002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:20 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000042800000000070000000000000004"]) 12:45:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000700c020660b000004"]) [ 1187.007564][ T7574] BPF:Unsupported btf_header [ 1187.077523][ T7579] BPF:Total section length too long 12:45:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800002e2800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1187.114006][ T7582] BPF:Total section length too long 12:45:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000100000004"]) 12:45:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280600002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:20 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000004000000000070000000000000004"]) [ 1187.360989][ T7699] BPF:Total section length too long [ 1187.386337][ T7700] BPF:Total section length too long 12:45:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000482800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1187.407871][ T7705] BPF:Unsupported btf_header 12:45:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280700002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:20 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000005000000000070000000000000004"]) [ 1187.604960][ T7817] BPF:Total section length too long [ 1187.634008][ T7819] BPF:Total section length too long [ 1187.654694][ T7824] BPF:Unsupported btf_header 12:45:21 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x4c00}]}, 0x10) 12:45:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800004c2800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070004924924000004"]) 12:45:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000284800002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070005000000000004"]) 12:45:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000602800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1188.041439][ T7965] BPF:Total section length too long [ 1188.057807][ T7968] BPF:Unsupported btf_header [ 1188.063433][ T7966] BPF:Total section length too long 12:45:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000682800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1188.201083][ T8079] BPF:Total section length too long 12:45:21 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00', 0x4}) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) 12:45:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000284c00002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:21 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000045000000000070000000000000004"]) 12:45:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000007000b6620c0000004"]) [ 1188.452076][ T8090] BPF:Total section length too long 12:45:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800006c2800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1188.504387][ T8089] input: syz0 as /devices/virtual/input/input773 [ 1188.535366][ T8093] BPF:Unsupported btf_header [ 1188.725337][ T8205] BPF:Total section length too long [ 1188.753294][ T8207] BPF:Total section length too long 12:45:22 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x4d00}]}, 0x10) 12:45:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000286000002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000742800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000000f0ffffff0f000004"]) 12:45:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000006000000000070000000000000004"]) 12:45:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000700000000ff000004"]) 12:45:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800007a2800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1189.073559][ T8223] BPF:Total section length too long [ 1189.080791][ T8224] BPF:Unsupported btf_header [ 1189.106090][ T8226] BPF:Total section length too long 12:45:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000286800002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000f82800000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1189.300921][ T8342] BPF:Total section length too long 12:45:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000007000b6620c0000004"]) 12:45:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000020000000004"]) [ 1189.411192][ T8349] BPF:Unsupported btf_header 12:45:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000046800000000070000000000000004"]) [ 1189.479677][ T8353] BPF:Total section length too long 12:45:23 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x5000}]}, 0x10) 12:45:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002e00000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000286c00002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000030000000004"]) 12:45:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000004f0000000000000004"]) 12:45:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000008000000000070000000000000004"]) 12:45:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000003600000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1190.079453][ T8481] BPF:Unsupported section found [ 1190.088581][ T8479] BPF:Unsupported btf_header [ 1190.116576][ T8483] BPF:Unsupported section found 12:45:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000287400002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1190.390248][ T8602] BPF:Invalid section offset 12:45:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000040000000004"]) 12:45:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000008800000000070000000000000004"]) 12:45:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000000b00000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1190.417058][ T8604] BPF:Unsupported btf_header 12:45:23 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x7c}]}, 0x10) [ 1190.734946][ T8719] BPF:Section overlap found 12:45:24 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x5400}]}, 0x10) 12:45:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000287a00002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000007e100000000070000000000000004"]) 12:45:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002e00000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000050000000004"]) 12:45:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000003600000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1191.121691][ T8733] BPF:Unsupported section found [ 1191.127797][ T8730] BPF:Unsupported btf_header [ 1191.148608][ T8736] BPF:Unsupported section found 12:45:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028f800002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000005000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000060000000004"]) [ 1191.403992][ T8851] BPF:Invalid section offset [ 1191.417386][ T8853] BPF:Unsupported btf_header 12:45:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000003f000000000070000000000000004"]) 12:45:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280003002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1191.693204][ T8964] BPF:Unsupported section found [ 1191.724532][ T8965] BPF:Unsupported section found 12:45:24 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x989680}, {0x77359400}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00', 0x4}) ioctl$UI_DEV_CREATE(r4, 0x5501) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f00000001c0)={0x20000, 0xc19, 0x96, r4, 0x0, &(0x7f0000000180)={0x9909d0, 0x9, [], @p_u16=&(0x7f0000000080)=0x7}}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x1) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) [ 1191.933468][ T8975] BPF:Unsupported btf_header 12:45:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800007f05000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000070000000004"]) 12:45:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000001000000070000000000000004"]) 12:45:25 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x5c00}]}, 0x10) [ 1192.028508][ T8995] input: syz0 as /devices/virtual/input/input774 12:45:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280005002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1192.174603][ T9087] BPF:Invalid section offset 12:45:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002802000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1192.261524][ T9098] BPF:Unsupported btf_header 12:45:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000024801000000070000000000000004"]) 12:45:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280006002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1192.463503][ T9206] BPF:Invalid section offset 12:45:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002803000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1192.485455][ T9207] BPF:Invalid section offset [ 1192.551308][ T9213] BPF:Unsupported btf_header 12:45:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280007002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000080000000004"]) [ 1192.740192][ T9320] BPF:Unsupported btf_header [ 1192.743017][ T9321] BPF:Invalid section offset 12:45:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002804000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000002000000070000000000000004"]) 12:45:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280020002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:28 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x6000}]}, 0x10) 12:45:28 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x50}]}, 0x10) 12:45:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000300000004"]) [ 1195.034576][ T9441] BPF:Unsupported btf_header [ 1195.065900][ T9447] BPF:Invalid section offset 12:45:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002805000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1195.093278][ T9468] BPF:Invalid section offset 12:45:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280048002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000500000004"]) [ 1195.381011][ T9564] BPF:Invalid section offset 12:45:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002806000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000003000000070000000000000004"]) [ 1195.401572][ T9565] BPF:Invalid section offset [ 1195.491984][ T9571] BPF:Unsupported btf_header 12:45:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028004c002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1195.691026][ T9686] BPF:Invalid section offset [ 1195.716294][ T9687] BPF:Invalid section offset 12:45:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002807000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000600000004"]) [ 1195.963243][ T9698] BPF:Unsupported btf_header 12:45:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000004000000070000000000000004"]) [ 1196.018740][ T9712] BPF:Invalid section offset 12:45:29 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x6100}]}, 0x10) 12:45:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002808000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000700000004"]) 12:45:29 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x3c}]}, 0x10) 12:45:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280060002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1196.332193][ T9821] BPF:Invalid section offset 12:45:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002828000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1196.357440][ T9823] BPF:Invalid section offset 12:45:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000048004000000070000000000000004"]) [ 1196.420856][ T9829] BPF:Unsupported btf_header 12:45:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280068002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1196.601177][ T9936] BPF:Invalid section offset 12:45:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000282e000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1196.625681][ T9937] BPF:Invalid section offset 12:45:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000007000000ff00000004"]) [ 1196.708355][ T9944] BPF:Unsupported btf_header 12:45:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028006c002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1196.872798][T10051] BPF:Invalid section offset 12:45:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002848000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1196.979346][T10059] BPF:Unsupported btf_header [ 1197.195821][T10165] BPF:Invalid section offset 12:45:30 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x6400}]}, 0x10) 12:45:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0024499204000000070000000000000004"]) 12:45:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280074002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000ff00000000070000000000000004"]) 12:45:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000284c000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1197.371629][T10178] BPF:Unsupported btf_header [ 1197.392369][T10182] BPF:Invalid section offset 12:45:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000010004"]) 12:45:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002860000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1197.439782][T10183] BPF:Invalid section offset 12:45:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028007a002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1197.601535][T10295] BPF:Invalid section offset 12:45:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002868000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1197.623506][T10296] BPF:Invalid section offset 12:45:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000ff00000000070000000000000004"]) 12:45:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000005000000070000000000000004"]) 12:45:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000286c000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1197.813048][T10308] BPF:Invalid section offset [ 1197.871054][T10310] BPF:Unsupported btf_header 12:45:31 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x6c00}]}, 0x10) 12:45:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000020004"]) 12:45:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800f8002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:31 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x2c}]}, 0x10) 12:45:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000006000000070000000000000004"]) [ 1198.423422][T10431] BPF:Unsupported btf_header 12:45:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000003200000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000030004"]) 12:45:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000007000000070000000000000004"]) [ 1198.709563][T10546] BPF:Unsupported btf_header 12:45:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280002002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1199.063142][T10658] BPF:Unsupported btf_header 12:45:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000008000000070000000000000004"]) 12:45:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280003002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1199.291044][T10766] BPF:Unsupported btf_header [ 1200.106253][ T21] tipc: TX() has been purged, node left! [ 1200.894225][ T21] device bridge_slave_1 left promiscuous mode [ 1200.900580][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 1200.954547][ T21] device bridge_slave_0 left promiscuous mode [ 1200.960866][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 1201.646831][ T21] device hsr_slave_0 left promiscuous mode [ 1201.703954][ T21] device hsr_slave_1 left promiscuous mode [ 1201.770923][ T21] team0 (unregistering): Port device team_slave_1 removed [ 1201.781218][ T21] team0 (unregistering): Port device team_slave_0 removed [ 1201.791831][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1201.836987][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1201.894461][ T21] bond0 (unregistering): Released all slaves [ 1201.991089][T10876] IPVS: ftp: loaded support on port[0] = 21 [ 1202.044206][T10876] chnl_net:caif_netlink_parms(): no params data found [ 1202.070442][T10876] bridge0: port 1(bridge_slave_0) entered blocking state [ 1202.077660][T10876] bridge0: port 1(bridge_slave_0) entered disabled state [ 1202.085444][T10876] device bridge_slave_0 entered promiscuous mode [ 1202.092829][T10876] bridge0: port 2(bridge_slave_1) entered blocking state [ 1202.100130][T10876] bridge0: port 2(bridge_slave_1) entered disabled state [ 1202.107686][T10876] device bridge_slave_1 entered promiscuous mode [ 1202.175820][T10876] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1202.189824][T10876] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1202.215366][T10876] team0: Port device team_slave_0 added [ 1202.222057][T10876] team0: Port device team_slave_1 added [ 1202.308897][T10876] device hsr_slave_0 entered promiscuous mode [ 1202.354087][T10876] device hsr_slave_1 entered promiscuous mode [ 1202.413787][T10876] debugfs: Directory 'hsr0' with parent '/' already present! [ 1202.433242][T10876] bridge0: port 2(bridge_slave_1) entered blocking state [ 1202.440403][T10876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1202.447703][T10876] bridge0: port 1(bridge_slave_0) entered blocking state [ 1202.454795][T10876] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1202.498582][T10876] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1202.513611][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1202.523628][ T7951] bridge0: port 1(bridge_slave_0) entered disabled state [ 1202.535883][ T7951] bridge0: port 2(bridge_slave_1) entered disabled state [ 1202.552812][T10876] 8021q: adding VLAN 0 to HW filter on device team0 [ 1202.577106][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1202.586187][ T9650] bridge0: port 1(bridge_slave_0) entered blocking state [ 1202.593218][ T9650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1202.615084][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1202.624133][ T9650] bridge0: port 2(bridge_slave_1) entered blocking state [ 1202.631216][ T9650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1202.641288][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1202.650974][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1202.663884][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1202.672210][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1202.696814][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1202.707099][T10876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1202.724934][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1202.736709][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1202.747570][T10876] 8021q: adding VLAN 0 to HW filter on device batadv0 12:45:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002874000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000040004"]) 12:45:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280004002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:36 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x7400}]}, 0x10) 12:45:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000020004"]) 12:45:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000002880f000000070000000000000004"]) [ 1202.881096][T10886] BPF:Invalid section offset [ 1203.017344][T10898] BPF:Unsupported btf_header [ 1203.086838][T10981] BPF:Invalid section offset [ 1203.128110][T10991] BPF:Invalid section offset 12:45:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000287a000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280005002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:36 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x1d}]}, 0x10) 12:45:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000244992040004"]) 12:45:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000003610000000070000000000000004"]) [ 1203.362857][T11017] BPF:Invalid section offset [ 1203.378781][T11018] BPF:Invalid section offset [ 1203.386651][T11019] BPF:Unsupported btf_header 12:45:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028f8000006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280006002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1203.666420][T11139] BPF:Invalid section offset 12:45:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800030006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1203.692673][T11140] BPF:Invalid section offset [ 1203.731984][T11144] BPF:Unsupported btf_header 12:45:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000050004"]) [ 1203.887429][T11249] BPF:Invalid section offset 12:45:37 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x7c00}]}, 0x10) 12:45:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280007002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000002b210000000070000000000000004"]) 12:45:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800050006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1204.085712][T11261] BPF:Unsupported btf_header [ 1204.229545][T11371] BPF:Invalid section offset 12:45:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000060004"]) [ 1204.256746][T11372] BPF:Invalid section offset 12:45:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000040004"]) 12:45:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280048002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800060006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000002e11000000070000000000000004"]) 12:45:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800070006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1204.728630][T11392] BPF:Invalid section offset [ 1204.733523][T11388] BPF:Unsupported btf_header 12:45:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000070004"]) 12:45:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000002b019000000070000000000000004"]) 12:45:38 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x8100}]}, 0x10) 12:45:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028004c002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000600000000070000000000000004"]) [ 1205.151541][T11506] BPF:Unsupported btf_header 12:45:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280060002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000080004"]) [ 1205.457842][T11620] BPF:Unsupported btf_header 12:45:38 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x5}]}, 0x10) 12:45:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000028e1c000000070000000000000004"]) 12:45:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280068002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028006c002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1206.113734][ T844] tipc: TX() has been purged, node left! [ 1207.174390][ T844] device bridge_slave_1 left promiscuous mode [ 1207.181004][ T844] bridge0: port 2(bridge_slave_1) entered disabled state [ 1207.224298][ T844] device bridge_slave_0 left promiscuous mode [ 1207.231149][ T844] bridge0: port 1(bridge_slave_0) entered disabled state [ 1207.914075][ T844] device hsr_slave_0 left promiscuous mode [ 1207.973824][ T844] device hsr_slave_1 left promiscuous mode [ 1208.030530][ T844] team0 (unregistering): Port device team_slave_1 removed [ 1208.040839][ T844] team0 (unregistering): Port device team_slave_0 removed [ 1208.051271][ T844] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1208.089177][ T844] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1208.175401][ T844] bond0 (unregistering): Released all slaves [ 1208.280898][T11948] IPVS: ftp: loaded support on port[0] = 21 [ 1208.336909][T11948] chnl_net:caif_netlink_parms(): no params data found [ 1208.365737][T11948] bridge0: port 1(bridge_slave_0) entered blocking state [ 1208.373015][T11948] bridge0: port 1(bridge_slave_0) entered disabled state [ 1208.382768][T11948] device bridge_slave_0 entered promiscuous mode [ 1208.390448][T11948] bridge0: port 2(bridge_slave_1) entered blocking state [ 1208.397549][T11948] bridge0: port 2(bridge_slave_1) entered disabled state [ 1208.406055][T11948] device bridge_slave_1 entered promiscuous mode [ 1208.455924][T11948] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1208.470524][T11948] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1208.495462][T11948] team0: Port device team_slave_0 added [ 1208.502760][T11948] team0: Port device team_slave_1 added [ 1208.606183][T11948] device hsr_slave_0 entered promiscuous mode [ 1208.654230][T11948] device hsr_slave_1 entered promiscuous mode [ 1208.703717][T11948] debugfs: Directory 'hsr0' with parent '/' already present! [ 1208.722773][T11948] bridge0: port 2(bridge_slave_1) entered blocking state [ 1208.730290][T11948] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1208.737690][T11948] bridge0: port 1(bridge_slave_0) entered blocking state [ 1208.745162][T11948] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1208.789732][T11948] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1208.806890][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1208.819037][ T7951] bridge0: port 1(bridge_slave_0) entered disabled state [ 1208.828105][ T7951] bridge0: port 2(bridge_slave_1) entered disabled state [ 1208.842482][T11948] 8021q: adding VLAN 0 to HW filter on device team0 [ 1208.853787][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1208.862393][ T7951] bridge0: port 1(bridge_slave_0) entered blocking state [ 1208.869871][ T7951] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1208.890268][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1208.899303][ T9655] bridge0: port 2(bridge_slave_1) entered blocking state [ 1208.906784][ T9655] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1208.916455][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1208.933483][T11948] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1208.944398][T11948] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1208.957728][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1208.966544][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1208.975863][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1208.985971][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1209.003297][T11948] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1209.012298][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1209.021087][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1209.029383][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 12:45:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800200006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000c020660b0004"]) 12:45:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0004924924000000070000000000000004"]) 12:45:42 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x8400}]}, 0x10) 12:45:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280074002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:42 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000040)={0x0, @bt={0x101, 0x86f, 0x1, 0x2, 0xd59f80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xf9077848}}) [ 1209.156603][T11958] BPF:Invalid section offset [ 1209.317515][T11973] BPF:Unsupported btf_header 12:45:42 executing program 4: [ 1209.379383][T12066] BPF:Invalid section offset 12:45:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800280006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1209.399889][T12080] BPF:Invalid section offset 12:45:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028007a002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028002e0006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1209.559040][T12089] BPF:Invalid section offset 12:45:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000049249240004"]) [ 1209.595334][T12094] BPF:Unsupported btf_header 12:45:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000008829000000070000000000000004"]) 12:45:42 executing program 4: 12:45:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800f8002800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1209.857455][T12208] BPF:Invalid section offset 12:45:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800480006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1209.894757][T12211] BPF:Invalid section offset [ 1209.911922][T12214] BPF:Unsupported btf_header [ 1210.069823][T12321] BPF:Invalid section offset [ 1210.081809][T12322] BPF:Invalid section offset 12:45:43 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x8700}]}, 0x10) 12:45:43 executing program 4: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/82, 0x52}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @reserved="e07bcef6e7358074ba02a546f0f27e7fbd01cd95a1fc321dc1c56a52a63cc656"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0xfffffffffffffe52, 0x0, 0xffffffffffffff8a}, 0x0) 12:45:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028004c0006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000032800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000003f000000070000000000000004"]) [ 1210.212982][T12330] BPF:Unsupported btf_header [ 1210.275442][T12334] IPVS: ftp: loaded support on port[0] = 21 12:45:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000700000b6620c00004"]) 12:45:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000052800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1210.526978][T12447] BPF:Unsupported btf_header 12:45:43 executing program 4: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/82, 0x52}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @reserved="046cc38fbec0f6ceb15e2093ecb600e5c4dde973d831c79b7d7564f1fb8d7c5f"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0xfffffffffffffe52, 0x0, 0xfffffffffffffec7, 0x0, 0x1e2}, 0x0) 12:45:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000062800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1210.644339][ T21] tipc: TX() has been purged, node left! [ 1210.671254][T12552] IPVS: ftp: loaded support on port[0] = 21 12:45:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000ff0004"]) 12:45:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000040000000070000000000000004"]) 12:45:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000072800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:44 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x9400}]}, 0x10) 12:45:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000200000004"]) [ 1213.023771][ T21] tipc: TX() has been purged, node left! [ 1213.243808][ T21] tipc: TX() has been purged, node left! [ 1213.600064][T12786] IPVS: ftp: loaded support on port[0] = 21 [ 1213.676533][T12786] chnl_net:caif_netlink_parms(): no params data found [ 1213.702852][T12786] bridge0: port 1(bridge_slave_0) entered blocking state [ 1213.711806][T12786] bridge0: port 1(bridge_slave_0) entered disabled state [ 1213.719848][T12786] device bridge_slave_0 entered promiscuous mode [ 1213.758210][T12786] bridge0: port 2(bridge_slave_1) entered blocking state [ 1213.765496][T12786] bridge0: port 2(bridge_slave_1) entered disabled state [ 1213.774477][T12786] device bridge_slave_1 entered promiscuous mode [ 1213.793175][T12786] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1213.805384][T12786] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1213.852517][T12786] team0: Port device team_slave_0 added [ 1213.859168][T12786] team0: Port device team_slave_1 added [ 1213.915678][T12786] device hsr_slave_0 entered promiscuous mode [ 1213.954089][T12786] device hsr_slave_1 entered promiscuous mode [ 1213.993896][T12786] debugfs: Directory 'hsr0' with parent '/' already present! [ 1214.035317][T12786] bridge0: port 2(bridge_slave_1) entered blocking state [ 1214.042662][T12786] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1214.050079][T12786] bridge0: port 1(bridge_slave_0) entered blocking state [ 1214.058268][T12786] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1214.118140][T12786] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1214.129921][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1214.138367][ T9655] bridge0: port 1(bridge_slave_0) entered disabled state [ 1214.146748][ T9655] bridge0: port 2(bridge_slave_1) entered disabled state [ 1214.159348][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1214.172035][T12786] 8021q: adding VLAN 0 to HW filter on device team0 [ 1214.183975][ T21] device bridge_slave_1 left promiscuous mode [ 1214.190259][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 1214.234474][ T21] device bridge_slave_0 left promiscuous mode [ 1214.241245][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 1214.943947][ T21] device hsr_slave_0 left promiscuous mode [ 1215.003895][ T21] device hsr_slave_1 left promiscuous mode [ 1215.049531][ T21] team0 (unregistering): Port device team_slave_1 removed [ 1215.060522][ T21] team0 (unregistering): Port device team_slave_0 removed [ 1215.070961][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1215.120117][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1215.194269][ T21] bond0 (unregistering): Released all slaves [ 1215.338153][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1215.348108][ T7951] bridge0: port 1(bridge_slave_0) entered blocking state [ 1215.355154][ T7951] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1215.363200][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1215.372065][ T7951] bridge0: port 2(bridge_slave_1) entered blocking state [ 1215.379257][ T7951] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1215.388263][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1215.400767][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1215.409593][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1215.419297][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1215.430491][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1215.439221][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1215.450745][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1215.459763][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1215.469019][T12786] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1215.484219][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1215.492421][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1215.576471][T12786] 8021q: adding VLAN 0 to HW filter on device batadv0 12:45:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800600006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:48 executing program 4: sched_setscheduler(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT2(r1, 0xc208ae62, &(0x7f0000000240)) 12:45:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000202800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000002904d000000070000000000000004"]) 12:45:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000300000004"]) 12:45:48 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x9c00}]}, 0x10) [ 1215.739904][T12796] BPF:Invalid section offset [ 1215.891411][T12813] BPF:Unsupported btf_header [ 1215.929817][T12816] BPF:Invalid section offset 12:45:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800680006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1215.951894][T12821] BPF:Invalid section offset 12:45:49 executing program 4: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/82, 0x52}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="0272aae16e010f05dfd5d71cc8bab91d6d936cf44cd317b97f2a55de2da11f6e18b9d00ffc2ffadbfb9717eba42e7fe4a15cb583ea3eda7784d6295485da75d990180231f59ebe181b0c1efb0834ccb53d1cec4a6f2a239e64b7933129033faecb8a1ba890153d6c7b44e714cda28b4f3fcba183aa4829e8639470759738801af931737681657f6decd5d726312531bc25ba09f691da2205000001ad6958f651438f5aec2b0a627181f982be1b312614ee1fb7ead43f88c89ac6fef1ea610820076a16019cc346d8884480141ebb4503000000c73822fd33b7f22ff104ad68db421422335d97ce336d513503de9d4a62d3d7b29b2f969add4af8c0b339ff750804c0a0f91011c34854d5e076ed75929c914d44eee8e0080e510b224edcb1aacefd47a6eb51627a52fac53eed4cc9a20246a637eb5e95ce9028da700daf4089a89ca94c84c37738754288f1aa22eaa4ba6cdda04b3b1fb846c65802809bd2a65a6f7919847b65956fb34a9ee698c8057c7ee6f33c20e4b96ebdca22a4dc6d1a61df20edd8205cc448ed6b846ff0b6c35a4963e48427c098a542f36a05012161f74ad26a867740f64ed44aed19a4d5582b0a99f8c8a5781c91477302cf5e929bbec534eb4fc6b62b203bcc627913d817f57db502d57be3205727e2c6e47d2d201885eb6455273276e3a35a80d5aedbbac70a1b0a9173c797608479a7631eb8b63195efe23f354a7615900b191ed2e0053cebd06218df7fccf1717434a11c812057f083431a22cbacd089927d7c1509b0e94624b130b8aadd0af89eb4b6bfcc4cf67db95bd731892be3f1a2bf17917f4525f6e3463f331378f7ee7a872721adfea62c16bf0e4c4a25971c9e64ca3a55ef13eddc6d6557931f149a0929cb87b8371e354ef6f06b1abfb506d5b6c7d35b51dabd94a4d816fbd3491e17c0094a659053724b94da23e5d9b4d260ef723929d79f14361ddab19bde5a05677c161ce38324c9264288db8a67b79598ef0c00000000000000f21026f12c843afb510d2dff09f709aee946d38fe1f5304a11185bdf08e92ea42cfd576508359bd538195a0737c29445cda5504ddab67ebd1310dc8efc0380db010da701d2ffdc26575535f289535d625debc3492f7b3c20ff63c3b984813d7de5f0fd69580ec787de4a5c2ea293530a2f1fce30558b6dcb6776dcb256f817078849e597dd5651f65bcccccff1749cb46a79f37005a8ef555976a33eec417ce523ec5a94c8bfc8d2e61adad9f7759529bb7dc46d3954853aabe78f77e365075c04ee83091967504f7116d10fc2e3f3ef1ffc311397cffadb2ca0fcd4e18b44e08346192dba9840470b92a5a44d15df225f020abc62636c97509063f8d3633d8c0bc1fc783fd8f15d388dfa391c31b176ee3c730b765345d3a19300980567196ba63300"}) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @reserved="63544dcd11c5e0ae236d473c2729339ab9dfec6183415df79d221a370d99c4a8"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0xae, 0x0}, 0x0) 12:45:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000482800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1216.203375][T12930] BPF:Invalid section offset 12:45:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000002b854000000070000000000000004"]) 12:45:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028006c0006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1216.229877][T12931] BPF:Invalid section offset [ 1216.246708][T12932] IPVS: ftp: loaded support on port[0] = 21 12:45:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000400000004"]) [ 1216.311008][T12938] BPF:Unsupported btf_header [ 1216.439619][T13048] BPF:Invalid section offset 12:45:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800740006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800004c2800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:49 executing program 4: [ 1216.719514][T13062] BPF:Unsupported btf_header [ 1216.761194][T13066] BPF:Invalid section offset 12:45:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000029866000000070000000000000004"]) 12:45:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028007a0006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1216.803705][T13069] BPF:Invalid section offset 12:45:50 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0xa400}]}, 0x10) 12:45:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000500000004"]) 12:45:50 executing program 4: 12:45:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000602800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800f80006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1217.054560][T13182] BPF:Invalid section offset 12:45:50 executing program 4: 12:45:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000084e3000000070000000000000004"]) [ 1217.211790][T13191] BPF:Invalid section offset 12:45:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000009000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1217.243445][T13193] BPF:Invalid section offset [ 1217.309983][T13199] BPF:Unsupported btf_header 12:45:50 executing program 4: 12:45:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000682800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000036000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1217.520229][T13307] BPF:Total section length too long [ 1217.549020][T13309] BPF:Total section length too long 12:45:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000600000004"]) [ 1217.757687][T13316] BPF:Unsupported btf_header [ 1217.811893][T13357] BPF:Total section length too long 12:45:51 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0xac00}]}, 0x10) 12:45:51 executing program 4: 12:45:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000003d0000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800006c2800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000700000004"]) 12:45:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000ff000000070000000000000004"]) [ 1218.117224][T13435] BPF:Invalid section offset [ 1218.120246][T13441] BPF:Unsupported btf_header 12:45:51 executing program 4: 12:45:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800020006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1218.172115][T13437] BPF:Invalid section offset 12:45:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000742800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800030006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000800000004"]) [ 1218.413752][ T21] tipc: TX() has been purged, node left! [ 1218.434650][T13557] BPF:Invalid section offset 12:45:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)=""/224, 0xe0}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f00000005c0)=[{&(0x7f0000000040)=""/231, 0xe7}, {0x0}], 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) readv(r6, &(0x7f0000000780)=[{&(0x7f0000000100)=""/246, 0xf6}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) shutdown(r4, 0x0) shutdown(r2, 0x0) [ 1218.530531][T13562] BPF:Unsupported btf_header [ 1218.668498][T13671] BPF:Invalid section offset 12:45:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000fff000000070000000000000004"]) 12:45:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800040006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:52 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0xb100}]}, 0x10) 12:45:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800007a2800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1219.032721][T13688] BPF:Unsupported btf_header [ 1219.047740][T13690] BPF:Invalid section offset 12:45:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800050006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1219.077042][T13691] BPF:Invalid section offset 12:45:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000003000004"]) 12:45:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000f82800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1219.275229][T13804] BPF:Invalid section offset 12:45:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800060006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1219.303103][T13805] BPF:Invalid section offset [ 1219.379082][T13810] BPF:Unsupported btf_header 12:45:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800070006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1219.461728][T13882] BPF:Invalid section offset [ 1219.481122][T13889] BPF:Invalid section offset 12:45:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000007fff000000070000000000000004"]) 12:45:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000005000004"]) 12:45:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, 0x0, 0x0) 12:45:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000022800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1219.720003][T13923] BPF:Invalid section offset [ 1219.760716][T13924] BPF:Invalid section offset 12:45:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800080006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1219.857237][T13936] BPF:Unsupported btf_header 12:45:53 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{}]}, 0x10) 12:45:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000032800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f00000001c0)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) futex(&(0x7f000000cffc)=0x1, 0x8b, 0x1, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x8c, 0x1, 0x0, &(0x7f0000048000)=0x1, 0x0) tkill(r1, 0x1000000000015) 12:45:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800280006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1220.077438][T14046] BPF:Invalid section offset [ 1220.092964][T14047] BPF:Invalid section offset 12:45:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000006000004"]) [ 1220.277783][T14059] BPF:Unsupported btf_header 12:45:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000080000000000000004"]) 12:45:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028002e0006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1220.374554][T14147] BPF:Invalid section offset 12:45:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000042800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:53 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0x2, 0x12) 12:45:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800480006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1220.701106][T14185] BPF:Unsupported btf_header [ 1220.720037][T14187] BPF:Invalid section offset 12:45:54 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 12:45:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000007000004"]) [ 1220.951226][T14296] BPF:Invalid section offset 12:45:54 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x2}]}, 0x10) 12:45:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000052800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000100000000000000004"]) 12:45:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028004c0006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000300000004"]) [ 1221.307729][T14319] BPF:Unsupported btf_header [ 1221.410000][T14393] BPF:Invalid section offset 12:45:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800600006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000700000000ff000004"]) [ 1221.439522][T14425] BPF:Invalid section offset 12:45:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000062800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000004f0000000000000004"]) [ 1221.788859][T14440] BPF:Invalid section offset 12:45:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800680006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1221.809041][T14443] BPF:Unsupported btf_header 12:45:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000500000000000070000000000000004"]) 12:45:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000072800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1222.181996][T14559] BPF:Invalid section offset [ 1222.235358][T14565] BPF:Unsupported btf_header 12:45:55 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x3}]}, 0x10) 12:45:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000084e30000000000000004"]) 12:45:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000104"]) 12:45:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028006c0006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:45:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000482800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800740006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1222.490637][T14677] BPF:Invalid section offset 12:45:55 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x3}]}, 0x10) 12:45:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000204"]) [ 1222.573245][T14686] BPF:Unsupported btf_header 12:45:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000ff0000000000000004"]) 12:45:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800004c2800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1222.987857][T14802] BPF:Unsupported btf_header 12:45:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000304"]) 12:45:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000602800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1223.281529][T14911] BPF:Unsupported btf_header 12:45:56 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x4}]}, 0x10) 12:45:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000020000000000070000000000000004"]) 12:45:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000682800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:45:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000404"]) 12:45:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000030000000000070000000000000004"]) [ 1224.694016][ T21] tipc: TX() has been purged, node left! [ 1225.714144][ T21] device bridge_slave_1 left promiscuous mode [ 1225.720416][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 1225.777251][ T21] device bridge_slave_0 left promiscuous mode [ 1225.796778][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 1226.654075][ T21] device hsr_slave_0 left promiscuous mode [ 1226.714011][ T21] device hsr_slave_1 left promiscuous mode [ 1226.790239][ T21] team0 (unregistering): Port device team_slave_1 removed [ 1226.801756][ T21] team0 (unregistering): Port device team_slave_0 removed [ 1226.812531][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1226.867726][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1226.944811][ T21] bond0 (unregistering): Released all slaves [ 1227.061108][T15036] IPVS: ftp: loaded support on port[0] = 21 [ 1227.114006][T15036] chnl_net:caif_netlink_parms(): no params data found [ 1227.196899][T15036] bridge0: port 1(bridge_slave_0) entered blocking state [ 1227.204159][T15036] bridge0: port 1(bridge_slave_0) entered disabled state [ 1227.211928][T15036] device bridge_slave_0 entered promiscuous mode [ 1227.223497][T15036] bridge0: port 2(bridge_slave_1) entered blocking state [ 1227.231979][T15036] bridge0: port 2(bridge_slave_1) entered disabled state [ 1227.244267][T15036] device bridge_slave_1 entered promiscuous mode [ 1227.269422][T15036] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1227.286084][T15036] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1227.308558][T15039] IPVS: ftp: loaded support on port[0] = 21 [ 1227.326698][T15036] team0: Port device team_slave_0 added [ 1227.336809][T15036] team0: Port device team_slave_1 added [ 1227.429310][T15036] device hsr_slave_0 entered promiscuous mode [ 1227.474030][T15036] device hsr_slave_1 entered promiscuous mode [ 1227.533740][T15036] debugfs: Directory 'hsr0' with parent '/' already present! [ 1227.574816][T15036] bridge0: port 2(bridge_slave_1) entered blocking state [ 1227.582770][T15036] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1227.590141][T15036] bridge0: port 1(bridge_slave_0) entered blocking state [ 1227.597618][T15036] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1227.659541][T15039] chnl_net:caif_netlink_parms(): no params data found [ 1227.694231][T15039] bridge0: port 1(bridge_slave_0) entered blocking state [ 1227.701340][T15039] bridge0: port 1(bridge_slave_0) entered disabled state [ 1227.711280][T15039] device bridge_slave_0 entered promiscuous mode [ 1227.719165][T15039] bridge0: port 2(bridge_slave_1) entered blocking state [ 1227.726641][T15039] bridge0: port 2(bridge_slave_1) entered disabled state [ 1227.734748][T15039] device bridge_slave_1 entered promiscuous mode [ 1227.750641][T15036] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1227.767462][T15039] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1227.782757][T15036] 8021q: adding VLAN 0 to HW filter on device team0 [ 1227.792820][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1227.801676][ T9643] bridge0: port 1(bridge_slave_0) entered disabled state [ 1227.809827][ T9643] bridge0: port 2(bridge_slave_1) entered disabled state [ 1227.824116][T15039] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1227.848081][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1227.857059][ T9643] bridge0: port 1(bridge_slave_0) entered blocking state [ 1227.865178][ T9643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1227.875392][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1227.884787][ T9643] bridge0: port 2(bridge_slave_1) entered blocking state [ 1227.892459][ T9643] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1227.901533][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1227.920348][T15039] team0: Port device team_slave_0 added [ 1227.931211][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1227.940140][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1227.952237][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1227.975313][T15039] team0: Port device team_slave_1 added [ 1227.986228][T15036] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1227.997630][T15036] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1228.019325][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1228.076282][T15039] device hsr_slave_0 entered promiscuous mode [ 1228.114226][ T21] tipc: TX() has been purged, node left! [ 1228.144192][T15039] device hsr_slave_1 entered promiscuous mode [ 1228.183785][T15039] debugfs: Directory 'hsr0' with parent '/' already present! [ 1228.248055][T15036] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1228.259015][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1228.268340][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1228.337957][T15039] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1228.373569][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1228.381926][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1228.391699][T15039] 8021q: adding VLAN 0 to HW filter on device team0 [ 1228.406673][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1228.416147][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1228.425278][T30821] bridge0: port 1(bridge_slave_0) entered blocking state [ 1228.432498][T30821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1228.489855][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1228.498353][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1228.507164][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1228.516094][ T7951] bridge0: port 2(bridge_slave_1) entered blocking state [ 1228.523228][ T7951] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1228.531314][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1228.540600][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1228.546870][T15050] BPF:Invalid section offset [ 1228.585151][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1228.596881][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1228.606554][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1228.618813][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1228.627598][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 12:46:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028007a0006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:01 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x3}]}, 0x10) 12:46:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000002449920404"]) 12:46:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000040000000000070000000000000004"]) 12:46:01 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x5}]}, 0x10) [ 1228.636219][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1228.644747][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1228.653223][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1228.667259][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1228.731823][T15039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1228.873584][T15039] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1228.901214][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1228.917856][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 12:46:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800f80006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1228.990958][T15071] BPF:Invalid section offset 12:46:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000504"]) [ 1229.182101][ T21] device bridge_slave_1 left promiscuous mode [ 1229.188772][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 1229.247665][ T21] device bridge_slave_0 left promiscuous mode [ 1229.254197][ T21] bridge0: port 1(bridge_slave_0) entered disabled state 12:46:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000050000000000070000000000000004"]) [ 1229.362984][T15085] BPF:Invalid section offset 12:46:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000604"]) [ 1230.444012][ T21] device hsr_slave_0 left promiscuous mode [ 1230.483772][ T21] device hsr_slave_1 left promiscuous mode [ 1230.530467][ T21] team0 (unregistering): Port device team_slave_1 removed [ 1230.541638][ T21] team0 (unregistering): Port device team_slave_0 removed [ 1230.552597][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1230.587633][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1230.654540][ T21] bond0 (unregistering): Released all slaves [ 1230.853932][T15104] BPF:Unsupported btf_header 12:46:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800006c2800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:04 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x6}]}, 0x10) 12:46:04 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x3}]}, 0x10) 12:46:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000704"]) 12:46:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000060000000000070000000000000004"]) 12:46:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000306000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1230.991837][T15115] BPF:Invalid section offset 12:46:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000506000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1231.031611][T15116] BPF:Invalid section offset 12:46:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000742800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1231.177306][T15129] BPF:Unsupported btf_header 12:46:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000606000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1231.301517][T15134] BPF:Invalid section offset 12:46:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800007a2800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000804"]) [ 1231.364135][T15139] BPF:Unsupported btf_header 12:46:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000070000000000070000000000000004"]) [ 1231.569478][T15147] BPF:Unsupported btf_header 12:46:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000f82800000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1231.603306][T15149] BPF:Unsupported btf_header [ 1231.622942][T15152] BPF:Invalid section offset 12:46:05 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x7}]}, 0x10) [ 1231.979785][T15167] BPF:Unsupported btf_header 12:46:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000c020660b0000070000000000000004"]) 12:46:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000706000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000007000000c020660b04"]) 12:46:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000003200000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000080000000000070000000000000004"]) [ 1232.205100][T15183] BPF:Invalid section offset 12:46:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800002006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1232.233259][T15184] BPF:Invalid section offset [ 1232.333849][T15195] BPF:Unsupported btf_header 12:46:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000003200000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1232.359791][T15196] BPF:Unsupported btf_header [ 1232.450264][T15201] BPF:Invalid section offset 12:46:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800002806000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1232.477758][T15202] BPF:Invalid section offset 12:46:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000492492404"]) 12:46:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000005000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000100000000000070000000000000004"]) [ 1232.609511][T15209] BPF:Unsupported btf_header [ 1232.730100][T15214] BPF:Invalid section offset [ 1232.775271][T15215] BPF:Invalid section offset [ 1232.913395][T15226] BPF:Unsupported btf_header 12:46:06 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x8}]}, 0x10) 12:46:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000080000070000000000000004"]) 12:46:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800002e06000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000280000000000070000000000000004"]) 12:46:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002802000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1232.949863][T15228] BPF:Unsupported btf_header 12:46:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800004806000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1233.178788][T15243] BPF:Invalid section offset [ 1233.190626][T15242] BPF:Unsupported btf_header 12:46:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002803000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000070000070000000000000004"]) 12:46:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000b6620c004"]) 12:46:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002804000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1233.526651][T15261] BPF:Unsupported btf_header [ 1233.577677][T15269] BPF:Invalid section offset 12:46:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800004c06000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1233.628556][T15270] BPF:Invalid section offset 12:46:07 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000500000000000070000000000000004"]) [ 1233.868311][T15282] BPF:Invalid section offset [ 1233.881631][T15286] BPF:Unsupported btf_header [ 1233.905873][T15283] BPF:Invalid section offset [ 1233.911943][T15287] BPF:Unsupported btf_header 12:46:07 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0xc}]}, 0x10) 12:46:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002805000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800006006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:07 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r3, 0x0, 0x2) sendfile(r3, r4, 0x0, 0x20008) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r5, 0x0, 0x2) sendfile(r5, r6, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r6, 0x2270, 0x0) r7 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r8 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r7, 0x0, 0x2) sendfile(r7, r8, 0x0, 0x20008) r9 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r10 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r9, 0x0, 0x2) sendfile(r9, r10, 0x0, 0x20008) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x3) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) 12:46:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000007000000000000ff04"]) [ 1234.196582][T15302] BPF:Unsupported btf_header 12:46:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002806000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800006806000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1234.266242][T15308] BPF:Invalid section offset 12:46:07 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000600000000000070000000000000004"]) 12:46:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800006c06000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1234.397980][ T27] audit: type=1804 audit(1577709967.621:4870): pid=15305 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir926095359/syzkaller.2oaJ6A/74/bus" dev="sda1" ino=17873 res=1 [ 1234.435033][T15317] BPF:Invalid section offset [ 1234.442925][T15315] BPF:Unsupported btf_header 12:46:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002807000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1234.560851][ T27] audit: type=1804 audit(1577709967.671:4871): pid=15305 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir926095359/syzkaller.2oaJ6A/74/bus" dev="sda1" ino=17873 res=1 [ 1234.600994][T15325] BPF:Invalid section offset 12:46:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800007406000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000001"]) [ 1234.628692][T15327] BPF:Invalid section offset [ 1234.664147][ T27] audit: type=1804 audit(1577709967.711:4872): pid=15305 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir926095359/syzkaller.2oaJ6A/74/bus" dev="sda1" ino=17873 res=1 [ 1234.807046][T15335] BPF:Invalid section offset [ 1234.809330][ T27] audit: type=1804 audit(1577709967.771:4873): pid=15305 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir926095359/syzkaller.2oaJ6A/74/bus" dev="sda1" ino=17873 res=1 [ 1234.843991][T15336] BPF:Invalid section offset [ 1234.916467][ T27] audit: type=1804 audit(1577709967.811:4874): pid=15305 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir926095359/syzkaller.2oaJ6A/74/bus" dev="sda1" ino=17873 res=1 [ 1235.093776][ T27] audit: type=1804 audit(1577709967.821:4875): pid=15305 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir926095359/syzkaller.2oaJ6A/74/bus" dev="sda1" ino=17873 res=1 [ 1235.183760][ T27] audit: type=1804 audit(1577709967.851:4876): pid=15305 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir926095359/syzkaller.2oaJ6A/74/bus" dev="sda1" ino=17873 res=1 12:46:08 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0xf}]}, 0x10) 12:46:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800007a06000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000007000000000000ff04"]) 12:46:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000880000000000070000000000000004"]) 12:46:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000002"]) 12:46:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000f806000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1235.422912][T15356] BPF:Invalid section offset [ 1235.442226][T15357] BPF:Invalid section offset 12:46:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000300000000070000000000000004"]) [ 1235.651013][T15372] BPF:Invalid section offset 12:46:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000003"]) 12:46:09 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x1000000000000000) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) [ 1236.023801][ T7] tipc: TX() has been purged, node left! [ 1237.084321][ T7] device bridge_slave_1 left promiscuous mode [ 1237.090540][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1237.134368][ T7] device bridge_slave_0 left promiscuous mode [ 1237.140640][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1237.863953][ T7] device hsr_slave_0 left promiscuous mode [ 1237.933950][ T7] device hsr_slave_1 left promiscuous mode [ 1237.984973][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1237.998639][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1238.010873][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1238.067016][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1238.143470][ T7] bond0 (unregistering): Released all slaves [ 1238.240950][T15393] IPVS: ftp: loaded support on port[0] = 21 [ 1238.291279][T15393] chnl_net:caif_netlink_parms(): no params data found [ 1238.362371][T15393] bridge0: port 1(bridge_slave_0) entered blocking state [ 1238.369648][T15393] bridge0: port 1(bridge_slave_0) entered disabled state [ 1238.381127][T15393] device bridge_slave_0 entered promiscuous mode [ 1238.390210][T15393] bridge0: port 2(bridge_slave_1) entered blocking state [ 1238.401735][T15393] bridge0: port 2(bridge_slave_1) entered disabled state [ 1238.410059][T15393] device bridge_slave_1 entered promiscuous mode [ 1238.437355][T15393] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1238.448514][T15393] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1238.473042][T15393] team0: Port device team_slave_0 added [ 1238.482835][T15393] team0: Port device team_slave_1 added [ 1238.579614][T15393] device hsr_slave_0 entered promiscuous mode [ 1238.684086][T15393] device hsr_slave_1 entered promiscuous mode [ 1238.741706][T15393] bridge0: port 2(bridge_slave_1) entered blocking state [ 1238.748833][T15393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1238.756124][T15393] bridge0: port 1(bridge_slave_0) entered blocking state [ 1238.763252][T15393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1238.792966][T15393] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1238.804607][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1238.813162][T30821] bridge0: port 1(bridge_slave_0) entered disabled state [ 1238.822074][T30821] bridge0: port 2(bridge_slave_1) entered disabled state [ 1238.837511][T15393] 8021q: adding VLAN 0 to HW filter on device team0 [ 1238.848552][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1238.857690][T30821] bridge0: port 1(bridge_slave_0) entered blocking state [ 1238.864774][T30821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1238.886625][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1238.895681][ T9655] bridge0: port 2(bridge_slave_1) entered blocking state [ 1238.902737][ T9655] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1238.911691][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1238.921145][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1238.930255][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1238.945034][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1238.953427][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1238.962873][T15393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1238.990882][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1238.998718][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1239.009404][T15393] 8021q: adding VLAN 0 to HW filter on device batadv0 12:46:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002848000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000005000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000002000004"]) 12:46:12 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000500000000070000000000000004"]) 12:46:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000020000000000070000000000000004"]) 12:46:12 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x10}]}, 0x10) [ 1239.113540][T15403] BPF:Unsupported btf_header 12:46:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800007f05000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1239.163174][T15412] BPF:Unsupported section found [ 1239.294461][T15425] BPF:Unsupported btf_header [ 1239.317996][T15426] BPF:Unsupported btf_header 12:46:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028000000284c000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1239.358910][T15430] BPF:Invalid section offset [ 1239.368012][T15430] BPF:Invalid section offset 12:46:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000206000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0003000000000000070000000000000004"]) 12:46:12 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000600000000070000000000000004"]) [ 1239.501648][T15436] BPF:Unsupported btf_header 12:46:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002860000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1239.539021][T15437] BPF:Unsupported btf_header 12:46:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000306000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1239.709822][T15449] BPF:Invalid section offset 12:46:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000003000004"]) 12:46:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000406000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1239.856609][T15458] BPF:Invalid section offset [ 1239.890711][T15460] BPF:Unsupported btf_header 12:46:13 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000700000000070000000000000004"]) 12:46:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002868000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1239.933437][T15463] BPF:Unsupported btf_header [ 1240.165482][T15477] BPF:Unsupported btf_header 12:46:13 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x14}]}, 0x10) 12:46:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000004000004"]) 12:46:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000500000000070000000000000004"]) 12:46:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028000000286c000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:13 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000361000000000070000000000000004"]) [ 1240.466463][T15493] BPF:Unsupported btf_header 12:46:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002874000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000005000004"]) 12:46:13 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00002e1100000000070000000000000004"]) [ 1240.745399][T15507] BPF:Unsupported btf_header 12:46:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000100000000000000004"]) [ 1240.768737][T15508] BPF:Unsupported btf_header [ 1241.653720][ T7] tipc: TX() has been purged, node left! [ 1242.594285][ T7] device bridge_slave_1 left promiscuous mode [ 1242.601017][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1242.644429][ T7] device bridge_slave_0 left promiscuous mode [ 1242.650820][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1243.323936][ T7] device hsr_slave_0 left promiscuous mode [ 1243.363883][ T7] device hsr_slave_1 left promiscuous mode [ 1243.414378][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1243.429415][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1243.441000][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1243.487626][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1243.554692][ T7] bond0 (unregistering): Released all slaves [ 1243.689866][T15528] IPVS: ftp: loaded support on port[0] = 21 [ 1243.741612][T15528] chnl_net:caif_netlink_parms(): no params data found [ 1243.767298][T15528] bridge0: port 1(bridge_slave_0) entered blocking state [ 1243.774460][T15528] bridge0: port 1(bridge_slave_0) entered disabled state [ 1243.782235][T15528] device bridge_slave_0 entered promiscuous mode [ 1243.789654][T15528] bridge0: port 2(bridge_slave_1) entered blocking state [ 1243.796865][T15528] bridge0: port 2(bridge_slave_1) entered disabled state [ 1243.805347][T15528] device bridge_slave_1 entered promiscuous mode [ 1243.822400][T15528] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1243.833139][T15528] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1243.850626][T15528] team0: Port device team_slave_0 added [ 1243.858991][T15528] team0: Port device team_slave_1 added [ 1243.975939][T15528] device hsr_slave_0 entered promiscuous mode [ 1244.015514][T15528] device hsr_slave_1 entered promiscuous mode [ 1244.065611][T15528] debugfs: Directory 'hsr0' with parent '/' already present! [ 1244.086054][T15528] bridge0: port 2(bridge_slave_1) entered blocking state [ 1244.093119][T15528] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1244.100460][T15528] bridge0: port 1(bridge_slave_0) entered blocking state [ 1244.107525][T15528] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1244.150781][T15528] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1244.167390][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1244.179857][ T7951] bridge0: port 1(bridge_slave_0) entered disabled state [ 1244.188755][ T7951] bridge0: port 2(bridge_slave_1) entered disabled state [ 1244.206857][T15528] 8021q: adding VLAN 0 to HW filter on device team0 [ 1244.222245][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1244.230931][ T7951] bridge0: port 1(bridge_slave_0) entered blocking state [ 1244.237978][ T7951] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1244.259124][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1244.270796][ T9655] bridge0: port 2(bridge_slave_1) entered blocking state [ 1244.277851][ T9655] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1244.299646][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1244.311170][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1244.320152][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1244.331584][T15528] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1244.346826][T15528] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1244.355552][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1244.364571][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1244.381141][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1244.389140][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1244.399733][T15528] 8021q: adding VLAN 0 to HW filter on device batadv0 12:46:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000506000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1244.528919][T15538] BPF:Invalid section offset 12:46:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="1000000000000000070000000000000004"]) 12:46:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028000000287a000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000002800000000070000000000000004"]) 12:46:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000006000004"]) 12:46:17 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x15}]}, 0x10) [ 1244.583017][T15546] BPF:Unsupported btf_header 12:46:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028f8000006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000606000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1244.743846][T15558] BPF:Invalid section offset [ 1244.824276][T15568] BPF:Unsupported btf_header 12:46:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000007000004"]) 12:46:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800030006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000706000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1244.939339][T15574] BPF:Invalid section offset 12:46:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0800000000000000070000000000000004"]) 12:46:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000882900000000070000000000000004"]) [ 1245.070381][T15584] BPF:Unsupported btf_header 12:46:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800050006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1245.102227][T15585] BPF:Unsupported btf_header [ 1245.129329][T15591] BPF:Invalid section offset 12:46:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000806000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1245.162185][T15594] BPF:Invalid section offset 12:46:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800060006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1245.245859][T15605] BPF:Unsupported btf_header 12:46:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800002806000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1245.419389][T15614] BPF:Invalid section offset [ 1245.535134][T15618] BPF:Invalid section offset 12:46:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0700000000000000070000000000000004"]) 12:46:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000112e00000000070000000000000004"]) 12:46:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000008000004"]) 12:46:18 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x16}]}, 0x10) 12:46:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800002e06000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1245.686533][T15631] BPF:Invalid section offset 12:46:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800004806000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1245.724784][T15632] BPF:Invalid section offset 12:46:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000103600000000070000000000000004"]) 12:46:19 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x15}]}, 0x10) 12:46:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000030004"]) 12:46:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000003f00000000070000000000000004"]) [ 1246.843750][ T7982] tipc: TX() has been purged, node left! [ 1247.844362][ T7982] device bridge_slave_1 left promiscuous mode [ 1247.850655][ T7982] bridge0: port 2(bridge_slave_1) entered disabled state [ 1247.924340][ T7982] device bridge_slave_0 left promiscuous mode [ 1247.933893][ T7982] bridge0: port 1(bridge_slave_0) entered disabled state [ 1248.803914][ T7982] device hsr_slave_0 left promiscuous mode [ 1248.853894][ T7982] device hsr_slave_1 left promiscuous mode [ 1248.920549][ T7982] team0 (unregistering): Port device team_slave_1 removed [ 1248.930650][ T7982] team0 (unregistering): Port device team_slave_0 removed [ 1248.940881][ T7982] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1248.967242][ T7982] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1249.044029][ T7982] bond0 (unregistering): Released all slaves [ 1249.200165][T15665] IPVS: ftp: loaded support on port[0] = 21 [ 1249.262542][T15665] chnl_net:caif_netlink_parms(): no params data found [ 1249.289649][T15665] bridge0: port 1(bridge_slave_0) entered blocking state [ 1249.296816][T15665] bridge0: port 1(bridge_slave_0) entered disabled state [ 1249.304931][T15665] device bridge_slave_0 entered promiscuous mode [ 1249.312910][T15665] bridge0: port 2(bridge_slave_1) entered blocking state [ 1249.320474][T15665] bridge0: port 2(bridge_slave_1) entered disabled state [ 1249.328332][T15665] device bridge_slave_1 entered promiscuous mode [ 1249.404645][T15665] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1249.425381][T15665] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1249.440557][T15668] IPVS: ftp: loaded support on port[0] = 21 [ 1249.459984][T15665] team0: Port device team_slave_0 added [ 1249.480438][T15665] team0: Port device team_slave_1 added [ 1249.558986][T15665] device hsr_slave_0 entered promiscuous mode [ 1249.604113][T15665] device hsr_slave_1 entered promiscuous mode [ 1249.679531][T15665] bridge0: port 2(bridge_slave_1) entered blocking state [ 1249.686638][T15665] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1249.693912][T15665] bridge0: port 1(bridge_slave_0) entered blocking state [ 1249.700973][T15665] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1249.738839][T15668] chnl_net:caif_netlink_parms(): no params data found [ 1249.790457][T15665] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1249.807632][T15668] bridge0: port 1(bridge_slave_0) entered blocking state [ 1249.815317][T15668] bridge0: port 1(bridge_slave_0) entered disabled state [ 1249.823602][T15668] device bridge_slave_0 entered promiscuous mode [ 1249.838784][T15668] bridge0: port 2(bridge_slave_1) entered blocking state [ 1249.846493][T15668] bridge0: port 2(bridge_slave_1) entered disabled state [ 1249.854971][T15668] device bridge_slave_1 entered promiscuous mode [ 1249.873551][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1249.894045][T30821] bridge0: port 1(bridge_slave_0) entered disabled state [ 1249.904370][T30821] bridge0: port 2(bridge_slave_1) entered disabled state [ 1249.925602][T15668] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1249.945530][T15668] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1249.966514][T15665] 8021q: adding VLAN 0 to HW filter on device team0 [ 1249.987067][T15668] team0: Port device team_slave_0 added [ 1249.995256][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1250.003775][ T7951] bridge0: port 1(bridge_slave_0) entered blocking state [ 1250.010809][ T7951] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1250.025448][T15668] team0: Port device team_slave_1 added [ 1250.032106][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1250.043635][ T9644] bridge0: port 2(bridge_slave_1) entered blocking state [ 1250.050820][ T9644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1250.086913][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1250.098671][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1250.107479][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1250.116060][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1250.175778][T15668] device hsr_slave_0 entered promiscuous mode [ 1250.214206][T15668] device hsr_slave_1 entered promiscuous mode [ 1250.243881][T15668] debugfs: Directory 'hsr0' with parent '/' already present! [ 1250.252145][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1250.262270][T15665] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1250.287821][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1250.295654][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1250.306094][T15665] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1250.344056][T15668] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1250.356743][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1250.365474][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1250.375358][T15668] 8021q: adding VLAN 0 to HW filter on device team0 [ 1250.385011][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1250.394461][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1250.402936][ T9655] bridge0: port 1(bridge_slave_0) entered blocking state [ 1250.410108][ T9655] bridge0: port 1(bridge_slave_0) entered forwarding state 12:46:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000004000000000070000000000000004"]) 12:46:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000050004"]) 12:46:23 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x18}]}, 0x10) 12:46:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800070006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0500000000000000070000000000000004"]) [ 1250.436994][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1250.449228][T15678] BPF:Unsupported btf_header [ 1250.454906][ T7982] tipc: TX() has been purged, node left! [ 1250.496540][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1250.515453][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1250.552452][ T9643] bridge0: port 2(bridge_slave_1) entered blocking state [ 1250.559604][ T9643] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1250.590520][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1250.617265][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1250.740909][T15699] BPF:Unsupported btf_header 12:46:24 executing program 4 (fault-call:6 fault-nth:0): perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800200006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1250.822492][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1250.845291][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1250.886776][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1250.906499][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1250.919592][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1250.957726][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1250.997951][T15711] BPF:Unsupported btf_header [ 1251.030460][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1251.044116][T15707] FAULT_INJECTION: forcing a failure. [ 1251.044116][T15707] name failslab, interval 1, probability 0, space 0, times 0 [ 1251.061184][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1251.109242][T15707] CPU: 1 PID: 15707 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1251.117994][T15707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1251.128052][T15707] Call Trace: [ 1251.131354][T15707] dump_stack+0x11d/0x181 [ 1251.135832][T15707] should_fail.cold+0xa/0x1a [ 1251.140493][T15707] __should_failslab+0xee/0x130 [ 1251.145375][T15707] should_failslab+0x9/0x14 [ 1251.153273][T15707] __kmalloc+0x53/0x690 [ 1251.157441][T15707] ? rb_next+0x8c/0xa0 [ 1251.161547][T15707] ? visit_groups_merge+0x2dc/0x320 [ 1251.166757][T15707] ? pinned_sched_in+0x560/0x560 [ 1251.171768][T15707] ? rw_copy_check_uvector+0x241/0x270 [ 1251.177249][T15707] rw_copy_check_uvector+0x241/0x270 [ 1251.182627][T15707] import_iovec+0x67/0x220 [ 1251.187050][T15707] vfs_readv+0x72/0xf0 [ 1251.191131][T15707] ? __fget+0xb8/0x1d0 [ 1251.195221][T15707] ? __fget_light+0xaf/0x190 [ 1251.199828][T15707] do_preadv+0x131/0x1d0 [ 1251.204165][T15707] __x64_sys_preadv+0x61/0x80 [ 1251.208842][T15707] do_syscall_64+0xcc/0x3a0 [ 1251.213350][T15707] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1251.219239][T15707] RIP: 0033:0x45a919 [ 1251.223182][T15707] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1251.242779][T15707] RSP: 002b:00007f2af1547c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1251.251192][T15707] RAX: ffffffffffffffda RBX: 00007f2af1547c90 RCX: 000000000045a919 [ 1251.259174][T15707] RDX: 100000000000022c RSI: 0000000020000480 RDI: 0000000000000003 [ 1251.267151][T15707] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1251.275187][T15707] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2af15486d4 [ 1251.283154][T15707] R13: 00000000004c8cc5 R14: 00000000004e0478 R15: 0000000000000006 [ 1251.298068][T15668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1251.313873][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1251.427961][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1251.435875][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1251.486568][T15668] 8021q: adding VLAN 0 to HW filter on device batadv0 12:46:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800004c06000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000060004"]) 12:46:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000005000000000070000000000000004"]) 12:46:24 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x1c}]}, 0x10) 12:46:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800480006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:24 executing program 4 (fault-call:6 fault-nth:1): perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1251.640910][T15726] BPF:Invalid section offset [ 1251.797026][T15733] FAULT_INJECTION: forcing a failure. [ 1251.797026][T15733] name failslab, interval 1, probability 0, space 0, times 0 [ 1251.798867][T15743] BPF:Unsupported btf_header 12:46:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028004c0006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1251.870592][T15748] BPF:Invalid section offset [ 1251.879947][T15733] CPU: 0 PID: 15733 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1251.889575][T15733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1251.899944][T15733] Call Trace: [ 1251.903261][T15733] dump_stack+0x11d/0x181 [ 1251.907887][T15733] should_fail.cold+0xa/0x1a [ 1251.912637][T15733] __should_failslab+0xee/0x130 [ 1251.917524][T15733] should_failslab+0x9/0x14 [ 1251.922093][T15733] kmem_cache_alloc_node_trace+0x3b/0x670 [ 1251.927843][T15733] ? aa_file_perm+0x3a1/0xc20 [ 1251.932611][T15733] ? finish_task_switch+0x7b/0x260 [ 1251.937850][T15733] __kmalloc_node+0x38/0x50 [ 1251.942388][T15733] kvmalloc_node+0x71/0x100 [ 1251.946915][T15733] seq_read+0x5f6/0x9d0 [ 1251.951110][T15733] ? seq_hlist_start_head_rcu+0x60/0x60 [ 1251.956675][T15733] proc_reg_read+0xe9/0x140 [ 1251.961216][T15733] do_iter_read+0x357/0x3d0 [ 1251.965792][T15733] vfs_readv+0x9c/0xf0 [ 1251.969896][T15733] ? __fget+0xb8/0x1d0 [ 1251.974076][T15733] ? __fget_light+0xaf/0x190 [ 1251.978691][T15733] do_preadv+0x131/0x1d0 [ 1251.983028][T15733] __x64_sys_preadv+0x61/0x80 [ 1251.987762][T15733] do_syscall_64+0xcc/0x3a0 [ 1251.992292][T15733] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1251.998345][T15733] RIP: 0033:0x45a919 [ 1252.002294][T15733] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1252.014663][T15751] BPF:Unsupported btf_header [ 1252.021903][T15733] RSP: 002b:00007f2af1547c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1252.021975][T15733] RAX: ffffffffffffffda RBX: 00007f2af1547c90 RCX: 000000000045a919 [ 1252.021985][T15733] RDX: 100000000000022c RSI: 0000000020000480 RDI: 0000000000000003 [ 1252.021995][T15733] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1252.022006][T15733] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2af15486d4 12:46:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800006006000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1252.022017][T15733] R13: 00000000004c8cc5 R14: 00000000004e0478 R15: 0000000000000006 12:46:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000006000000000070000000000000004"]) 12:46:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800600006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000070004"]) [ 1252.225544][T15758] BPF:Invalid section offset 12:46:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800006806000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:25 executing program 4 (fault-call:6 fault-nth:2): perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800680006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1252.429663][T15773] BPF:Unsupported btf_header [ 1252.444587][ T7982] device bridge_slave_1 left promiscuous mode [ 1252.450836][ T7982] bridge0: port 2(bridge_slave_1) entered disabled state [ 1252.503157][T15781] BPF:Invalid section offset [ 1252.564444][ T7982] device bridge_slave_0 left promiscuous mode [ 1252.570752][ T7982] bridge0: port 1(bridge_slave_0) entered disabled state 12:46:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000e38400000000070000000000000004"]) 12:46:25 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x1d}]}, 0x10) [ 1252.653980][T15789] BPF:Unsupported btf_header [ 1252.666360][T15785] FAULT_INJECTION: forcing a failure. [ 1252.666360][T15785] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1252.679813][T15785] CPU: 0 PID: 15785 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1252.688491][T15785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1252.698551][T15785] Call Trace: [ 1252.701857][T15785] dump_stack+0x11d/0x181 [ 1252.706211][T15785] should_fail.cold+0xa/0x1a [ 1252.711183][T15785] should_fail_alloc_page+0x50/0x60 [ 1252.716500][T15785] __alloc_pages_nodemask+0xd2/0x310 [ 1252.721816][T15785] cache_grow_begin+0x76/0x5c0 [ 1252.726594][T15785] ? memcg_kmem_get_cache+0x1b1/0x320 [ 1252.732023][T15785] kmem_cache_alloc_node_trace+0x580/0x670 [ 1252.737837][T15785] ? aa_file_perm+0x3a1/0xc20 [ 1252.742747][T15785] __kmalloc_node+0x38/0x50 [ 1252.747307][T15785] kvmalloc_node+0x71/0x100 [ 1252.751832][T15785] seq_read+0x5f6/0x9d0 [ 1252.756055][T15785] ? seq_hlist_start_head_rcu+0x60/0x60 [ 1252.761675][T15785] proc_reg_read+0xe9/0x140 [ 1252.766555][T15785] do_iter_read+0x357/0x3d0 [ 1252.771131][T15785] vfs_readv+0x9c/0xf0 [ 1252.775239][T15785] ? __fget+0xb8/0x1d0 [ 1252.779323][T15785] ? __fget_light+0xaf/0x190 [ 1252.783929][T15785] do_preadv+0x131/0x1d0 [ 1252.788197][T15785] __x64_sys_preadv+0x61/0x80 [ 1252.792912][T15785] do_syscall_64+0xcc/0x3a0 [ 1252.797500][T15785] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1252.803404][T15785] RIP: 0033:0x45a919 [ 1252.807309][T15785] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1252.826927][T15785] RSP: 002b:00007f2af1547c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1252.835360][T15785] RAX: ffffffffffffffda RBX: 00007f2af1547c90 RCX: 000000000045a919 [ 1252.843383][T15785] RDX: 100000000000022c RSI: 0000000020000480 RDI: 0000000000000003 [ 1252.851441][T15785] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1252.859526][T15785] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2af15486d4 [ 1252.867535][T15785] R13: 00000000004c8cc5 R14: 00000000004e0478 R15: 0000000000000006 12:46:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000008800000000070000000000000004"]) 12:46:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000ff0004"]) 12:46:26 executing program 4 (fault-call:6 fault-nth:3): perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000298800000000070000000000000004"]) 12:46:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000005"]) 12:46:26 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x21}]}, 0x10) 12:46:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000006"]) [ 1254.454022][ T7982] device hsr_slave_0 left promiscuous mode [ 1254.503946][ T7982] device hsr_slave_1 left promiscuous mode [ 1254.540147][ T7982] team0 (unregistering): Port device team_slave_1 removed [ 1254.550880][ T7982] team0 (unregistering): Port device team_slave_0 removed [ 1254.562090][ T7982] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1254.607974][ T7982] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1254.676380][ T7982] bond0 (unregistering): Released all slaves 12:46:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800006c06000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000084e300000000070000000000000004"]) 12:46:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028006c0006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:28 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x24}]}, 0x10) 12:46:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a']) [ 1254.944315][T15848] BPF:Invalid section offset 12:46:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800007406000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800740006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1254.979641][T15850] BPF:Unsupported btf_header [ 1255.260729][T15858] BPF:Unsupported btf_header [ 1256.953720][ T7982] tipc: TX() has been purged, node left! [ 1257.123717][ T7982] tipc: TX() has been purged, node left! [ 1257.448242][T15867] IPVS: ftp: loaded support on port[0] = 21 [ 1257.536503][T15867] chnl_net:caif_netlink_parms(): no params data found [ 1257.562486][T15867] bridge0: port 1(bridge_slave_0) entered blocking state [ 1257.569678][T15867] bridge0: port 1(bridge_slave_0) entered disabled state [ 1257.577709][T15867] device bridge_slave_0 entered promiscuous mode [ 1257.630757][T15867] bridge0: port 2(bridge_slave_1) entered blocking state [ 1257.638515][T15867] bridge0: port 2(bridge_slave_1) entered disabled state [ 1257.646948][T15867] device bridge_slave_1 entered promiscuous mode [ 1257.713028][T15867] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1257.724693][T15867] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1257.791840][T15867] team0: Port device team_slave_0 added [ 1257.799314][T15867] team0: Port device team_slave_1 added [ 1257.936027][T15867] device hsr_slave_0 entered promiscuous mode [ 1257.984273][T15867] device hsr_slave_1 entered promiscuous mode [ 1258.033834][T15867] debugfs: Directory 'hsr0' with parent '/' already present! [ 1258.093727][T15867] bridge0: port 2(bridge_slave_1) entered blocking state [ 1258.100832][T15867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1258.108454][T15867] bridge0: port 1(bridge_slave_0) entered blocking state [ 1258.115529][T15867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1258.224718][T15867] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1258.235131][ T7982] device bridge_slave_1 left promiscuous mode [ 1258.242033][ T7982] bridge0: port 2(bridge_slave_1) entered disabled state [ 1258.324376][ T7982] device bridge_slave_0 left promiscuous mode [ 1258.330944][ T7982] bridge0: port 1(bridge_slave_0) entered disabled state [ 1258.395149][ T7982] device bridge_slave_1 left promiscuous mode [ 1258.401412][ T7982] bridge0: port 2(bridge_slave_1) entered disabled state [ 1258.454589][ T7982] device bridge_slave_0 left promiscuous mode [ 1258.460786][ T7982] bridge0: port 1(bridge_slave_0) entered disabled state [ 1259.764223][ T7982] device hsr_slave_0 left promiscuous mode [ 1259.823955][ T7982] device hsr_slave_1 left promiscuous mode [ 1259.881121][ T7982] team0 (unregistering): Port device team_slave_1 removed [ 1259.891621][ T7982] team0 (unregistering): Port device team_slave_0 removed [ 1259.902622][ T7982] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1259.957769][ T7982] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1260.034272][ T7982] bond0 (unregistering): Released all slaves [ 1260.154097][ T7982] device hsr_slave_0 left promiscuous mode [ 1260.193896][ T7982] device hsr_slave_1 left promiscuous mode [ 1260.241180][ T7982] team0 (unregistering): Port device team_slave_1 removed [ 1260.252057][ T7982] team0 (unregistering): Port device team_slave_0 removed [ 1260.263102][ T7982] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1260.297951][ T7982] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1260.354248][ T7982] bond0 (unregistering): Released all slaves [ 1260.452303][T15867] 8021q: adding VLAN 0 to HW filter on device team0 [ 1260.452482][T15870] IPVS: ftp: loaded support on port[0] = 21 [ 1260.465362][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1260.474082][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1260.483223][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1260.494786][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1260.521348][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1260.545284][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1260.555077][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1260.563615][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1260.572775][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1260.593879][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1260.602851][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1260.611908][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1260.620677][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1260.629236][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1260.637777][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1260.650921][T15867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1260.684653][T15870] chnl_net:caif_netlink_parms(): no params data found [ 1260.814237][T15867] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1260.821803][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1260.832964][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1260.878674][T15870] bridge0: port 1(bridge_slave_0) entered blocking state [ 1260.892905][T15870] bridge0: port 1(bridge_slave_0) entered disabled state [ 1260.904822][T15870] device bridge_slave_0 entered promiscuous mode [ 1260.913212][T15870] bridge0: port 2(bridge_slave_1) entered blocking state [ 1260.924508][T15870] bridge0: port 2(bridge_slave_1) entered disabled state [ 1260.932774][T15870] device bridge_slave_1 entered promiscuous mode [ 1260.961195][T15870] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1260.972595][T15870] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1261.001297][T15870] team0: Port device team_slave_0 added [ 1261.010443][T15870] team0: Port device team_slave_1 added [ 1261.067408][T15870] device hsr_slave_0 entered promiscuous mode [ 1261.124207][T15870] device hsr_slave_1 entered promiscuous mode [ 1261.153729][T15870] debugfs: Directory 'hsr0' with parent '/' already present! [ 1261.191650][T15870] bridge0: port 2(bridge_slave_1) entered blocking state [ 1261.198939][T15870] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1261.207049][T15870] bridge0: port 1(bridge_slave_0) entered blocking state [ 1261.215044][T15870] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1261.317165][T15870] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1261.340756][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1261.354663][ T9643] bridge0: port 1(bridge_slave_0) entered disabled state 12:46:34 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000ff00000000070000000000000004"]) 12:46:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\b']) 12:46:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028007a0006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:34 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x25}]}, 0x10) [ 1261.374408][ T9643] bridge0: port 2(bridge_slave_1) entered disabled state [ 1261.411642][T15870] 8021q: adding VLAN 0 to HW filter on device team0 12:46:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800f80006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1261.464750][T15887] BPF:Unsupported btf_header [ 1261.477521][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1261.526979][ T9643] bridge0: port 1(bridge_slave_0) entered blocking state [ 1261.534864][ T9643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1261.613722][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1261.645464][ T9643] bridge0: port 2(bridge_slave_1) entered blocking state [ 1261.655666][ T9643] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1261.681175][T15902] BPF:Unsupported btf_header [ 1261.720592][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1261.761032][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 12:46:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000009000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000010"]) 12:46:35 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000002, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1261.849348][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1261.864698][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 12:46:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000fff00000000070000000000000004"]) [ 1261.898610][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1261.918960][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1261.930331][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1261.942713][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1261.952232][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1261.967649][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1261.977368][T15912] BPF:Unsupported btf_header [ 1262.021345][T15870] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1262.054050][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1262.153259][T15870] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1262.192940][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1262.212629][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 12:46:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800007a06000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000032000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:35 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000003, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000012"]) 12:46:35 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x28}]}, 0x10) 12:46:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00007fff00000000070000000000000004"]) [ 1262.541371][T15942] BPF:Invalid section offset 12:46:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028000003d0000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1262.584869][T15948] BPF:Unsupported btf_header [ 1262.743249][T15965] BPF:Unsupported btf_header 12:46:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800020006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1262.792205][T15968] BPF:Unsupported btf_header 12:46:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000f806000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:36 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000004, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1262.849875][T15971] BPF:Invalid section offset 12:46:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000014802000000070000000000000004"]) 12:46:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00O']) 12:46:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800030006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1263.057298][T15984] BPF:Unsupported btf_header [ 1263.072771][T15985] BPF:Unsupported btf_header [ 1263.151844][T15995] BPF:Invalid section offset 12:46:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000009000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:36 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000005, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1263.182951][T15996] BPF:Invalid section offset 12:46:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800040006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1263.242042][T16003] BPF:Unsupported btf_header [ 1263.340892][T16011] BPF:Total section length too long [ 1263.372422][T16013] BPF:Total section length too long [ 1263.494311][T16021] BPF:Unsupported btf_header 12:46:36 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x2c}]}, 0x10) 12:46:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000036000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000f8802000000070000000000000004"]) 12:46:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800050006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:36 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000006, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1263.653630][T16034] BPF:Unsupported btf_header 12:46:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000003d0000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800060006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1263.676654][T16036] BPF:Total section length too long [ 1263.688923][T16035] BPF:Unsupported btf_header 12:46:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000700000000000000ff"]) 12:46:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00001c8e02000000070000000000000004"]) [ 1263.912459][T16055] BPF:Invalid section offset 12:46:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000005000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1263.934570][T16056] BPF:Invalid section offset 12:46:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000009000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1264.058162][T16066] BPF:Unsupported section found 12:46:37 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000007, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1264.227038][T16074] BPF:Total section length too long [ 1264.242430][T16075] BPF:Total section length too long 12:46:37 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x2d}]}, 0x10) 12:46:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000020004"]) 12:46:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000036000000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:37 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000008, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00004d9002000000070000000000000004"]) [ 1264.691048][T16094] BPF:Total section length too long 12:46:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000d0030000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1264.984196][T16111] BPF:Total section length too long [ 1265.333760][ T7] tipc: TX() has been purged, node left! [ 1266.224267][ T7] device bridge_slave_1 left promiscuous mode [ 1266.230638][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1266.284571][ T7] device bridge_slave_0 left promiscuous mode [ 1266.290841][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1266.973960][ T7] device hsr_slave_0 left promiscuous mode [ 1267.053880][ T7] device hsr_slave_1 left promiscuous mode [ 1267.100479][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1267.110792][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1267.121630][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1267.167386][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1267.232364][ T7] bond0 (unregistering): Released all slaves [ 1267.340103][T16121] IPVS: ftp: loaded support on port[0] = 21 [ 1267.391968][T16121] chnl_net:caif_netlink_parms(): no params data found [ 1267.418761][T16121] bridge0: port 1(bridge_slave_0) entered blocking state [ 1267.426114][T16121] bridge0: port 1(bridge_slave_0) entered disabled state [ 1267.437541][T16121] device bridge_slave_0 entered promiscuous mode [ 1267.493927][T16121] bridge0: port 2(bridge_slave_1) entered blocking state [ 1267.501058][T16121] bridge0: port 2(bridge_slave_1) entered disabled state [ 1267.509321][T16121] device bridge_slave_1 entered promiscuous mode [ 1267.533006][T16121] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1267.547395][T16121] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1267.573008][T16121] team0: Port device team_slave_0 added [ 1267.580194][T16121] team0: Port device team_slave_1 added [ 1267.696226][T16121] device hsr_slave_0 entered promiscuous mode [ 1267.754220][T16121] device hsr_slave_1 entered promiscuous mode [ 1267.834279][T16121] bridge0: port 2(bridge_slave_1) entered blocking state [ 1267.841354][T16121] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1267.848737][T16121] bridge0: port 1(bridge_slave_0) entered blocking state [ 1267.855806][T16121] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1267.897154][T16121] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1267.909833][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1267.918945][T30821] bridge0: port 1(bridge_slave_0) entered disabled state [ 1267.927831][T30821] bridge0: port 2(bridge_slave_1) entered disabled state [ 1267.942470][T16121] 8021q: adding VLAN 0 to HW filter on device team0 [ 1267.955498][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1267.964394][T30821] bridge0: port 1(bridge_slave_0) entered blocking state [ 1267.971448][T30821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1267.996168][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1268.005077][ T7951] bridge0: port 2(bridge_slave_1) entered blocking state [ 1268.012235][ T7951] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1268.021307][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1268.030663][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1268.039411][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1268.048166][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1268.060843][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1268.071384][T16121] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1268.089655][T16121] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1268.098047][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1268.106186][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 12:46:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000030004"]) 12:46:41 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000009, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800070006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000669802000000070000000000000004"]) 12:46:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000057f0000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:41 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x30}]}, 0x10) [ 1268.212341][T16131] BPF:Unsupported btf_header [ 1268.288900][T16142] BPF:Total section length too long 12:46:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006020000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1268.318202][T16143] BPF:Total section length too long 12:46:41 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000000a, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1268.482840][T16157] BPF:Unsupported btf_header [ 1268.521594][T16158] BPF:Unsupported btf_header 12:46:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000040004"]) 12:46:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800480006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006030000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1268.557895][T16162] BPF:Total section length too long 12:46:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000019b002000000070000000000000004"]) [ 1268.793128][T16180] BPF:Unsupported btf_header 12:46:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028004c0006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1268.820457][T16182] BPF:Unsupported btf_header [ 1268.838791][T16186] BPF:Total section length too long 12:46:42 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000000b, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006040000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1268.860665][T16187] BPF:Total section length too long [ 1268.997340][T16195] BPF:Unsupported btf_header 12:46:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800600006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000010b202000000070000000000000004"]) [ 1269.050633][T16202] BPF:Total section length too long [ 1269.052487][T16199] BPF:Unsupported btf_header [ 1269.075447][T16204] BPF:Total section length too long 12:46:42 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x34}]}, 0x10) 12:46:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000050004"]) 12:46:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006050000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:42 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000000c, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800680006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006060000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1269.321378][T16217] BPF:Unsupported btf_header [ 1269.339892][T16224] BPF:Total section length too long 12:46:42 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000000d, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1269.561797][T16239] BPF:Total section length too long 12:46:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006070000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1269.596503][T16243] BPF:Total section length too long 12:46:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000060004"]) [ 1269.680147][T16250] BPF:Unsupported btf_header 12:46:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028006c0006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000054b802000000070000000000000004"]) [ 1269.853917][T16262] BPF:Total section length too long [ 1269.890371][T16265] BPF:Unsupported btf_header 12:46:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006080000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1269.916693][T16266] BPF:Unsupported btf_header [ 1270.217755][T16281] BPF:Total section length too long 12:46:43 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x35}]}, 0x10) 12:46:43 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000000e, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800740006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000f003000000070000000000000004"]) 12:46:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000070004"]) 12:46:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006280000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1270.442749][T16297] BPF:Unsupported btf_header 12:46:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028007a0006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1270.480292][T16303] BPF:Total section length too long 12:46:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000062e0000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1270.523527][T16305] BPF:Total section length too long 12:46:43 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000000f, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000804000000070000000000000004"]) 12:46:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000080004"]) [ 1270.770085][T16319] BPF:Total section length too long 12:46:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006480000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1270.796718][T16320] BPF:Total section length too long [ 1271.018592][T16336] BPF:Total section length too long [ 1271.036586][T16337] BPF:Total section length too long 12:46:44 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x3c}]}, 0x10) 12:46:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000064c0000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:44 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000010, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000304"]) 12:46:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000002804000000070000000000000004"]) 12:46:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006600000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1271.448275][T16361] BPF:Total section length too long [ 1271.743746][ T7962] tipc: TX() has been purged, node left! [ 1271.758435][T16372] BPF:Total section length too long [ 1272.784280][ T7962] device bridge_slave_1 left promiscuous mode [ 1272.790538][ T7962] bridge0: port 2(bridge_slave_1) entered disabled state [ 1272.824588][ T7962] device bridge_slave_0 left promiscuous mode [ 1272.830955][ T7962] bridge0: port 1(bridge_slave_0) entered disabled state [ 1273.514184][ T7962] device hsr_slave_0 left promiscuous mode [ 1273.583881][ T7962] device hsr_slave_1 left promiscuous mode [ 1273.630932][ T7962] team0 (unregistering): Port device team_slave_1 removed [ 1273.641749][ T7962] team0 (unregistering): Port device team_slave_0 removed [ 1273.652992][ T7962] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1273.707478][ T7962] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1273.785077][ T7962] bond0 (unregistering): Released all slaves [ 1273.890397][T16381] IPVS: ftp: loaded support on port[0] = 21 [ 1273.951483][T16381] chnl_net:caif_netlink_parms(): no params data found [ 1273.977229][T16381] bridge0: port 1(bridge_slave_0) entered blocking state [ 1273.984400][T16381] bridge0: port 1(bridge_slave_0) entered disabled state [ 1273.992040][T16381] device bridge_slave_0 entered promiscuous mode [ 1274.000149][T16381] bridge0: port 2(bridge_slave_1) entered blocking state [ 1274.007334][T16381] bridge0: port 2(bridge_slave_1) entered disabled state [ 1274.015732][T16381] device bridge_slave_1 entered promiscuous mode [ 1274.080661][T16381] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1274.094632][T16381] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1274.118888][T16381] team0: Port device team_slave_0 added [ 1274.129610][T16381] team0: Port device team_slave_1 added [ 1274.188874][T16381] device hsr_slave_0 entered promiscuous mode [ 1274.277286][T16381] device hsr_slave_1 entered promiscuous mode [ 1274.331572][T16381] bridge0: port 2(bridge_slave_1) entered blocking state [ 1274.339377][T16381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1274.346645][T16381] bridge0: port 1(bridge_slave_0) entered blocking state [ 1274.353695][T16381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1274.397164][T16381] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1274.414015][ T9643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1274.423038][ T9643] bridge0: port 1(bridge_slave_0) entered disabled state [ 1274.435561][ T9643] bridge0: port 2(bridge_slave_1) entered disabled state [ 1274.453132][T16381] 8021q: adding VLAN 0 to HW filter on device team0 [ 1274.465647][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1274.474559][ T9655] bridge0: port 1(bridge_slave_0) entered blocking state [ 1274.481601][ T9655] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1274.505563][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1274.514621][T30821] bridge0: port 2(bridge_slave_1) entered blocking state [ 1274.521674][T30821] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1274.531221][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1274.541760][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1274.551006][T30821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1274.562871][T16381] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1274.574833][T16381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1274.583585][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1274.592735][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1274.610461][T16381] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1274.618834][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1274.626637][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 12:46:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800f80006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:48 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000011, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000504"]) 12:46:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000005004000000070000000000000004"]) 12:46:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006680000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:48 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x3d}]}, 0x10) [ 1274.758836][T16391] BPF:Unsupported btf_header 12:46:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000066c0000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1274.842541][T16403] BPF:Total section length too long [ 1274.860600][T16404] BPF:Total section length too long 12:46:48 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000012, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1275.055703][T16416] BPF:Unsupported btf_header [ 1275.087283][T16423] BPF:Total section length too long [ 1275.104123][T16424] BPF:Total section length too long 12:46:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006740000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000306000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000604"]) 12:46:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000006804000000070000000000000004"]) 12:46:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000067a0000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1275.314153][T16433] BPF:Total section length too long [ 1275.329769][T16434] BPF:Total section length too long 12:46:48 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000013, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1275.418843][T16443] BPF:Unsupported btf_header 12:46:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000506000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1275.541366][T16454] BPF:Total section length too long 12:46:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006f80000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1275.568624][T16455] BPF:Total section length too long 12:46:48 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000014, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:49 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x44}]}, 0x10) 12:46:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000704"]) 12:46:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000048004000000070000000000000004"]) [ 1275.861228][T16471] BPF:Unsupported btf_header 12:46:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000606000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000300000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1275.949600][T16476] BPF:Total section length too long 12:46:49 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000015, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000500000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1276.188736][T16495] BPF:Total section length too long [ 1276.288860][T16503] BPF:Unsupported btf_header 12:46:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000007000000000000ff04"]) 12:46:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000706000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000e107000000070000000000000004"]) [ 1276.320655][T16505] BPF:Unsupported btf_header [ 1276.383872][T16510] BPF:Total section length too long 12:46:49 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000016, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000600000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1276.408481][T16511] BPF:Total section length too long [ 1276.580300][T16526] BPF:Unsupported btf_header [ 1276.708760][T16535] BPF:Total section length too long 12:46:50 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x45}]}, 0x10) 12:46:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800002006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000408000000070000000000000004"]) 12:46:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000700000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:50 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000017, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800004806000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1276.912581][T16545] BPF:Total section length too long [ 1276.926203][T16549] BPF:Unsupported btf_header [ 1276.936947][T16550] BPF:Unsupported btf_header [ 1276.962320][T16548] BPF:Total section length too long 12:46:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000003"]) 12:46:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006002000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1277.042104][T16563] BPF:Unsupported btf_header 12:46:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800004c06000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1277.075162][T16564] BPF:Unsupported btf_header 12:46:50 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000018, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1277.343109][T16576] BPF:Unsupported btf_header [ 1277.348319][T16577] BPF:Total section length too long 12:46:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800006006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006002800000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1277.384929][T16580] BPF:Total section length too long [ 1277.390816][T16579] BPF:Unsupported btf_header [ 1277.566105][T16593] BPF:Total section length too long [ 1277.629521][T16599] BPF:Unsupported btf_header 12:46:51 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x48}]}, 0x10) 12:46:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000010000000070000000000000004"]) 12:46:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000204"]) 12:46:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006002e00000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800006806000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:51 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000019, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800006c06000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006004800000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1277.851972][T16613] BPF:Unsupported btf_header [ 1277.860261][T16614] BPF:Total section length too long [ 1277.882215][T16616] BPF:Unsupported btf_header [ 1277.894174][T16615] BPF:Total section length too long 12:46:51 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000001a, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1278.051776][T16633] BPF:Unsupported btf_header 12:46:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800007406000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1278.075934][T16635] BPF:Unsupported btf_header 12:46:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000028000000070000000000000004"]) 12:46:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000304"]) [ 1278.267651][T16645] BPF:Unsupported btf_header [ 1278.301427][T16646] BPF:Unsupported btf_header 12:46:52 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x4c}]}, 0x10) 12:46:52 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000001b, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800007a06000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000428000000070000000000000004"]) 12:46:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000404"]) [ 1278.850762][T16666] BPF:Unsupported btf_header 12:46:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028000000280000f806000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:52 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000001c, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1279.152924][T16685] BPF:Unsupported btf_header [ 1279.873719][ T7985] tipc: TX() has been purged, node left! [ 1280.704202][ T7985] device bridge_slave_1 left promiscuous mode [ 1280.710489][ T7985] bridge0: port 2(bridge_slave_1) entered disabled state [ 1280.754475][ T7985] device bridge_slave_0 left promiscuous mode [ 1280.760720][ T7985] bridge0: port 1(bridge_slave_0) entered disabled state [ 1281.494242][ T7985] device hsr_slave_0 left promiscuous mode [ 1281.543796][ T7985] device hsr_slave_1 left promiscuous mode [ 1281.609314][ T7985] team0 (unregistering): Port device team_slave_1 removed [ 1281.622385][ T7985] team0 (unregistering): Port device team_slave_0 removed [ 1281.633457][ T7985] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1281.667599][ T7985] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1281.744522][ T7985] bond0 (unregistering): Released all slaves [ 1281.861028][T16699] IPVS: ftp: loaded support on port[0] = 21 [ 1281.916548][T16699] chnl_net:caif_netlink_parms(): no params data found [ 1281.949509][T16699] bridge0: port 1(bridge_slave_0) entered blocking state [ 1281.956734][T16699] bridge0: port 1(bridge_slave_0) entered disabled state [ 1281.964468][T16699] device bridge_slave_0 entered promiscuous mode [ 1281.972022][T16699] bridge0: port 2(bridge_slave_1) entered blocking state [ 1281.979248][T16699] bridge0: port 2(bridge_slave_1) entered disabled state [ 1281.987122][T16699] device bridge_slave_1 entered promiscuous mode [ 1282.035921][T16699] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1282.046619][T16699] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1282.067661][T16699] team0: Port device team_slave_0 added [ 1282.075403][T16699] team0: Port device team_slave_1 added [ 1282.186109][T16699] device hsr_slave_0 entered promiscuous mode [ 1282.244974][T16699] device hsr_slave_1 entered promiscuous mode [ 1282.304819][T16699] debugfs: Directory 'hsr0' with parent '/' already present! [ 1282.324990][T16699] bridge0: port 2(bridge_slave_1) entered blocking state [ 1282.332155][T16699] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1282.339486][T16699] bridge0: port 1(bridge_slave_0) entered blocking state [ 1282.346575][T16699] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1282.389155][T16699] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1282.405610][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1282.417243][ T7951] bridge0: port 1(bridge_slave_0) entered disabled state [ 1282.425403][ T7951] bridge0: port 2(bridge_slave_1) entered disabled state [ 1282.440678][T16699] 8021q: adding VLAN 0 to HW filter on device team0 [ 1282.452482][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1282.461280][ T9650] bridge0: port 1(bridge_slave_0) entered blocking state [ 1282.468343][ T9650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1282.496745][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1282.505495][ T9655] bridge0: port 2(bridge_slave_1) entered blocking state [ 1282.512517][ T9655] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1282.521561][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1282.530898][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1282.540431][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1282.549478][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1282.559791][T16699] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1282.568347][ T552] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1282.590018][T16699] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1282.597495][ T552] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1282.606146][ T552] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 12:46:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006004c00000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000040000000070000000000000004"]) 12:46:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000005000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000504"]) 12:46:56 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000001d, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:56 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x4d}]}, 0x10) [ 1282.755718][T16709] BPF:Total section length too long [ 1282.865733][T16722] BPF:Unsupported btf_header [ 1282.872139][T16725] BPF:Total section length too long 12:46:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000206000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006006000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1282.918971][T16727] BPF:Total section length too long 12:46:56 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000001e, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1283.106808][T16742] BPF:Total section length too long 12:46:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000050000000070000000000000004"]) 12:46:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006006800000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000604"]) [ 1283.150347][T16743] BPF:Total section length too long [ 1283.157545][T16744] BPF:Unsupported btf_header 12:46:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000306000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1283.204730][T16748] BPF:Unsupported btf_header 12:46:56 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000021, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1283.332851][T16760] BPF:Total section length too long [ 1283.371751][T16764] BPF:Total section length too long 12:46:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006006c00000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1283.456627][T16773] BPF:Unsupported btf_header 12:46:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000406000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:56 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000022, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1283.618491][T16783] BPF:Total section length too long [ 1283.657264][T16784] BPF:Total section length too long 12:46:56 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x50}]}, 0x10) 12:46:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000704"]) 12:46:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006007400000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000450000000070000000000000004"]) 12:46:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000506000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1283.814549][T16797] BPF:Unsupported btf_header [ 1283.830986][T16798] BPF:Unsupported btf_header [ 1283.844366][T16804] BPF:Total section length too long [ 1283.886056][T16805] BPF:Total section length too long 12:46:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006007a00000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:57 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000023, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000606000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1284.064662][T16821] BPF:Unsupported btf_header [ 1284.137571][T16827] BPF:Total section length too long 12:46:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000600f800000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1284.160642][T16828] BPF:Total section length too long 12:46:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000804"]) 12:46:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000060000000070000000000000004"]) 12:46:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006ffffff000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1284.347071][T16839] BPF:Total section length too long [ 1284.363777][T16840] BPF:Total section length too long [ 1284.373570][T16843] BPF:Unsupported btf_header [ 1284.506965][T16853] BPF:Total section length too long [ 1284.528625][T16854] BPF:Total section length too long 12:46:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000706000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:57 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000024, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:57 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x54}]}, 0x10) 12:46:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000010000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000468000000070000000000000004"]) [ 1284.773582][T16868] BPF:[1] ENUM [ 1284.795673][T16868] BPF:size=1 vlen=1 [ 1284.801264][T16870] BPF:Unsupported btf_header [ 1284.813018][T16868] BPF: [ 1284.820195][T16869] BPF:[1] ENUM [ 1284.848858][T16873] BPF:Unsupported btf_header 12:46:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800004806000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1284.869926][T16868] BPF:Invalid name [ 1284.890178][T16869] BPF:size=1 vlen=1 [ 1284.911593][T16868] BPF: [ 1284.911593][T16868] 12:46:58 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000025, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1284.963754][T16869] BPF: [ 1284.966666][T16869] BPF:Invalid name [ 1284.970436][T16869] BPF: [ 1284.970436][T16869] 12:46:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000020000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1285.010393][T16888] BPF:Unsupported btf_header 12:46:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800004c06000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000005"]) [ 1285.198067][T16898] BPF:Unsupported btf_header 12:46:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800006006000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1285.226004][T16899] BPF:Unsupported btf_header 12:46:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000080000000070000000000000004"]) [ 1285.297162][T16903] BPF:[1] ENUM [ 1285.303745][T16903] BPF:size=1 vlen=1 [ 1285.313259][T16903] BPF: [ 1285.333398][T16906] BPF:[1] ENUM [ 1285.357354][T16906] BPF:size=1 vlen=1 12:46:58 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000026, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1285.382330][T16903] BPF:Invalid name [ 1285.404957][T16906] BPF: [ 1285.407356][T16903] BPF: [ 1285.407356][T16903] [ 1285.407860][T16906] BPF:Invalid name [ 1285.452019][T16912] BPF:Unsupported btf_header 12:46:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800006806000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1285.486191][T16914] BPF:Unsupported btf_header [ 1285.511818][T16906] BPF: [ 1285.511818][T16906] [ 1285.737588][T16929] BPF:Unsupported btf_header 12:46:59 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x5c}]}, 0x10) 12:46:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000030000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:46:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000006"]) 12:46:59 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000027, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:59 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000088000000070000000000000004"]) 12:46:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800006c06000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1285.877078][T16940] BPF:[1] ENUM [ 1285.887404][T16940] BPF:size=1 vlen=1 [ 1285.924100][T16941] BPF:[1] ENUM [ 1285.960254][T16941] BPF:size=1 vlen=1 [ 1285.973708][T16940] BPF: [ 1285.980565][T16941] BPF: [ 1285.982083][T16940] BPF:Invalid name [ 1285.990124][T16941] BPF:Invalid name 12:46:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800007406000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:46:59 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000028, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:46:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000040000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1286.017093][T16941] BPF: [ 1286.017093][T16941] [ 1286.024659][T16956] BPF:Unsupported btf_header [ 1286.038462][T16957] BPF:Unsupported btf_header [ 1286.053481][T16940] BPF: [ 1286.053481][T16940] [ 1286.266541][T16969] BPF:Unsupported btf_header 12:46:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a']) 12:46:59 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000029, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1286.287508][T16971] BPF:[1] ENUM [ 1286.298578][T16970] BPF:Unsupported btf_header [ 1286.323214][T16972] BPF:[1] ENUM 12:46:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800007a06000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1286.337371][T16972] BPF:size=1 vlen=1 [ 1286.344223][T16972] BPF: [ 1286.348719][T16972] BPF:Invalid name [ 1286.350763][T16971] BPF:size=1 vlen=1 [ 1286.353640][T16972] BPF: [ 1286.353640][T16972] [ 1286.367447][T16971] BPF: [ 1286.370307][T16971] BPF:Invalid name [ 1286.483757][T16971] BPF: [ 1286.483757][T16971] [ 1286.514558][T16990] BPF:Unsupported btf_header 12:47:00 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x60}]}, 0x10) 12:47:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000007e1000000070000000000000004"]) 12:47:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028000000280000f806000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000050000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:00 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000002a, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000012"]) 12:47:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000009000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1286.928477][T17004] BPF:Unsupported btf_header [ 1286.948671][T17007] BPF:Unsupported btf_header [ 1286.972405][T17012] BPF:[1] ENUM [ 1286.996798][T17012] BPF:size=1 vlen=1 [ 1287.019222][T17013] BPF:[1] ENUM [ 1287.028788][T17012] BPF: [ 1287.103769][T17013] BPF:size=1 vlen=1 [ 1287.107670][T17013] BPF: [ 1287.110446][T17013] BPF:Invalid name 12:47:00 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000002b, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000003f0000000070000000000000004"]) 12:47:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000032000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000060000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00O']) [ 1287.175944][T17012] BPF:Invalid name [ 1287.179723][T17012] BPF: [ 1287.179723][T17012] [ 1287.189522][T17025] BPF:Unsupported btf_header [ 1287.207461][T17013] BPF: [ 1287.207461][T17013] [ 1287.441452][T17042] BPF:Unsupported btf_header [ 1287.523082][T17048] BPF:[1] Invalid name_offset:6 12:47:01 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x61}]}, 0x10) 12:47:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000070000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:01 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000002c, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028000003d0000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000010000070000000000000004"]) 12:47:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000700000000000000ff"]) [ 1287.942478][T17063] BPF:Unsupported btf_header 12:47:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000005000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000080000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1288.028176][T17072] BPF:[1] Invalid name_offset:7 12:47:01 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000002d, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000248010000070000000000000004"]) [ 1288.207168][T17086] BPF:[1] Invalid name_offset:8 [ 1288.218392][T17087] BPF:[1] Invalid name_offset:8 12:47:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000002"]) 12:47:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000200000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1288.273868][T17091] BPF:Unsupported btf_header [ 1288.454789][T17107] BPF:[1] Invalid name_offset:32 12:47:02 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x64}]}, 0x10) 12:47:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000280000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000020000070000000000000004"]) 12:47:02 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000002e, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000009000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1288.851248][T17121] BPF:[1] Invalid name_offset:40 12:47:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000032000000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000060000002e0000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1288.900222][T17126] BPF:Unsupported btf_header [ 1288.903361][T17124] BPF:[1] Invalid name_offset:40 12:47:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000003"]) 12:47:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028000000d0030000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1289.022657][T17137] BPF:Unsupported btf_header 12:47:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000030000070000000000000004"]) 12:47:02 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000002f, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1289.170530][T17146] BPF:[1] Invalid name_offset:46 [ 1289.191602][T17147] BPF:[1] Invalid name_offset:46 12:47:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000480000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1289.385275][T17164] BPF:Unsupported btf_header [ 1289.429890][T17183] BPF:[1] Invalid name_offset:72 [ 1289.455523][T17198] BPF:[1] Invalid name_offset:72 12:47:02 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x6c}]}, 0x10) 12:47:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000040000070000000000000004"]) 12:47:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006020000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000060000004c0000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000005"]) 12:47:02 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000030, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1289.810352][T17284] BPF:[1] Invalid name_offset:76 [ 1289.817008][T17283] BPF:Unsupported btf_header 12:47:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000600000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1289.850579][T17285] BPF:[1] Invalid name_offset:76 12:47:03 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000031, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000006"]) 12:47:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006030000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000480040000070000000000000004"]) 12:47:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000680000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1290.087035][T17404] BPF:[1] Invalid name_offset:96 [ 1290.303165][T17420] BPF:Unsupported btf_header [ 1290.443261][T17525] BPF:[1] Invalid name_offset:104 [ 1290.504507][T17526] BPF:[1] Invalid name_offset:104 12:47:03 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x74}]}, 0x10) 12:47:03 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000032, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006040000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000060000006c0000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a']) 12:47:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000244992040000070000000000000004"]) 12:47:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000740000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1290.815271][T17542] BPF:[1] Invalid name_offset:108 [ 1290.823545][T17543] BPF:Unsupported btf_header [ 1290.841015][T17544] BPF:[1] Invalid name_offset:108 12:47:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006050000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:04 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000033, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1291.076641][T17658] BPF:[1] Invalid name_offset:116 12:47:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000060000007a0000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\b']) [ 1291.254408][T17667] BPF:Unsupported btf_header [ 1291.298878][T17674] BPF:[1] Invalid name_offset:122 12:47:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000050000070000000000000004"]) [ 1291.338746][T17689] BPF:[1] Invalid name_offset:122 12:47:04 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x7c}]}, 0x10) 12:47:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000f80000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006060000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:04 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000034, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000010"]) [ 1291.723426][T17793] BPF:Unsupported btf_header [ 1291.794091][T17833] BPF:[1] Invalid name_offset:248 12:47:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000600ffffff0000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1291.814336][T17839] BPF:[1] Invalid name_offset:248 12:47:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000060000070000000000000004"]) 12:47:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006070000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1291.988361][T17912] BPF:Total section length too long [ 1292.046007][T17916] BPF:Unsupported btf_header 12:47:05 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000035, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000012"]) 12:47:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006480000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000000000200000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1292.362193][T18034] BPF:Unsupported btf_header [ 1292.432091][T18139] BPF: Invalid name_offset:32517 [ 1292.488311][T18140] BPF: Invalid name_offset:32517 12:47:05 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x84}]}, 0x10) 12:47:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000070000070000000000000004"]) 12:47:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028000000064c0000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000000000400000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:05 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000036, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00O']) [ 1292.746952][T18155] BPF:Unsupported btf_header [ 1292.820655][T18193] BPF:[1] ENUM (anon) 12:47:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000000000800000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1292.847187][T18193] BPF: [ 1292.850518][T18193] BPF:meta_left:28 meta_needed:32 [ 1292.856213][T18193] BPF: [ 1292.856213][T18193] 12:47:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006600000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:06 executing program 3: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0080000000000000070000000004"]) 12:47:06 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000037, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000080000070000000000000004"]) [ 1293.148452][T18276] BPF:[1] ENUM (anon) [ 1293.163740][T18276] BPF: [ 1293.166558][T18276] BPF:meta_left:28 meta_needed:64 [ 1293.171668][T18276] BPF: [ 1293.171668][T18276] [ 1293.234761][T18283] BPF:Unsupported btf_header 12:47:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000000002500000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1293.527310][T18497] BPF:[1] ENUM (anon) [ 1293.536556][T18497] BPF: [ 1293.546952][T18497] BPF:meta_left:28 meta_needed:296 [ 1293.577716][T18497] BPF: [ 1293.577716][T18497] 12:47:06 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x87}]}, 0x10) 12:47:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006680000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000002880f0000070000000000000004"]) 12:47:06 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x100000000805, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x2, &(0x7f0000745ffc), &(0x7f0000b96000)=0x35b) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x20008) r4 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r5 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r5, 0x2270, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000740)='memory.swap.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r6, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000004"]) 12:47:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000000003600000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:06 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000038, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1293.788707][T18608] BPF:Unsupported btf_header [ 1293.799051][T18611] BPF:[1] ENUM (anon) [ 1293.811792][T18611] BPF: [ 1293.817182][T18611] BPF:meta_left:28 meta_needed:432 [ 1293.822778][T18611] BPF: [ 1293.822778][T18611] 12:47:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028000000066c0000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1293.909295][ T27] audit: type=1804 audit(1577710027.131:4877): pid=18813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/482/bus" dev="sda1" ino=18070 res=1 12:47:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000600000000000003b000000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1294.000369][ T27] audit: type=1804 audit(1577710027.131:4878): pid=18813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/482/bus" dev="sda1" ino=18070 res=1 12:47:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000001a7c5e1be1a48a55000004"]) 12:47:07 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000036100000070000000000000004"]) [ 1294.111377][T18829] BPF:Unsupported btf_header 12:47:07 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000039, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1294.142506][ T27] audit: type=1804 audit(1577710027.131:4879): pid=18813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/482/bus" dev="sda1" ino=18070 res=1 [ 1294.175378][T18834] BPF:[1] Invalid name_offset:50331648 [ 1294.290377][ T27] audit: type=1804 audit(1577710027.131:4880): pid=18813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/482/bus" dev="sda1" ino=18070 res=1 12:47:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006740000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1294.349811][ T27] audit: type=1804 audit(1577710027.161:4881): pid=18820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/482/bus" dev="sda1" ino=18070 res=1 12:47:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000007ffffff200000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1294.456206][ T27] audit: type=1804 audit(1577710027.161:4882): pid=18813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/482/bus" dev="sda1" ino=18070 res=1 [ 1294.519910][T19048] BPF:Unsupported btf_header [ 1294.636254][T19129] BPF:[1] Invalid name_offset:4294934272 12:47:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028000000067a0000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:08 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000003a, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000004"]) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000000)) 12:47:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000002b2100000070000000000000004"]) 12:47:08 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x94}]}, 0x10) 12:47:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000007ffffff800000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1295.004916][T19268] BPF:[1] Invalid name_offset:4294934272 [ 1295.006309][T19270] BPF:Unsupported btf_header 12:47:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000007ffffff900000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:08 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000003b, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006f80000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000000)=""/25) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000004"]) 12:47:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000002e110000070000000000000004"]) [ 1295.324517][T19486] BPF:[1] Invalid name_offset:4294934272 [ 1295.461488][T19595] BPF:Unsupported btf_header 12:47:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000007fffffff00000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:08 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000003c, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000300000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1295.687843][T19705] BPF:[1] Invalid name_offset:4294934272 [ 1295.828745][T19813] BPF:Unsupported btf_header 12:47:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000200000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:09 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000002b0190000070000000000000004"]) 12:47:09 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x9c}]}, 0x10) 12:47:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000500000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:09 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000003d, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1296.173469][T19928] BPF:Total section length too long 12:47:09 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000028e1c0000070000000000000004"]) [ 1296.411094][T20037] BPF:Unsupported btf_header 12:47:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000300000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:09 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000003e, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000600000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1296.753950][T20150] BPF:Total section length too long [ 1296.850510][T20223] BPF:Unsupported btf_header 12:47:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000400000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000049249240000070000000000000004"]) 12:47:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000700000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1297.042730][T20362] BPF:Total section length too long 12:47:10 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000041, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:10 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0xa4}]}, 0x10) [ 1297.156819][T20468] BPF:Unsupported btf_header 12:47:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000500000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006002000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1297.389284][T20581] BPF:Total section length too long 12:47:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000600000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1297.499694][T20686] BPF:Unsupported btf_header 12:47:10 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000042, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000088290000070000000000000004"]) 12:47:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006004800000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1297.685824][T20794] BPF:Total section length too long 12:47:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000700000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:11 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000043, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1297.940786][T20906] BPF:Unsupported btf_header [ 1298.078156][T21013] BPF:Total section length too long 12:47:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006004c00000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000800000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:11 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000044, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1298.280867][T21120] BPF:Unsupported btf_header 12:47:11 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0xac}]}, 0x10) 12:47:11 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000003f0000070000000000000004"]) [ 1298.344899][T21217] BPF:Total section length too long 12:47:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006006000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006002800000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1298.607395][T21338] BPF:Unsupported btf_header 12:47:11 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000045, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1298.707722][T21445] BPF:Total section length too long 12:47:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006006800000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:12 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000400000070000000000000004"]) 12:47:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006002e00000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1298.917665][T21555] BPF:Unsupported btf_header 12:47:12 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000046, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006006c00000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1299.177781][T21664] BPF:Total section length too long [ 1299.222918][T21676] BPF:Unsupported btf_header 12:47:12 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000002904d0000070000000000000004"]) 12:47:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006007400000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1299.513453][T21883] BPF:Unsupported btf_header 12:47:12 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0xb1}]}, 0x10) 12:47:12 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000047, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006004800000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:12 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000002b8540000070000000000000004"]) [ 1299.627950][T21987] BPF:Total section length too long 12:47:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006007a00000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006004c00000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:13 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000048, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1299.889833][T22102] BPF:Unsupported btf_header [ 1300.033865][T22207] BPF:Total section length too long 12:47:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028000000280000000600f800000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006006000000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1300.220093][T22316] BPF:Unsupported btf_header 12:47:13 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000298660000070000000000000004"]) [ 1300.300690][T22418] BPF:Total section length too long 12:47:13 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000049, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000010000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1300.592543][T22531] BPF:Unsupported btf_header 12:47:13 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{}]}, 0x10) 12:47:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006006800000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:13 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000084e30000070000000000000004"]) 12:47:13 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000004a, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000020000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1300.769200][T22639] BPF:Total section length too long 12:47:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006006c00000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:14 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000004b, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1301.007050][T22754] BPF:Unsupported btf_header [ 1301.119533][T22858] BPF:Total section length too long 12:47:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006007400000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000030000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1301.278191][T22965] BPF:Total section length too long 12:47:14 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000ff0000070000000000000004"]) 12:47:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006007a00000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:14 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000004c, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1301.437856][T23073] BPF:Unsupported btf_header [ 1301.619616][T23182] BPF:Total section length too long 12:47:15 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x2}]}, 0x10) 12:47:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000040000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000600f800000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:15 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000004d, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1301.888054][T23292] BPF:Total section length too long [ 1301.919306][T23293] BPF:Unsupported btf_header 12:47:15 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000fff0000070000000000000004"]) 12:47:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000003000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1302.202139][T23513] BPF:Total section length too long 12:47:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000050000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:15 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000004e, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000005000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1302.465342][T23623] BPF:Unsupported btf_header 12:47:15 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000007fff0000070000000000000004"]) [ 1302.490013][T23627] BPF:Total section length too long 12:47:15 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000004f, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000060000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1302.804687][T23846] BPF:Unsupported btf_header 12:47:16 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x3}]}, 0x10) 12:47:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000006000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:16 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000050, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000070000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1302.954734][T23949] BPF:Total section length too long [ 1303.114670][T24003] BPF:Unsupported btf_header 12:47:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000200000000070000000000000004"]) 12:47:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000007000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:16 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000051, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1303.338366][T24171] BPF:Total section length too long 12:47:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000200000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000020000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:16 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000052, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1303.624501][T24284] BPF:Total section length too long [ 1303.628915][T24283] BPF:Unsupported btf_header 12:47:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000028000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:17 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000053, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:17 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x4}]}, 0x10) 12:47:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000300000000070000000000000004"]) 12:47:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000480000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1303.958587][T24499] BPF:Total section length too long [ 1304.123538][T24611] BPF:Unsupported btf_header 12:47:17 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000054, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000600002e000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028000000060000004c0000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1304.339187][T24719] BPF:Total section length too long [ 1304.483536][T24827] BPF:Unsupported btf_header 12:47:17 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000055, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000048000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000600000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000400000000070000000000000004"]) [ 1304.713168][T24935] BPF:Total section length too long 12:47:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000600004c000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1304.867850][T25043] BPF:Unsupported btf_header 12:47:18 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000056, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1305.048365][T25150] BPF:Total section length too long 12:47:18 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x5}]}, 0x10) 12:47:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000680000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1305.210638][T25259] BPF:Unsupported btf_header 12:47:18 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000057, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000500000000070000000000000004"]) 12:47:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000060000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028000000060000006c0000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1305.506642][T25379] BPF:Total section length too long [ 1305.567041][T25403] BPF:Unsupported btf_header 12:47:18 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000058, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000068000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000740000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000600000000070000000000000004"]) [ 1305.909208][T25593] BPF:Total section length too long 12:47:19 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000059, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1305.999738][T25649] BPF:Unsupported btf_header 12:47:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000600006c000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1306.358687][T25810] BPF:Total section length too long 12:47:19 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x6}]}, 0x10) 12:47:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028000000060000007a0000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:19 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000005a, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000700000000070000000000000004"]) [ 1306.515117][T25919] BPF:Unsupported btf_header 12:47:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000074000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000f80000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:20 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000005b, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1306.881024][T26035] BPF:Total section length too long [ 1306.896764][T26039] BPF:Unsupported btf_header 12:47:20 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000005c, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:20 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000800000000070000000000000004"]) 12:47:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000000000000200000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000600007a000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1307.357637][T26258] BPF:Unsupported btf_header [ 1307.366064][T26256] BPF:Total section length too long 12:47:20 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000001000000000070000000000000004"]) 12:47:20 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x7}]}, 0x10) 12:47:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000000000000400000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000060000f8000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:20 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000005d, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1307.696612][T26473] BPF:Total section length too long [ 1307.734795][T26478] BPF:Unsupported btf_header 12:47:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000600ffffff0000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000000000000800000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1307.972390][T26684] BPF:Total section length too long 12:47:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000100000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:21 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000005e, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:21 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000002800000000070000000000000004"]) [ 1308.172254][T26790] BPF:Unsupported btf_header [ 1308.268482][T26839] BPF:[1] Invalid name_offset:256 12:47:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000000000002500000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000200000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:21 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x8}]}, 0x10) [ 1308.683089][T27011] BPF:[1] Invalid name_offset:512 12:47:21 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000005f, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1308.733469][T27016] BPF:Unsupported btf_header 12:47:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000005000000000070000000000000004"]) 12:47:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000300000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000000000003200000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1309.191574][T27230] BPF:[1] Invalid name_offset:768 [ 1309.269782][T27249] BPF:Unsupported btf_header 12:47:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000400000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:22 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000060, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000006000000000070000000000000004"]) 12:47:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028000000280000000600000000000003b400000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1309.537426][T27442] BPF:[1] Invalid name_offset:1024 [ 1309.608243][T27449] BPF:Unsupported btf_header 12:47:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000500000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:23 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0xc}]}, 0x10) [ 1309.756762][T27656] BPF:[1] Invalid name_offset:1280 12:47:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000007ffffff200000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1309.912363][T27765] BPF:Unsupported btf_header 12:47:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000600000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000008800000000070000000000000004"]) 12:47:23 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000061, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000007ffffff800000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1310.067108][T27874] BPF:[1] Invalid name_offset:1536 [ 1310.238882][T27984] BPF:Unsupported btf_header 12:47:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000700000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1310.375792][T28028] BPF:[1] Invalid name_offset:1792 12:47:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000007ffffff900000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:23 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000062, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000800000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1310.651670][T28197] BPF:Unsupported btf_header 12:47:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000003000000070000000000000004"]) 12:47:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000007fffffff00000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1310.824087][T28305] BPF:[1] Invalid name_offset:2048 12:47:24 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0xf}]}, 0x10) [ 1310.993963][T28413] BPF:Unsupported btf_header 12:47:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000002000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:24 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000063, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000200000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1311.341601][T28527] BPF:[1] Invalid name_offset:8192 [ 1311.397261][T28542] BPF:Unsupported btf_header 12:47:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000005000000070000000000000004"]) 12:47:24 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000064, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000002800000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000300000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1311.738198][T28747] BPF:[1] Invalid name_offset:10240 [ 1311.776618][T28749] BPF:Unsupported btf_header 12:47:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000002e00000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1311.993353][T28956] BPF:[1] Invalid name_offset:11776 12:47:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000400000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:25 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000065, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000006000000070000000000000004"]) 12:47:25 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x10}]}, 0x10) 12:47:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000004800000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1312.215812][T29067] BPF:Unsupported btf_header [ 1312.442432][T29176] BPF:[1] Invalid name_offset:18432 12:47:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000500000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000004c00000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1312.722114][T29282] BPF:Unsupported btf_header 12:47:26 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000066, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000007000000070000000000000004"]) 12:47:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000600000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1312.867706][T29386] BPF:[1] Invalid name_offset:19456 [ 1313.110189][T29498] BPF:Unsupported btf_header 12:47:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000006000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:26 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x14}]}, 0x10) 12:47:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000003610000000070000000000000004"]) [ 1313.369379][T29606] BPF:[1] Invalid name_offset:24576 12:47:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000700000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:26 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000067, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000006800000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1313.627015][T29719] BPF:Unsupported btf_header [ 1313.792143][T29825] BPF:[1] Invalid name_offset:26624 12:47:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006004800000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000002e11000000070000000000000004"]) 12:47:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000006c00000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1314.040208][T29933] BPF:[1] Invalid name_offset:27648 12:47:27 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000068, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1314.138653][T30039] BPF:Unsupported btf_header 12:47:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000007400000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006004c00000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1314.443182][T30149] BPF:[1] Invalid name_offset:29696 12:47:27 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x15}]}, 0x10) [ 1314.638862][T30257] BPF:Unsupported btf_header 12:47:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000028000000070000000000000004"]) 12:47:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000007a00000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:28 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000069, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006006000000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1314.889015][T30366] BPF:[1] Invalid name_offset:31232 [ 1315.052506][T30474] BPF:Unsupported btf_header 12:47:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000600000000f800000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1315.214868][T30579] BPF:[1] Invalid name_offset:63488 12:47:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006006800000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000060000ffffff00000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000008829000000070000000000000004"]) [ 1315.382164][T30685] BPF:Unsupported btf_header 12:47:28 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000006a, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1315.539861][T30790] BPF:Total section length too long 12:47:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006006c00000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:28 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x16}]}, 0x10) 12:47:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000002000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1315.784582][T30902] BPF:Unsupported btf_header [ 1315.975687][T31011] BPF:Total section length too long 12:47:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006007400000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:29 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000006b, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000112e000000070000000000000004"]) 12:47:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000003000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1316.241802][T31119] BPF:Unsupported btf_header [ 1316.419308][T31227] BPF:Total section length too long 12:47:29 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000006c, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006007a00000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000004000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1316.664614][T31336] BPF:Unsupported btf_header [ 1316.782992][T31426] BPF:Total section length too long 12:47:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028000000280000000600f800000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:30 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x18}]}, 0x10) 12:47:30 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000006d, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000005000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000001036000000070000000000000004"]) [ 1317.052889][T31550] BPF:Unsupported btf_header [ 1317.137159][T31565] BPF:Total section length too long 12:47:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000003000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000006000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:30 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000006e, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1317.479835][T31774] BPF:Total section length too long [ 1317.500123][T31777] BPF:Unsupported btf_header 12:47:30 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0xc4000) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) pivot_root(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='./bus\x00') sendfile(r1, r2, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, 0x0) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r3, 0x0, 0x2) sendfile(r3, r4, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r4, 0x2270, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r4}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000080)={r5}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000001840)='/dev/net/tun\x00', 0x54b180, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000001900)={0x0, 0x5, 0xfffffffffffffffb, 0x100}) r8 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r9 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r8, 0x0, 0x2) sendfile(r8, r9, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r9, 0x2270, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r9, 0x29, 0x2a, &(0x7f0000000200)={0xdde, {{0xa, 0x4e20, 0x2, @mcast2, 0x8}}}, 0x88) ioctl$FS_IOC_FIEMAP(r6, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000501c9de100000700d3785914c20004"]) [ 1317.665040][ T27] audit: type=1804 audit(1577710050.891:4883): pid=31982 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/486/bus" dev="sda1" ino=16913 res=1 12:47:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000005000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000007000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000003f000000070000000000000004"]) [ 1317.847349][ T27] audit: type=1804 audit(1577710050.941:4884): pid=31982 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/486/bus" dev="sda1" ino=16913 res=1 [ 1317.863001][T31991] BPF:Unsupported btf_header [ 1317.914793][T31994] BPF:Total section length too long [ 1317.990491][ T27] audit: type=1804 audit(1577710050.951:4885): pid=31982 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/486/bus" dev="sda1" ino=16913 res=1 12:47:31 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000006f, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:31 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x1c}]}, 0x10) 12:47:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000006000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000008000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000700000000000000043214778cefeb1f889af385f51c6862bd12a275a3eb7dd0a7a85c1aa2f6cf1b6c59bd482ee861f45fa40c548a0856c0e07f027a4a68cf5338f88c519f229ed86f43f8a63f340cd1dcb23b3ee34d4e3d9c726bf4aa6e253af7bd1baaa0e8a07c07b22a1c8363b09fc641014bd50e5d86"]) [ 1318.096353][ T27] audit: type=1804 audit(1577710050.991:4886): pid=31982 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/486/bus" dev="sda1" ino=16913 res=1 [ 1318.126817][ T27] audit: type=1804 audit(1577710051.041:4887): pid=31986 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/486/bus" dev="sda1" ino=16913 res=1 [ 1318.244776][T32211] BPF:Unsupported btf_header [ 1318.316807][T32247] BPF:Total section length too long [ 1318.355072][ T27] audit: type=1804 audit(1577710051.111:4888): pid=31982 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/486/bus" dev="sda1" ino=16913 res=1 12:47:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000007000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000040000000070000000000000004"]) [ 1318.502062][ T27] audit: type=1804 audit(1577710051.121:4889): pid=31993 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/486/bus" dev="sda1" ino=16913 res=1 12:47:31 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000070, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000028000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1318.699810][T32433] BPF:Total section length too long [ 1318.719324][ T27] audit: type=1804 audit(1577710051.121:4890): pid=31986 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/486/bus" dev="sda1" ino=16913 res=1 [ 1318.743611][T32444] BPF:Unsupported btf_header 12:47:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000600002e000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000050000000070000000000000004"]) 12:47:32 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000780)={0x8, {{0xa, 0x4e24, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}}, 0x1, 0x7, [{{0xa, 0x4e20, 0x800, @rand_addr="4fd111589393ef58e636cb7b53998690", 0x2}}, {{0xa, 0x4e24, 0x40, @loopback, 0x4ab6}}, {{0xa, 0x4e24, 0x3, @mcast1, 0x3ff}}, {{0xa, 0x4e24, 0x6e, @loopback, 0xffffffff}}, {{0xa, 0x4e23, 0xffffffff, @remote, 0x6}}, {{0xa, 0x4e20, 0xff, @rand_addr="9d51acc29b29f20d544dde5679de048b", 0x3ff}}, {{0xa, 0x4e23, 0xfffff001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}]}, 0x410) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000004"]) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001900)=ANY=[@ANYBLOB="380000002400e50d000011000000000000997b98", @ANYRES32=r5, @ANYBLOB="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"], 0x38}}, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r7 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0xa5, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000340)={{0x4000, 0x2, 0x20}, 's\xf9z0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf4\xff\xff\xff\x00', 0x4}) bind$vsock_stream(r2, &(0x7f0000000240)={0x28, 0x0, 0xffffffff}, 0x10) ioctl$UI_DEV_CREATE(r8, 0x5501) r9 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r9, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00', 0x4}) ioctl$UI_DEV_CREATE(r9, 0x5501) lseek(r9, 0x95f7, 0x1) sendfile(r6, r7, 0x0, 0x20008) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r6, 0x10f, 0x84, &(0x7f0000000040), &(0x7f0000000080)=0x4) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$GIO_UNISCRNMAP(r10, 0x4b69, &(0x7f0000000100)=""/142) [ 1318.914099][ T27] audit: type=1804 audit(1577710051.181:4891): pid=31982 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/486/bus" dev="sda1" ino=16913 res=1 12:47:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000020000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1319.035647][T32651] BPF:Total section length too long [ 1319.080369][ T27] audit: type=1804 audit(1577710051.181:4892): pid=31996 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/486/bus" dev="sda1" ino=16913 res=1 [ 1319.121327][T32672] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1319.194015][T32672] input: sùz0 as /devices/virtual/input/input775 [ 1319.208500][T32762] BPF:Unsupported btf_header 12:47:32 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x1d}]}, 0x10) 12:47:32 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000071, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000048000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000048000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1319.409755][ T404] BPF:Total section length too long [ 1319.418233][ T351] input: syz0 as /devices/virtual/input/input776 12:47:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000060000000070000000000000004"]) [ 1319.573539][ T513] BPF:Unsupported btf_header 12:47:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000600004c000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:32 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000072, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1319.720222][T32672] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 12:47:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028000000280000000600004c000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1319.779471][ T626] BPF:Total section length too long [ 1319.780249][ T622] input: sùz0 as /devices/virtual/input/input777 [ 1319.857637][T32672] input: syz0 as /devices/virtual/input/input778 [ 1319.970124][ T737] BPF:Unsupported btf_header 12:47:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000060000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000060000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1320.225534][ T849] BPF:Total section length too long 12:47:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000e384000000070000000000000004"]) 12:47:33 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000073, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1320.274791][ T854] BPF:Unsupported btf_header 12:47:33 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x21}]}, 0x10) 12:47:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) r1 = getpid() ptrace(0x10, r1) ptrace$getsig(0x2, r1, 0xffffffffff600043, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYRESDEC]) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r3, 0x2270, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1, 0x2000) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f0000000780)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r6}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x9, @rand_addr="98b69e5fda4ca164ae1dbb539e4a915b", 0xfaed}, {0xa, 0x4e22, 0x5, @remote}, r6, 0x1}}, 0x48) openat$cgroup_ro(r3, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) 12:47:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000068000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000068000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1320.623759][ T1076] BPF:Total section length too long 12:47:33 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000074, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1320.777247][ T1187] BPF:Unsupported btf_header 12:47:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000600006c000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000088000000070000000000000004"]) 12:47:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4, 0x3}, {0x40, 0x4}]}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000004"]) 12:47:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028000000280000000600006c000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1320.967063][ T1299] BPF:Total section length too long [ 1321.113116][ T1400] BPF:Unsupported btf_header 12:47:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000074000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:34 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000075, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000074000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1321.374943][ T1523] BPF:Total section length too long 12:47:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000002988000000070000000000000004"]) 12:47:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000004"]) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x20008) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 12:47:34 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x24}]}, 0x10) [ 1321.474269][ T1603] BPF:Unsupported btf_header 12:47:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028000000280000000600007a000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000600007a000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:35 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000076, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1321.856434][ T1757] BPF:Unsupported btf_header 12:47:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000084e3000000070000000000000004"]) [ 1321.915080][ T1761] BPF:Total section length too long 12:47:35 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00', 0x4}) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x0, 0xb, 0x4, 0x20000, 0x32, {0x77359400}, {0x371d8b781ab5bf5e, 0x8, 0x2d, 0x1, 0x3, 0x1f, "e8adc6e4"}, 0x0, 0x2, @planes=&(0x7f0000000200)={0x4, 0xfffffffd, @fd=r1, 0x4}, 0x4, 0x0, r2}) r4 = openat$cgroup_ro(r3, &(0x7f0000000080)='pids.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000004"]) ioctl$BINDER_THREAD_EXIT(r4, 0x40046208, 0x0) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000100)=""/214, 0xd6, 0xe048da11fbd0cfc7, &(0x7f0000000000)={0x9, @remote={[], 0x3}}, 0x12) 12:47:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000060000f8000000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028000000060000f8000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1322.202190][ T1991] BPF:Total section length too long [ 1322.272483][ T1994] input: syz0 as /devices/virtual/input/input779 12:47:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000030000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:35 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000077, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000ff000000070000000000000004"]) [ 1322.450013][ T2206] BPF:[1] ENUM [ 1322.460301][ T2206] BPF:size=1 vlen=1 [ 1322.470597][ T2206] BPF: [ 1322.480252][ T2206] BPF:Invalid name 12:47:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000000100000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1322.505754][ T2206] BPF: [ 1322.505754][ T2206] [ 1322.677249][ T2317] BPF:Unsupported btf_header 12:47:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) eventfd(0x9) eventfd(0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000004"]) 12:47:35 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x25}]}, 0x10) 12:47:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000050000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000000200000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1322.963573][ T2434] BPF:[1] ENUM 12:47:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00', 0x4}) ioctl$UI_DEV_CREATE(r5, 0x5501) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000040)={0x1, 0x8, 0x4, 0x10000, 0x6, {r3, r4/1000+30000}, {0x2, 0x1e, 0x8, 0x6, 0x1f, 0x23, "70f19695"}, 0x0, 0x4, @userptr=0x3, 0x8, 0x0, r5}) ioctl$VIDIOC_S_AUDIO(r6, 0x40345622, &(0x7f0000000100)={0x0, "fc1b5d68ff52643b094d2b3ba3e8b616234612850965db0dee9456ffc841e706", 0x1, 0x1}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000003ae836941356cba700000004"]) [ 1322.997433][ T2434] BPF:size=1 vlen=1 12:47:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000fff000000070000000000000004"]) 12:47:36 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000078, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1323.023623][ T2434] BPF: [ 1323.038657][ T2434] BPF:Invalid name [ 1323.045711][ T2437] BPF:Unsupported btf_header [ 1323.052656][ T2434] BPF: [ 1323.052656][ T2434] [ 1323.196036][ T27] kauditd_printk_skb: 11 callbacks suppressed [ 1323.196057][ T27] audit: type=1804 audit(1577710056.421:4904): pid=2612 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/494/bus" dev="sda1" ino=16908 res=1 [ 1323.213649][ T2612] input: syz0 as /devices/virtual/input/input780 12:47:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000000300000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000060000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1323.539624][ T2668] BPF:[1] Invalid name_offset:6 12:47:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000007fff000000070000000000000004"]) [ 1323.561438][ T2669] BPF:Unsupported btf_header 12:47:36 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000079, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1323.711052][ T27] audit: type=1804 audit(1577710056.931:4905): pid=2885 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/494/bus" dev="sda1" ino=16908 res=1 12:47:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000070000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000000400000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:37 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x28}]}, 0x10) 12:47:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)=ANY=[@ANYBLOB="c001afa434abf9bcac599c000000000000008000000000000000d6aa2d1db7df6bb45c9d5e8e226268e0a207ec49"]) fgetxattr(r0, &(0x7f0000000000)=@known='trusted.overlay.impure\x00', &(0x7f0000000100)=""/167, 0xa7) 12:47:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000148020000070000000000000004"]) [ 1324.039911][ T2900] BPF:Unsupported btf_header [ 1324.127605][ T2904] BPF:[1] Invalid name_offset:7 12:47:37 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000007a, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000000500000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000200000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000f88020000070000000000000004"]) 12:47:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x1) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x20008) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r3, 0x0, 0x2) sendfile(r3, r4, 0x0, 0x20008) ioctl$VHOST_GET_FEATURES(r3, 0x8008af00, &(0x7f00000001c0)) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x14, 0x0, 0x1, 0x0, 0x40, r2, 0x5, [], 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x3c) fsetxattr$security_selinux(r5, &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:devlog_t:s0\x00', 0x1e, 0x2) r6 = shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_INFO(r6, 0xe, &(0x7f00000000c0)=""/35) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0xfffffffffffffffd, 0x90c, 0x100}) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/n\xcd\xb1\xdd \xe3\x1fiO\x00', 0x204081, 0x0) mmap$usbfs(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x10, r7, 0x2) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[]) [ 1324.489164][ T3121] BPF:Unsupported btf_header [ 1324.573158][ T3198] BPF:[1] Invalid name_offset:32 12:47:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000000600000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:37 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000007b, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000280000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1324.763255][ T27] audit: type=1804 audit(1577710057.981:4906): pid=3384 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/496/bus" dev="sda1" ino=16891 res=1 [ 1324.808470][ T3386] BPF:Unsupported btf_header [ 1324.885492][ T3435] BPF:[1] Invalid name_offset:40 [ 1324.898196][ T27] audit: type=1804 audit(1577710057.981:4907): pid=3384 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/496/bus" dev="sda1" ino=16891 res=1 [ 1324.924695][ T27] audit: type=1804 audit(1577710058.011:4908): pid=3384 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/496/bus" dev="sda1" ino=16891 res=1 [ 1324.970808][ T27] audit: type=1804 audit(1577710058.181:4909): pid=3384 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/496/bus" dev="sda1" ino=16891 res=1 [ 1325.007201][ T27] audit: type=1804 audit(1577710058.191:4910): pid=3515 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/496/bus" dev="sda1" ino=16891 res=1 12:47:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000000700000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1325.042069][ T27] audit: type=1804 audit(1577710058.221:4911): pid=3384 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/496/bus" dev="sda1" ino=16891 res=1 12:47:38 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x2c}]}, 0x10) 12:47:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000001c8e020000070000000000000004"]) 12:47:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000060000002e0000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:38 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x80, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x20008) r4 = syz_open_dev$vcsu(&(0x7f0000000300)='/dev/vcsu#\x00', 0x1ff, 0x40000) r5 = openat$cgroup_ro(r4, &(0x7f0000000400)='pids.events\x00', 0x275a, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r7 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r6, 0x0, 0x2) sendfile(r6, r7, 0x0, 0x20008) openat$cgroup_ro(r6, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r8 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r9 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r8, 0x0, 0x2) sendfile(r8, r9, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r9, 0x2270, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000000c0)={r10, @in6={{0xa, 0x4e22, 0x0, @remote, 0x1}}}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={r10, 0x6}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r9, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r11, 0x5}, &(0x7f0000000100)=0x8) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, &(0x7f0000000200)=ANY=[@ANYBLOB="f0c5dc6a857411e8c95a1ff32f7ee504f11120314284f8af3cc53af8e4bcaac8399c41149a4c0100000000236db3000000000614b481181838b5ab03b8676efb01fd6eb8a52452fec93959d9ed6ddacd074e6e388da05904bc0b5b56d13069ab7bfe1e7145db28c8511d557787624d4a92b56ec8"]) [ 1325.249357][ T3618] BPF:Unsupported btf_header [ 1325.345774][ T3713] BPF:[1] Invalid name_offset:46 12:47:38 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000007c, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1325.391115][ T27] audit: type=1804 audit(1577710058.611:4912): pid=3735 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/497/bus" dev="sda1" ino=16937 res=1 [ 1325.440816][ T27] audit: type=1804 audit(1577710058.651:4913): pid=3735 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/497/bus" dev="sda1" ino=16937 res=1 12:47:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000002000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x202000, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="0004000000000000000000000000000000461a86e0b669cccc145104121e958eaef52c729559e0dbccd95f98d3c4905513814ef5d5ac951277bfb0e4c81afea78cf25b2e3da57391d571a25e450e69b0cc8440a2a3ae2118ff7571ff0bfa953f9afd810a9d2cd9fa6de55d949f404ac79a28faee70e4b969ce4aefe1af862f60b78eb3c72f738cba45cdc68810987ef120a29a0ef2af3298f6401213e252c6aef6e714dc9e7e94f68c346fd0700035b4ed01efd70bb134fedce84bd3cfc438bdb03bfbcf1fa5eaeadceb9cb63b5278e6c364e40f9120903e33a757f47cacc4ead54ecb22b4da23000000c20000000000"]) 12:47:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000480000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1325.673465][ T3851] BPF:Unsupported btf_header 12:47:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000004d90020000070000000000000004"]) 12:47:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000004800000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="009d9736690789ad762856ed10d41700000000000000070000000000000004f3bf71de272fda4d60f220afa945ce2ee70acc405d43244bc969ff0725eb2edf8e735b29af8b97c4709abe8b6f343b3af81976d7f4a89b8c093ebaab97b3eeb862d0e7213e01b0f857e61cc98223638bcc026f84203919c3b1ea1b6301ea571d1f65809608a2e93195bcf5e037f5340554f91dd22c9c51547d33117b4e19a807276f2549696362e8c747b2349d3ffcc3fc01f3b9fad10000"]) [ 1326.010640][ T4073] BPF:Unsupported btf_header 12:47:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000060000004c0000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:39 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x2d}]}, 0x10) 12:47:39 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000007d, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000006698020000070000000000000004"]) 12:47:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000070000000000000004ef51c43869e4d648b2615cb989c80da98314497d3128a6912fda31cba408cf728ba918e9f6150d37a23bc2fc3df1811106ef97eb"]) 12:47:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000004c00000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1326.242702][ T4180] BPF:[1] Invalid name_offset:76 [ 1326.460411][ T4296] BPF:Unsupported btf_header 12:47:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000600000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000006000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1326.683076][ T4405] BPF:[1] Invalid name_offset:96 12:47:39 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000007e, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000680000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000019b0020000070000000000000004"]) 12:47:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="25547fc1fe43481955cc3101000000008e4cf4a3bc53fed2b9964ec6229bc419cce10a8b209f41d801074f491d89f689374a8236b15005778eba92c269bbe6ce56c37aa5dcf176183651e44a7a2e35050234c258760ebf2f28fd91b13af13966e8f79b45897920da98e3276cf993442ca84ceabccd0ffc59b7d4e122dd0ba6fd03a2338fe2da2e8bafe07d66cf3da8db80b5ab2250e01e6eaa6d0e235dbd174d490163c86854fb6bab39fba6a0c3265d6084ee558717ef5c6c58bef6d23e3064e89bf2acb636324e30adc1f2123ca384ecc04c3ca56234fda3395a63ee1954b81f24686b1e1f"]) [ 1326.916428][ T4513] BPF:Unsupported btf_header [ 1327.060810][ T4610] BPF:[1] Invalid name_offset:104 12:47:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000006800000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1327.272967][ T4734] BPF:Unsupported btf_header 12:47:40 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x30}]}, 0x10) 12:47:40 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000082, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000060000006c0000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000006c00000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000010b2020000070000000000000004"]) [ 1327.433046][ T4841] BPF:[1] Invalid name_offset:108 12:47:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) r1 = getpid() ptrace(0x10, r1) ptrace$getsig(0x2, r1, 0xffffffffff600043, &(0x7f0000000000)) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00', 0x4}) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000080)) r3 = getpid() ptrace(0x10, r3) ptrace$getsig(0x2, r3, 0xffffffffff600043, &(0x7f0000000000)) r4 = getpid() ptrace(0x10, r4) ptrace$getsig(0x2, r4, 0xffffffffff600043, &(0x7f0000000000)) r5 = getpid() ptrace(0x10, r5) ptrace$getsig(0x2, r5, 0xffffffffff600043, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="9c6f28dfaa20b8d2ad6f98e4df32fd6b1f445563d0e621757efa5fb03f891f523c21bb27236a4a55b7143a6ac1a551cef05f87d238a9d5b8911fa600d7eb3b21bc7866503163fdc3e055f762537a6a75a7adf381bcc76bffd2300d7afddc1f450c313d3387d900094d60ad023ee1a79fe411eaef59c01ffdfaa9bd0adc5aa87bb198e2fafd9bff5b860c922c73150f5dcebbab2de140aab731770a42fcf805c171b467d448037f992c7217b003e3ca4d53fcf2a096ba23080348d1f72df022c41e13435f55b09c21e077dbc5287dd3f9ac879f7e0b632c", @ANYRES64=r5], @ANYBLOB="1d26e56ea831854b83858bdb884a773b93e983226525d0bc77e02346c79083f484b15dd56546b1091062ef85841d88b84c2befbdad89038d2ee55a7e9e31029e2048e3d405d28764264719dd80233d696bdf0a3410c60d5a6a53fd7eee236c77a69199f81fc39cafc5189d5e8dad56026b7c24b887fdd68bb086ee7d80efce73788de0bf8aa140ec27589e3b8e3d6602632dda505eb63863b4bb6250a99b"]]) 12:47:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000740000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1327.674588][ T4956] BPF:Unsupported btf_header [ 1327.788727][ T4998] input: syz0 as /devices/virtual/input/input781 [ 1327.841866][ T5065] BPF:[1] Invalid name_offset:116 12:47:41 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000083, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000007400000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1327.993569][ T4998] input: syz0 as /devices/virtual/input/input782 12:47:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000060000007a0000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000054b8020000070000000000000004"]) [ 1328.177766][ T5179] BPF:Unsupported btf_header [ 1328.234296][ T5184] BPF:[1] Invalid name_offset:122 12:47:41 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000084, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000f80000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) io_setup(0x7fff, &(0x7f0000000000)=0x0) r2 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x88) lseek(r3, 0x0, 0x2) sendfile(r3, r4, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r4, 0x2270, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r7 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r8 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r7, 0x0, 0x2) sendfile(r7, r8, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r8, 0x2270, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0x10, &(0x7f00000006c0)=@sack_info={0x0, 0x2, 0x3ff}, &(0x7f0000000700)=0xc) getsockopt$inet_sctp6_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000000780)={r9, 0x7fff, 0x3, 0x1043}, &(0x7f00000007c0)=0x10) lseek(r5, 0x0, 0x2) sendfile(r5, r6, 0x0, 0x20008) r10 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r10, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00', 0x4}) ioctl$UI_DEV_CREATE(r10, 0x5501) r11 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r12 = open(&(0x7f0000000100)='./bus\x00', 0x80, 0x0) lseek(r11, 0x0, 0x2) sendfile(r11, r12, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r12, 0x2270, 0x0) r13 = open_tree(0xffffffffffffff9c, &(0x7f0000000800)='./bus\x00', 0x81000) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) io_submit(r1, 0x6, &(0x7f0000000680)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x4b, r0, &(0x7f0000000040)="d6c4ece593c513d27df3b0bed9e5eb9ee6a5ee9153e6c68c59c87c66cd78111b3a4db52e0685e5da06b811fef77043943225ddf534f661b4f1655f2b35a7847b00bada101910ffe58351c9e2ec88a554d13f72653fcef14787c426c818bd3c", 0x5f, 0x5, 0x0, 0x0, r0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x5, 0xfffa, r2, &(0x7f0000000140)="9879d4c1e340ff323798d4eaf79c1cb86c00913e7e179683038abdc5f54726300ad5f2ec037fefa2aa91a151d7520ca8e737798c3824273bdba5a8ad202740ed5f50b778f7795e4adabf339736af3eeb5c", 0x51, 0x5, 0x0, 0x0, r8}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x8, r14, &(0x7f0000000200)="1725f7e660e9726dc0c76c36d29211f6cd3657c21f8ed82a1d0880d2affeaafe0a07fb8b4b4f59cb021cbed43b667da78cfcc925a7a1302fa1cd835c7ab8c820f9142220c0a1e0a63868b16dfc0b0f8e4b3576ebb8b8756c365ae8924d6505b7a89e0bb3de1f68c420a7238c49f7f2d6c1c99d156a4a414962c235c4c7d25c85e15bc3c5a42149f00cc02888845ffaa553ffd19a728c4644dacc2025d0feb17d0804d4f718b2ec4e360b", 0xaa, 0xfffffffffffffffd, 0x0, 0x2, r11}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x1ff, r0, &(0x7f0000000300)="9010206b2d762b3cc834091220de7521bcd6b5a419e134aadd8a13264c1ef916c1e96480c10a618c7e1c9a54aa7545143dba9803641ec70a06ba05b0e47bc4a7bb3c3e67cb44a01f001beee29a65226d6aeb71f02df04692ee94c0d1713c42c997afd14c97b4c8f907c517fc07ff5626f2e8da974fccd4ca8decdb17df2ffce12d1ba2a675188c040337c9ccbbc80f9c71b7bba2f7300c96e246ee", 0x9b, 0x40000101, 0x0, 0x2, r0}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x8, 0x825c, r10, &(0x7f0000000400)="ae6ce5fa71ee5e2ac5fe47b952a89803604f04b2c5ec04ebcb0f02f8ecf0708fdb3fb52b660ce31c1e078f2761b9cb15b34e452fa3f8897e6460cc430ceb645868b6e56efe0ae167d28d18f4445c806f2d382ad9e2dc62ecc13a6cc9b65cb9e020838c28b20ea533d2bf7d3e95c99505c0ee0d845704f6f7ad70bcb650e6c9d53622c425c4de1ff1a3c7e1c90849da5aa76510e24fb181a760567ee26dcd1ed230e8b844baea4354e401440592e84d8f0b3ac64645b4309ae96555c788b396a4e9ba8dc58a3129b3d66aed62b2bf138c51588aa1a385c755", 0xd8, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x3, r13, &(0x7f0000000840)="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", 0x173, 0xffffffff, 0x0, 0x0, r12}]) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[]) 12:47:41 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x34}]}, 0x10) 12:47:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000007a00000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1328.573335][ T5400] BPF:[1] Invalid name_offset:248 [ 1328.650652][ T27] kauditd_printk_skb: 12 callbacks suppressed [ 1328.650678][ T27] audit: type=1804 audit(1577710061.871:4926): pid=5402 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/503/bus" dev="sda1" ino=16919 res=1 12:47:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000060000ffffff00000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1328.714562][ T5402] input: syz0 as /devices/virtual/input/input783 [ 1328.765042][ T5508] BPF:Unsupported btf_header [ 1328.820257][ T27] audit: type=1804 audit(1577710061.881:4927): pid=5402 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/503/bus" dev="sda1" ino=16919 res=1 [ 1328.885116][ T5577] BPF:Total section length too long 12:47:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000f0030000070000000000000004"]) 12:47:42 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000085, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028000000280000000600000000f800000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1328.947447][ T27] audit: type=1804 audit(1577710061.881:4928): pid=5402 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/503/bus" dev="sda1" ino=16919 res=1 [ 1328.964119][ T5402] input: syz0 as /devices/virtual/input/input784 12:47:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000001000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1329.136892][ T27] audit: type=1804 audit(1577710061.881:4929): pid=5402 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/503/bus" dev="sda1" ino=16919 res=1 [ 1329.238042][ T5734] BPF:Unsupported btf_header [ 1329.241493][ T27] audit: type=1804 audit(1577710061.881:4930): pid=5402 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/503/bus" dev="sda1" ino=16919 res=1 [ 1329.292693][ T5737] BPF:[1] Invalid name_offset:65536 [ 1329.352325][ T27] audit: type=1804 audit(1577710061.971:4931): pid=5402 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/503/bus" dev="sda1" ino=16919 res=1 [ 1329.439955][ T27] audit: type=1804 audit(1577710061.991:4932): pid=5402 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/503/bus" dev="sda1" ino=16919 res=1 12:47:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000008040000070000000000000004"]) 12:47:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000002000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000002000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="cc000000", @ANYRES16=r4, @ANYBLOB="10032abd7000fedbdf2509000000100024000c000700000000000200000008000600da9e00000800040006000000280001000800090045000000080008000080000008000900660000000c00070002000000a5c8aeb50800040004000000340003000800030003000000140002006e657464657673696d300000000000001400020062726964676530000000000000000000080005000500000008000600406300002400020008000e004e2200000800099d12ff0100000800030000000000"], 0xcc}}, 0x75faa28a468970e5) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xb8, r4, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1ff}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4101}, 0x4000000) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x1, 0x80000000}) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00', 0x4}) ioctl$UI_DEV_CREATE(r5, 0x5501) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYRES64]) [ 1329.671986][ T5948] BPF:[1] Invalid name_offset:131072 [ 1329.678535][ T27] audit: type=1804 audit(1577710062.121:4933): pid=5605 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/503/bus" dev="sda1" ino=16919 res=1 12:47:43 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x35}]}, 0x10) 12:47:43 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000086, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1329.790848][ T5956] BPF:Unsupported btf_header [ 1329.847263][ T27] audit: type=1804 audit(1577710062.131:4934): pid=5605 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/503/bus" dev="sda1" ino=16919 res=1 12:47:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000028040000070000000000000004"]) 12:47:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000003000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000003000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1329.963994][ T6134] input: syz0 as /devices/virtual/input/input785 [ 1330.016655][ T27] audit: type=1804 audit(1577710062.141:4935): pid=5584 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/503/bus" dev="sda1" ino=16919 res=1 [ 1330.232594][ T6178] BPF:[1] Invalid name_offset:196608 [ 1330.255401][ T6180] BPF:Unsupported btf_header 12:47:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000004000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000050040000070000000000000004"]) 12:47:43 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000087, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000004000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000010000070000000000000004"]) [ 1330.636442][ T6389] BPF:Unsupported btf_header [ 1330.665139][ T6394] BPF:[1] Invalid name_offset:262144 12:47:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000005000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:44 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x3c}]}, 0x10) 12:47:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000005000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1330.948992][ T6607] BPF:[1] Invalid name_offset:327680 12:47:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)=ANY=[]) [ 1331.124315][ T6717] BPF:Unsupported btf_header 12:47:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000006000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:44 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000088, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000068040000070000000000000004"]) 12:47:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000006000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1331.346262][ T6831] BPF:[1] Invalid name_offset:393216 12:47:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000007000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000480040000070000000000000004"]) 12:47:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) fcntl$setlease(r0, 0x400, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000004"]) [ 1331.578570][ T6939] BPF:Unsupported btf_header [ 1331.676064][ T6985] BPF:[1] Invalid name_offset:458752 12:47:45 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000089, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000007000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:45 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x3d}]}, 0x10) 12:47:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000008000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1332.009325][ T7163] BPF:[1] Invalid name_offset:524288 12:47:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000e1070000070000000000000004"]) [ 1332.070112][ T7235] BPF:Unsupported btf_header 12:47:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000071c000000000000046b8607f89b49a642f6ef52012abc5b1b506372da596de50838034750a9fbd2b8d34a709d0b29f60703df2a7df233d6696d12c28e98c250b96abc3ac4076ec00000000000000009366e954f9bafe6b04ff540d15f4a6ff762fdeb3f5a80e591825e3097c011a2"]) 12:47:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000020000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1332.309465][ T7376] BPF:[1] Invalid name_offset:2097152 12:47:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000048000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:45 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000008a, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000028000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1332.563138][ T7489] BPF:Unsupported btf_header 12:47:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000004080000070000000000000004"]) 12:47:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028000000280000000600004c000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1332.738663][ T7599] BPF:[1] Invalid name_offset:2621440 [ 1332.853125][ T7693] BPF:Unsupported btf_header 12:47:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x8, 0x80000000}) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x0, 0xa09, 0x5, [], &(0x7f0000000040)=0xff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000070000000000000004"]) 12:47:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000060000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:46 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x44}]}, 0x10) 12:47:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000600000000002e000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:46 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000008b, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1333.078410][ T7817] BPF:Unsupported btf_header 12:47:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000100000070000000000000004"]) [ 1333.170448][ T7871] BPF:[1] Invalid name_offset:3014656 12:47:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000068000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000048000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:46 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000008c, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1333.574312][ T8066] BPF:Unsupported btf_header [ 1333.654417][ T8143] BPF:[1] Invalid name_offset:4718592 12:47:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000600000000004c000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028000000280000000600006c000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000280000070000000000000004"]) 12:47:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='memory.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000004"]) [ 1333.870520][ T8279] BPF:[1] Invalid name_offset:4980736 [ 1333.976148][ T8322] BPF:Unsupported btf_header 12:47:47 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000008d, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:47 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x45}]}, 0x10) 12:47:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000060000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000074000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000004280000070000000000000004"]) [ 1334.398809][ T8506] BPF:[1] Invalid name_offset:6291456 12:47:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000004"]) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x20008) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1, 0x0, 0x5, 0x1}, {0x40, 0x8, 0x0, 0x9}, {0x42a, 0x5, 0x8, 0x1}, {0x3, 0xd1, 0x1f, 0x2}]}) 12:47:47 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000008e, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1334.511975][ T8612] BPF:Unsupported btf_header 12:47:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000068000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f0000000000000028000000280000000600007a000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1334.789033][ T8728] BPF:[1] Invalid name_offset:6815744 [ 1334.803847][ T27] kauditd_printk_skb: 6 callbacks suppressed [ 1334.803868][ T27] audit: type=1804 audit(1577710068.011:4942): pid=8727 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/511/bus" dev="sda1" ino=16983 res=1 12:47:48 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x100000000000008f, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1334.934621][ T8834] BPF:Unsupported btf_header 12:47:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000600000000006c000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1335.009670][ T27] audit: type=1804 audit(1577710068.171:4943): pid=8755 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir069868133/syzkaller.LShR5D/511/bus" dev="sda1" ino=16983 res=1 12:47:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[]) r1 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_netdev_private(r1, 0x89f4, &(0x7f0000000000)="6b5f9d0b") 12:47:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000400000070000000000000004"]) [ 1335.173382][ T8943] BPF:[1] Invalid name_offset:7077888 12:47:48 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x48}]}, 0x10) 12:47:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028000000060000f8000000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:48 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000090, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000000074000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1335.520050][ T9060] BPF:Unsupported btf_header 12:47:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000500000070000000000000004"]) 12:47:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x2000, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00', 0x4}) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000004"]) [ 1335.613583][ T9073] BPF:[1] Invalid name_offset:7602176 12:47:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000030000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000600000000007a000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1335.899696][ T9288] BPF:[1] Invalid name_offset:7995392 [ 1335.909474][ T9289] BPF:Unsupported btf_header 12:47:49 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000091, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1335.981471][ T9301] input: syz0 as /devices/virtual/input/input787 12:47:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000060000000000f8000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000050000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1336.187920][ T9503] BPF:[1] Invalid name_offset:16252928 [ 1336.200875][ T9505] BPF:Unsupported btf_header [ 1336.296027][ T9715] input: syz0 as /devices/virtual/input/input788 12:47:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000ffffff000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:49 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x4c}]}, 0x10) 12:47:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000004500000070000000000000004"]) 12:47:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000060000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1336.461520][ T9719] BPF:[1] Invalid name_offset:16777215 [ 1336.551219][ T9795] BPF:Unsupported btf_header 12:47:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000020000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:49 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000092, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.usagesir_bytes\x00', 0x275a, 0x0) r1 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000004"]) 12:47:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000070000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1336.739445][ T9935] BPF:[1] ENUM 12:47:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000600000070000000000000004"]) [ 1336.763832][ T9935] BPF:size=1 vlen=1 [ 1336.775327][ T9935] BPF: [ 1336.791591][ T9935] BPF:Invalid name [ 1336.823722][ T9935] BPF: [ 1336.823722][ T9935] [ 1336.876079][ T9944] BPF:Unsupported btf_header 12:47:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000200000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000030000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000001900)={0x0, 0x2, 0x800000001, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000004"]) [ 1337.165885][T10157] BPF:Unsupported btf_header 12:47:50 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000093, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1337.375967][T10264] BPF:[1] ENUM [ 1337.399449][T10264] BPF:size=1 vlen=1 [ 1337.426041][T10264] BPF: [ 1337.448237][T10264] BPF:Invalid name [ 1337.490152][T10264] BPF: [ 1337.490152][T10264] 12:47:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000480000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000004680000070000000000000004"]) 12:47:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) r1 = getpid() ptrace(0x10, r1) ptrace$getsig(0x2, r1, 0xffffffffff600043, &(0x7f0000000000)) r2 = getpid() ptrace(0x10, r2) ptrace$getsig(0x2, r2, 0xffffffffff600043, &(0x7f0000000000)) r3 = getpid() ptrace(0x10, r3) ptrace$getsig(0x2, r3, 0xffffffffff600043, &(0x7f0000000000)) r4 = getpid() ptrace(0x10, r4) ptrace$getsig(0x2, r4, 0xffffffffff600043, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000780)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYRESHEX=0x0, @ANYRESHEX=r2, @ANYRESHEX, @ANYRES32=r3, @ANYRESDEC=r4]) 12:47:50 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x4d}]}, 0x10) [ 1337.628839][T10380] BPF:Unsupported btf_header 12:47:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000040000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028000000060000004c0000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:51 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000094, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1337.884653][T10497] BPF:[1] ENUM [ 1337.899154][T10497] BPF:size=1 vlen=1 [ 1337.912124][T10497] BPF: [ 1337.933518][T10497] BPF:Invalid name [ 1337.948473][T10497] BPF: [ 1337.948473][T10497] [ 1337.968242][T10529] BPF:Unsupported btf_header 12:47:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000050000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000600000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000800000070000000000000004"]) 12:47:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0x4}, 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000004"]) [ 1338.198385][T10708] BPF:Unsupported btf_header [ 1338.272439][T10723] BPF:[1] ENUM [ 1338.286490][T10723] BPF:size=1 vlen=1 [ 1338.299028][T10723] BPF: [ 1338.301859][T10723] BPF:Invalid name [ 1338.350962][T10723] BPF: [ 1338.350962][T10723] 12:47:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000680000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:51 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000095, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1338.539183][T10926] BPF:Unsupported btf_header 12:47:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000060000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:51 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x50}]}, 0x10) 12:47:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000880000070000000000000004"]) 12:47:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x60080, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000476504ad3b8e150400000000000000"]) [ 1338.754543][T11038] BPF:[1] Invalid name_offset:6 12:47:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028000000060000006c0000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000070000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) [ 1339.020128][T11153] BPF:Unsupported btf_header 12:47:52 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000096, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) [ 1339.072015][T11185] BPF:[1] Invalid name_offset:7 12:47:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000080000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000740000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000007e10000070000000000000004"]) 12:47:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000004"]) [ 1339.403418][T11370] BPF:Unsupported btf_header [ 1339.453195][T11384] BPF:[1] Invalid name_offset:8 12:47:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000006000000280000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f000000000000002800000028000000060000007a0000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) 12:47:52 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x3, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x106, &(0x7f0000000000)=[{0x0, 0x0, 0x54}]}, 0x10) 12:47:52 executing program 4: perf_event_open(&(0x7f0000000a00)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) preadv(r0, &(0x7f0000000480), 0x1000000000000097, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 12:47:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000003f00000070000000000000004"]) [ 1339.844570][T11594] BPF:[1] Invalid name_offset:40 [ 1339.850643][T11593] BPF:Unsupported btf_header 12:47:53 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x20008) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000040)) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000070000000000000004"]) socket$inet_udplite(0x2, 0x2, 0x88) 12:47:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000060000002e0000000100000601000000057f0000000000001700000000000000000000000f03070000260000000000000000"], &(0x7f0000000380)=""/249, 0x46, 0xf9, 0x8}, 0x20) 12:47:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01002f00000000000000280000002800000006000000f80000000100000601000000057f000000000000170000"], &(0x7f0000000380)=""/249, 0x2f, 0xf9, 0x8}, 0x20) [ 1340.099795][T11806] ================================================================== [ 1340.107927][T11806] BUG: KCSAN: data-race in d_instantiate_new / other_inode_match [ 1340.115731][T11806] [ 1340.118066][T11806] read to 0xffff888125067b00 of 8 bytes by task 11808 on cpu 0: [ 1340.125707][T11806] other_inode_match+0x6b/0x5c0 [ 1340.130572][T11806] find_inode_nowait+0x135/0x160 [ 1340.135513][T11806] ext4_mark_iloc_dirty+0x12a8/0x1580 [ 1340.140890][T11806] ext4_mark_inode_dirty+0xe9/0x420 [ 1340.146096][T11806] ext4_dirty_inode+0xb1/0xe0 [ 1340.150874][T11806] __mark_inode_dirty+0x5d4/0x940 [ 1340.155907][T11806] ext4_mb_new_blocks+0x11d2/0x1de0 [ 1340.161113][T11806] ext4_ext_map_blocks+0x1c0f/0x2320 [ 1340.166400][T11806] ext4_map_blocks+0x23a/0xff0 [ 1340.171163][T11806] ext4_alloc_file_blocks+0x1e6/0x6e0 [ 1340.176534][T11806] ext4_fallocate+0x57a/0x1460 [ 1340.181383][T11806] vfs_fallocate+0x3be/0x650 [ 1340.185978][T11806] ioctl_preallocate+0x12b/0x190 [ 1340.190926][T11806] do_vfs_ioctl+0xb14/0xcf0 [ 1340.195456][T11806] ksys_ioctl+0xbd/0xe0 [ 1340.199614][T11806] __x64_sys_ioctl+0x4c/0x60 [ 1340.204207][T11806] do_syscall_64+0xcc/0x3a0 [ 1340.208725][T11806] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1340.214607][T11806] [ 1340.216983][T11806] write to 0xffff888125067b00 of 8 bytes by task 11806 on cpu 1: [ 1340.224709][T11806] d_instantiate_new+0xb5/0x100 [ 1340.229596][T11806] ext4_add_nondir+0x140/0x190 [ 1340.234378][T11806] ext4_symlink+0x629/0x9b0 [ 1340.239100][T11806] vfs_symlink+0x218/0x310 [ 1340.243522][T11806] do_symlinkat+0x1a5/0x1e0 [ 1340.248027][T11806] __x64_sys_symlink+0x3f/0x50 [ 1340.252820][T11806] do_syscall_64+0xcc/0x3a0 [ 1340.257851][T11806] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1340.263731][T11806] [ 1340.266057][T11806] Reported by Kernel Concurrency Sanitizer on: [ 1340.272237][T11806] CPU: 1 PID: 11806 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1340.281359][T11806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1340.291423][T11806] ================================================================== [ 1340.299498][T11806] Kernel panic - not syncing: panic_on_warn set ... [ 1340.306099][T11806] CPU: 1 PID: 11806 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1340.314788][T11806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1340.324865][T11806] Call Trace: [ 1340.328192][T11806] dump_stack+0x11d/0x181 [ 1340.332573][T11806] panic+0x210/0x640 [ 1340.336509][T11806] ? vprintk_func+0x8d/0x140 [ 1340.341261][T11806] kcsan_report.cold+0xc/0xd [ 1340.345890][T11806] kcsan_setup_watchpoint+0x3fe/0x460 [ 1340.351293][T11806] __tsan_unaligned_write8+0xc7/0x110 [ 1340.356704][T11806] d_instantiate_new+0xb5/0x100 [ 1340.361572][T11806] ext4_add_nondir+0x140/0x190 [ 1340.366353][T11806] ext4_symlink+0x629/0x9b0 [ 1340.370864][T11806] vfs_symlink+0x218/0x310 [ 1340.375309][T11806] do_symlinkat+0x1a5/0x1e0 [ 1340.379832][T11806] __x64_sys_symlink+0x3f/0x50 [ 1340.384607][T11806] do_syscall_64+0xcc/0x3a0 [ 1340.389123][T11806] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1340.395016][T11806] RIP: 0033:0x45a647 [ 1340.399062][T11806] Code: 0f 1f 00 b8 5c 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 6d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 58 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 4d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1340.418763][T11806] RSP: 002b:00007ffc34976558 EFLAGS: 00000202 ORIG_RAX: 0000000000000058 [ 1340.427200][T11806] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a647 [ 1340.435260][T11806] RDX: 00007ffc349765f3 RSI: 00000000004c037f RDI: 00007ffc349765e0 [ 1340.443229][T11806] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000013 [ 1340.451199][T11806] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000001 [ 1340.459180][T11806] R13: 00007ffc34976590 R14: 0000000000000000 R15: 00007ffc349765a0 [ 1340.468610][T11806] Kernel Offset: disabled [ 1340.472951][T11806] Rebooting in 86400 seconds..