0x0) open(&(0x7f00000000c0)='./file0\x00', 0x450000, 0x10) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:21 executing program 4: 12:19:21 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x0) 12:19:21 executing program 5: 12:19:21 executing program 1: 12:19:21 executing program 4: 12:19:21 executing program 5: 12:19:21 executing program 5: 12:19:21 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:22 executing program 1: 12:19:22 executing program 5: 12:19:22 executing program 4: 12:19:22 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:22 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x0) 12:19:22 executing program 5: 12:19:22 executing program 1: 12:19:22 executing program 4: 12:19:22 executing program 5: 12:19:22 executing program 1: 12:19:22 executing program 4: 12:19:22 executing program 4: 12:19:22 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x3f00) 12:19:22 executing program 1: 12:19:22 executing program 5: 12:19:22 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:22 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x0) 12:19:22 executing program 1: 12:19:22 executing program 5: 12:19:22 executing program 4: 12:19:22 executing program 5: 12:19:22 executing program 1: 12:19:22 executing program 4: 12:19:23 executing program 1: 12:19:23 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x4000) 12:19:23 executing program 5: 12:19:23 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:23 executing program 4: 12:19:23 executing program 1: 12:19:23 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:23 executing program 4: 12:19:23 executing program 5: 12:19:23 executing program 1: 12:19:23 executing program 1: 12:19:23 executing program 4: 12:19:23 executing program 5: 12:19:23 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x1000000) 12:19:23 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:23 executing program 4: 12:19:23 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:23 executing program 1: 12:19:23 executing program 5: 12:19:24 executing program 1: 12:19:24 executing program 4: 12:19:24 executing program 5: 12:19:24 executing program 5: 12:19:24 executing program 1: 12:19:24 executing program 4: 12:19:24 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x3f000000) 12:19:24 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:24 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:24 executing program 5: 12:19:24 executing program 1: 12:19:24 executing program 4: 12:19:24 executing program 4: 12:19:24 executing program 5: 12:19:24 executing program 1: 12:19:24 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:24 executing program 1: 12:19:24 executing program 5: 12:19:25 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x40000000) 12:19:25 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:25 executing program 4: 12:19:25 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(0xffffffffffffffff, r0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 12:19:25 executing program 1: 12:19:25 executing program 5: 12:19:25 executing program 4: 12:19:25 executing program 1: 12:19:25 executing program 5: 12:19:25 executing program 3: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:25 executing program 4: 12:19:25 executing program 5: 12:19:25 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0xffffff7f) 12:19:25 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(0xffffffffffffffff, r0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 12:19:25 executing program 1: 12:19:25 executing program 3: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:25 executing program 4: 12:19:25 executing program 5: 12:19:26 executing program 1: 12:19:26 executing program 4: 12:19:26 executing program 5: 12:19:26 executing program 3: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:26 executing program 1: 12:19:26 executing program 4: 12:19:26 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x7ffffffff000) 12:19:26 executing program 5: 12:19:26 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:26 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(0xffffffffffffffff, r0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 12:19:26 executing program 1: 12:19:26 executing program 4: 12:19:26 executing program 5: 12:19:26 executing program 4: 12:19:26 executing program 1: 12:19:26 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:26 executing program 5: 12:19:26 executing program 4: 12:19:27 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0xf0ffffff7f0000) 12:19:27 executing program 1: 12:19:27 executing program 5: 12:19:27 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:27 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:27 executing program 4: 12:19:27 executing program 4: 12:19:27 executing program 5: 12:19:27 executing program 1: 12:19:27 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:27 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:27 executing program 5: 12:19:27 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x100000000000000) 12:19:27 executing program 4: 12:19:27 executing program 1: 12:19:27 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:27 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:27 executing program 5: 12:19:28 executing program 4: 12:19:28 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:28 executing program 0: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r0, 0xffffffffffffffff, 0x0) write(r0, 0x0, 0x0) 12:19:28 executing program 1: 12:19:28 executing program 5: 12:19:28 executing program 4: 12:19:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x3f00000000000000) 12:19:28 executing program 1: 12:19:28 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:28 executing program 5: 12:19:28 executing program 0: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r0, 0xffffffffffffffff, 0x0) write(r0, 0x0, 0x0) 12:19:28 executing program 4: 12:19:28 executing program 5: 12:19:28 executing program 0: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r0, 0xffffffffffffffff, 0x0) write(r0, 0x0, 0x0) 12:19:28 executing program 4: 12:19:28 executing program 1: 12:19:28 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:28 executing program 4: 12:19:29 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x4000000000000000) 12:19:29 executing program 5: 12:19:29 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:29 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:29 executing program 1: 12:19:29 executing program 4: 12:19:29 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:29 executing program 1: 12:19:29 executing program 5: 12:19:29 executing program 4: 12:19:29 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:29 executing program 5: 12:19:29 executing program 1: 12:19:29 executing program 4: 12:19:29 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:29 executing program 5: 12:19:29 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0xffffff7f00000000) 12:19:29 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:30 executing program 5: 12:19:30 executing program 4: 12:19:30 executing program 1: 12:19:30 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:30 executing program 4: 12:19:30 executing program 1: 12:19:30 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:30 executing program 5: 12:19:30 executing program 4: 12:19:30 executing program 1: 12:19:30 executing program 5: 12:19:30 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:30 executing program 4: 12:19:30 executing program 1: 12:19:30 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/\xe9Z\xd9a\x85\xd1\xaet', 0x311002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f00000000c0)=""/232) dup3(r1, r0, 0x0) write(r0, 0x0, 0x0) 12:19:30 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:30 executing program 1: 12:19:30 executing program 5: 12:19:30 executing program 4: 12:19:30 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:30 executing program 4: 12:19:30 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/pp\x00', 0x200001, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000200)=""/234) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0xcc37e7843faa51bf, 0x3) dup(r2) r3 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, &(0x7f0000000000), 0x4) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r7) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r9 = dup(r8) getsockopt$bt_BT_DEFER_SETUP(r9, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$RTC_PIE_ON(r9, 0x7005) fsync(r7) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r6, 0x80045530, &(0x7f0000000100)=""/247) 12:19:30 executing program 1: 12:19:30 executing program 5: 12:19:30 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:31 executing program 4: 12:19:31 executing program 5: 12:19:31 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:31 executing program 1: 12:19:31 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = dup3(r1, r0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000000)=0x8, 0x4) write(r1, 0x0, 0x0) 12:19:31 executing program 4: 12:19:31 executing program 1: 12:19:31 executing program 5: 12:19:31 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:31 executing program 4: 12:19:31 executing program 1: 12:19:31 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:31 executing program 5: 12:19:31 executing program 4: 12:19:31 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:31 executing program 1: 12:19:31 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) write$FUSE_OPEN(r3, &(0x7f0000000000)={0x20, 0xffffffffffffffda, 0x7, {0x0, 0x4}}, 0x20) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:31 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:31 executing program 5: 12:19:31 executing program 4: 12:19:31 executing program 1: 12:19:31 executing program 5: 12:19:31 executing program 1: 12:19:31 executing program 4: 12:19:32 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) 12:19:32 executing program 5: 12:19:32 executing program 4: 12:19:32 executing program 1: 12:19:32 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:32 executing program 5: 12:19:32 executing program 1: 12:19:32 executing program 4: 12:19:32 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, 0x0) 12:19:32 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r5) r6 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={r7, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000440)={r7, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000100)=0x84) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r9 = dup(r8) getsockopt$bt_BT_DEFER_SETUP(r9, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$VIDIOC_ENUMAUDIO(r9, 0xc0345641, &(0x7f0000000240)={0x6, "ca5280ac6c14f71367a0a1b7c88b751c6c5c1fc20cab9c43a1321f8d13a1cd99", 0x1, 0x1}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000a80)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000000)=0x6b) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000000)={r7, 0x1, 0x9}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000000c0)={r10, 0xd1, "6d33f57dbba7ef57d2c3d182b5dddcf196bc4f750e54182ca19e4e93f3f903eb2804a89c6de60666f20ec0f07002ac9d233d623ebb20c8783c29a8d3d4bd471726f944efaab2e3640d95ad777620a6cf14edd89088ed6698e1f58bc030b84f7bea860fc73e92c8ebb26f7fb200e1a99f2a505d876b58da02258a428801b20f696e59522a3eee1dfa70be49527b2b51f07e963f1be97bbe65a68dc2444672e2b4f7bdbdc0b40a629714077279f840aefe57a2c245ca7f3d3c98677f471946f51a1b0a3428e8e8e8c664137764a56616a5e6"}, &(0x7f00000001c0)=0xd9) r11 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r12 = dup(r11) getsockopt$bt_BT_DEFER_SETUP(r12, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r12, 0x810c5701, &(0x7f0000000500)) 12:19:32 executing program 5: 12:19:32 executing program 4: 12:19:32 executing program 1: 12:19:32 executing program 5: 12:19:32 executing program 4: 12:19:32 executing program 1: 12:19:32 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:32 executing program 1: 12:19:32 executing program 5: 12:19:32 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, 0x0) 12:19:32 executing program 4: 12:19:33 executing program 1: 12:19:33 executing program 4: 12:19:33 executing program 5: 12:19:33 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$TIPC_CONN_TIMEOUT(r5, 0x10f, 0x82, &(0x7f00000000c0)=0x2, 0x4) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) ioctl$PPPIOCATTCHAN(r3, 0x40047438, &(0x7f0000000000)=0x3) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:33 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:33 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, 0x0) 12:19:33 executing program 5: 12:19:33 executing program 4: 12:19:33 executing program 1: 12:19:33 executing program 1: 12:19:33 executing program 4: 12:19:33 executing program 5: 12:19:33 executing program 5: 12:19:33 executing program 1: 12:19:33 executing program 4: 12:19:33 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900), 0x80000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x2) setsockopt(r2, 0x0, 0x6, &(0x7f0000000040)="15", 0x1) 12:19:33 executing program 3: 12:19:33 executing program 5: 12:19:33 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:33 executing program 1: 12:19:33 executing program 4: 12:19:34 executing program 5: 12:19:34 executing program 1: 12:19:34 executing program 3: 12:19:34 executing program 4: 12:19:34 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:34 executing program 5: 12:19:34 executing program 1: 12:19:34 executing program 4: 12:19:34 executing program 3: 12:19:34 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:34 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='proc\x00') write(r1, 0x0, 0x0) 12:19:34 executing program 5: 12:19:34 executing program 1: 12:19:34 executing program 4: 12:19:34 executing program 3: 12:19:34 executing program 1: 12:19:34 executing program 4: 12:19:34 executing program 5: 12:19:34 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/233) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)="992a0a1ecf3424bd9929e9ee98242dc324cb5b4c7d4bbece3a3b74eda460ade1ad15ed3b50e819adde24aa7ff68285fce7e5a6b910421a9b66e1fac3d653f4fea4becd2bbbd1373b728d9f08c7574817edc66ca5135492381579acf75df5181584a27055ecdce7171a79540ef993e8588c48db229c13863237a5de79df372cd437e324c3cf975c79d1ee34cde22efc689f21b8e7472660ea5489af1b0f32b85cd63f2695837287dbd3acd5eeebdb222caac4ead9d40850a23b7b20f632ecf7166394f1b53a924870fb9b3aa1d183dc97630c7eaad707216ea90469502f595d63bea3fb7dcd1a93c2eee1770bc13a4879907fe4f42b7f7cac3565e7cb0d9328", 0xff, 0x0) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r2, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, r3) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) futex(&(0x7f0000000240)=0x2, 0x9, 0x0, &(0x7f00000002c0)={r4, r5+10000000}, &(0x7f0000000300)=0x2, 0x1) r6 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x10000, 0x120000) ioctl$MON_IOCH_MFLUSH(r6, 0x9208, 0x7) 12:19:34 executing program 3: 12:19:34 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:34 executing program 1: 12:19:34 executing program 4: 12:19:34 executing program 5: 12:19:34 executing program 3: 12:19:35 executing program 1: 12:19:35 executing program 4: 12:19:35 executing program 5: 12:19:35 executing program 3: 12:19:35 executing program 4: 12:19:35 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000000), &(0x7f0000000040)=0x4) 12:19:35 executing program 5: 12:19:35 executing program 1: 12:19:35 executing program 3: 12:19:35 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:35 executing program 4: 12:19:35 executing program 1: 12:19:35 executing program 3: 12:19:35 executing program 4: 12:19:35 executing program 5: 12:19:35 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r1) ioctl$int_out(r1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x49000) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r2, &(0x7f00000002c0)={0x78, 0x0, 0x7, {0x1, 0x7, 0x0, {0x4, 0x7, 0x3, 0x1000, 0x100, 0x20, 0x1, 0x20, 0x2, 0x3, 0x0, r3, r4, 0x3, 0x1}}}, 0x78) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dvga_arbiter\b\x00', 0x20000, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r6, 0xae45, 0x2) openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='\x00\xfbR\x00\x81\xe1h\x98\x00\x00\x00A', 0x41, 0x0) ioctl$EVIOCGPROP(r6, 0x4004743d, &(0x7f0000000c00)=""/232) prctl$PR_GET_THP_DISABLE(0x2a) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'hsr0\x00', 0x3}, 0x18) write(r5, 0x0, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) getsockopt$bt_BT_DEFER_SETUP(r8, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$VIDIOC_S_OUTPUT(r8, 0xc004562f, &(0x7f0000000240)=0x3) 12:19:35 executing program 5: 12:19:35 executing program 1: 12:19:35 executing program 3: 12:19:35 executing program 4: 12:19:35 executing program 3: 12:19:35 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:35 executing program 5: 12:19:35 executing program 1: 12:19:36 executing program 5: 12:19:36 executing program 1: 12:19:36 executing program 3: 12:19:36 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000000)=0x19, 0x4) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:36 executing program 4: 12:19:36 executing program 1: 12:19:36 executing program 5: 12:19:36 executing program 3: 12:19:36 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, 0x0) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:36 executing program 5: 12:19:36 executing program 1: 12:19:36 executing program 4: 12:19:36 executing program 3: 12:19:36 executing program 5: 12:19:36 executing program 3: 12:19:37 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/pxr\x00', 0x202, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) dup3(r1, r2, 0x0) write(r1, 0x0, 0x0) 12:19:37 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, 0x0) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:37 executing program 1: 12:19:37 executing program 4: 12:19:37 executing program 5: 12:19:37 executing program 3: 12:19:37 executing program 4: 12:19:37 executing program 1: 12:19:37 executing program 5: 12:19:37 executing program 3: 12:19:37 executing program 5: 12:19:37 executing program 4: 12:19:37 executing program 3: 12:19:37 executing program 1: 12:19:37 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, 0x0) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:37 executing program 5: 12:19:37 executing program 4: 12:19:37 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000200)={0x3}) r4 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) accept4$unix(r4, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e, 0x180000) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r5, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r5, r0, 0x0) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r7, 0x84, 0x21, &(0x7f0000000240)=0x7, 0x4) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x103000, 0x0) ioctl$PPPIOCSDEBUG(r9, 0x40047440, &(0x7f0000000100)=0x2) r10 = dup(r8) getsockopt$bt_BT_DEFER_SETUP(r10, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$DRM_IOCTL_ADD_CTX(r10, 0xc0086420, &(0x7f0000000000)) 12:19:37 executing program 1: 12:19:37 executing program 5: 12:19:37 executing program 4: 12:19:37 executing program 3: 12:19:37 executing program 1: 12:19:37 executing program 4: 12:19:38 executing program 5: 12:19:38 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(0xffffffffffffffff, r0, 0x0) write(r1, 0x0, 0x0) 12:19:38 executing program 3: 12:19:38 executing program 1: 12:19:38 executing program 4: 12:19:38 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x4) 12:19:38 executing program 3: 12:19:38 executing program 5: 12:19:38 executing program 1: 12:19:38 executing program 4: 12:19:38 executing program 3: 12:19:38 executing program 5: 12:19:38 executing program 1: 12:19:38 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(0xffffffffffffffff, r0, 0x0) write(r1, 0x0, 0x0) 12:19:38 executing program 4: 12:19:38 executing program 3: 12:19:38 executing program 5: 12:19:38 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200, 0x0) 12:19:38 executing program 1: 12:19:38 executing program 3: 12:19:38 executing program 5: 12:19:38 executing program 4: 12:19:38 executing program 1: 12:19:39 executing program 5: 12:19:39 executing program 4: 12:19:39 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(0xffffffffffffffff, r0, 0x0) write(r1, 0x0, 0x0) 12:19:39 executing program 3: 12:19:39 executing program 1: 12:19:39 executing program 4: 12:19:39 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000000)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r3, r0, 0x0) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000400)={0x6, 0x100, [0xa03f, 0x97, 0x100, 0x2, 0x2], 0x4}) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000180)="43d5cc63d5e8475fc8f77751f9a67dbd403217d69fc174224ce094092f2a147c6a09ce383bf66b1f5a65e065b5d459f7c8a78e4a2f6ced8062971455a0e2ecab", 0x40, 0x7fff}, {&(0x7f00000001c0)="70cc26a6dba42fca73dd54fe22b0cd18fe0bfedeaae6db037cc80d09bca34358c9b28331f386e240eba4b949b1d6f75060f14b13f18a451a529bfcdbc8c84a3dc37a1c892d48aa858dd740cb25c9dafb65212176e618747d8df8677091705c330213d5dfae8b1b09963c1d960c23a89c16e219821d24a78eed49c2bf5a806bde6885e41754b8ee32f3629775ccd11f089f95e0a29898822928184f36e207eea15043cd7c5c6f67eff91636b52870b6b26719a507540a0bd4dc6608be5c036214619cae5782b5612af1dd3c7bd8f656030836879a64a3e0fe39af96c2bc8212c17211a4c80611c0b1f3", 0xe9, 0x2}], 0x110000, &(0x7f0000000300)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c6e6e6f6e756d7461696c3d312c73686f72746e616d653d77690100352c757466383d302c756e695f786c6174653d312c73686f72746e616d653d6d697865642c726f6469722c757466383d312c73686f72746e616d657464696e39352c73686f72746e616d653d77696e6e742c7375626a5f747970653d2c2c61707072616973652c7375626a5f757365723d2647504c706f7369785f61636c5fe163636573734065746831656d30257365637572697479262c736d61636b66737472616e736d7574653d2f6465762f707070002c00"]) 12:19:39 executing program 5: 12:19:39 executing program 4: 12:19:39 executing program 3: 12:19:39 executing program 1: 12:19:39 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, 0xffffffffffffffff, 0x0) write(r1, 0x0, 0x0) 12:19:39 executing program 5: 12:19:39 executing program 1: 12:19:39 executing program 3: 12:19:39 executing program 4: 12:19:39 executing program 5: 12:19:39 executing program 1: 12:19:40 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e24, 0x101, @remote, 0x7fff}, 0x1c) 12:19:40 executing program 3: 12:19:40 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, 0xffffffffffffffff, 0x0) write(r1, 0x0, 0x0) 12:19:40 executing program 4: 12:19:40 executing program 5: 12:19:40 executing program 1: 12:19:40 executing program 5: 12:19:40 executing program 3: 12:19:40 executing program 4: 12:19:40 executing program 1: 12:19:40 executing program 5: 12:19:40 executing program 1: 12:19:41 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = shmget$private(0x0, 0x1000, 0x4, &(0x7f0000ffd000/0x1000)=nil) shmat(r1, &(0x7f0000ffd000/0x1000)=nil, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r2, r0, 0x0) write(r2, 0x0, 0x0) 12:19:41 executing program 3: 12:19:41 executing program 4: 12:19:41 executing program 5: 12:19:41 executing program 1: 12:19:41 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, 0xffffffffffffffff, 0x0) write(r1, 0x0, 0x0) 12:19:41 executing program 3: 12:19:41 executing program 4: 12:19:41 executing program 5: 12:19:41 executing program 1: 12:19:41 executing program 3: 12:19:41 executing program 4: 12:19:41 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/233) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:41 executing program 1: 12:19:41 executing program 5: 12:19:41 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 12:19:41 executing program 4: 12:19:41 executing program 3: 12:19:41 executing program 1: 12:19:41 executing program 4: 12:19:41 executing program 5: 12:19:41 executing program 1: 12:19:41 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 12:19:41 executing program 3: 12:19:42 executing program 4: 12:19:42 executing program 5: 12:19:42 executing program 1: 12:19:42 executing program 3: 12:19:42 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x29) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) clone3(&(0x7f00000001c0)={0x40000000, &(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f00000000c0), 0x3b, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/143}, 0x40) syz_open_procfs(r4, &(0x7f0000000200)='net/icmp6\x00') dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:42 executing program 3: 12:19:42 executing program 5: 12:19:42 executing program 4: 12:19:42 executing program 1: 12:19:42 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 12:19:42 executing program 3: 12:19:42 executing program 5: 12:19:42 executing program 1: 12:19:42 executing program 4: [ 284.466930][T12661] IPVS: ftp: loaded support on port[0] = 21 12:19:42 executing program 3: 12:19:42 executing program 4: [ 284.877731][T12672] IPVS: ftp: loaded support on port[0] = 21 12:19:42 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r2, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000200)=""/168) write(r2, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x2c0400) sysfs$2(0x2, 0x0, &(0x7f00000000c0)=""/161) 12:19:42 executing program 1: 12:19:42 executing program 3: 12:19:42 executing program 5: 12:19:42 executing program 4: 12:19:42 executing program 0: 12:19:42 executing program 1: 12:19:43 executing program 0: 12:19:43 executing program 5: 12:19:43 executing program 4: 12:19:43 executing program 3: [ 285.190815][ T235] tipc: TX() has been purged, node left! 12:19:43 executing program 1: 12:19:43 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x800, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r1) r2 = dup(r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r3) r4 = fcntl$getown(r3, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r4, 0x3, &(0x7f0000000000)) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r5, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r5, r0, 0x0) write(r5, 0x0, 0x0) 12:19:43 executing program 4: 12:19:43 executing program 5: 12:19:43 executing program 0: 12:19:43 executing program 3: 12:19:43 executing program 1: 12:19:43 executing program 1: 12:19:43 executing program 3: 12:19:43 executing program 0: 12:19:43 executing program 4: 12:19:43 executing program 5: 12:19:43 executing program 3: 12:19:43 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev+qpp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:43 executing program 0: 12:19:43 executing program 1: 12:19:43 executing program 4: 12:19:43 executing program 5: 12:19:43 executing program 3: 12:19:44 executing program 4: 12:19:44 executing program 3: 12:19:44 executing program 5: 12:19:44 executing program 1: 12:19:44 executing program 0: 12:19:44 executing program 4: 12:19:44 executing program 5: 12:19:44 executing program 3: 12:19:44 executing program 1: 12:19:44 executing program 0: 12:19:44 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='7dev/ppp\x00', 0x2000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = dup3(r1, r0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f0000000000)={0xffffffffffffffff, 0x3, 0x40}) write(r1, 0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) getsockopt$bt_BT_DEFER_SETUP(r8, 0x12, 0x7, 0x0, &(0x7f0000000040)) write$uinput_user_dev(r8, &(0x7f0000000d00)={'syz1\x00', {0x8001, 0x9, 0x1, 0x7fff}, 0x56, [0x0, 0x6, 0x2000, 0x0, 0x2, 0x8, 0xa1, 0x3, 0x1ff, 0x8001, 0x8, 0x4, 0x1a25, 0x5, 0xffffffff, 0x0, 0x4f, 0x6, 0x7, 0x64ee169f, 0x9, 0x7, 0x10001, 0x3, 0x8c9, 0x3, 0x10001, 0x1, 0x8, 0x3, 0x3, 0x8, 0x1, 0x1000, 0x0, 0x9, 0x401, 0x0, 0x5, 0x6, 0x1, 0x0, 0x3f, 0x100, 0x19e, 0x7, 0x3, 0x0, 0x1, 0xff, 0x1, 0x3, 0x8, 0xfffffffd, 0x9, 0xffffff01, 0xff, 0x8, 0xf5c3, 0x5, 0x77, 0xfff, 0x80, 0x9c6], [0x8, 0x7ce, 0x1, 0x7, 0x8, 0x20, 0x6, 0x3, 0x20, 0x3f, 0x6, 0x100, 0x5, 0x2e41, 0x2, 0x3, 0x7, 0x8, 0x1, 0x1ea00, 0x24f45955, 0x5, 0x4, 0x400, 0x7, 0x27, 0x40, 0x7f, 0x4, 0x6, 0x8, 0x7ff, 0x401, 0x6, 0x643, 0x7ff, 0x8ab9, 0x40, 0xfff, 0x9, 0xde35, 0x40, 0x2, 0x8, 0x8001, 0x4, 0x1ff, 0x1, 0x3, 0x4, 0x4, 0xfff, 0xfba, 0x7ff, 0x0, 0x10000, 0x7, 0x2, 0xfffffffb, 0x3, 0x4, 0x0, 0x1, 0x1c2], [0xfffffff7, 0x47a, 0x4, 0xfff, 0x8, 0x6, 0x7fff, 0x7, 0x7, 0x0, 0x4977, 0x3, 0x5, 0xfffffffc, 0x3ff, 0x1f, 0xd96b, 0xfff, 0x0, 0x40, 0x4, 0x2, 0x3, 0x8001, 0x7a0bb60c, 0x6, 0x81, 0x6, 0x3, 0x5, 0x7fff, 0x3, 0x6, 0x6, 0x80, 0xfff, 0x7, 0x3, 0x4, 0x1, 0x8, 0x10001, 0x8000, 0x2, 0x5, 0x8, 0x6, 0xfffffff9, 0x8, 0x8, 0x7, 0x7, 0x200, 0x4, 0x6, 0x8, 0x80000001, 0x400, 0x6, 0x7f, 0xfff, 0x8, 0xffffffff, 0x40], [0x9, 0x8, 0x4, 0x4, 0xfffffffb, 0x9, 0x7, 0x100, 0x8, 0x20, 0x1, 0x3, 0x1, 0x1, 0x9, 0x9, 0x1, 0x81, 0x9, 0x40, 0x0, 0x3, 0x4000000, 0xf47800, 0x6, 0x100, 0x7ff8, 0xffffffff, 0x7f, 0x8, 0x4, 0x5, 0x3, 0x4, 0x80000000, 0x2, 0x3f, 0x6, 0x401, 0x9, 0x4, 0x7, 0x3800, 0x20b, 0x0, 0x8001, 0x7, 0x24f0c112, 0xffffffff, 0x7fff, 0x1, 0x147, 0x2, 0x8000, 0x78, 0xfab, 0x5e58, 0x1, 0x0, 0x9, 0x5, 0x40, 0x4, 0x81]}, 0x45c) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f0000000100)=""/25) r9 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r9, 0x0, 0x41, &(0x7f0000000200)={'mangle\x00', 0x7f, "b035296a2a8bc0e1f3bc946adcf37b35d3d226678ebfdd69f242d6df7b7e940526f683ddbc3a95847e6381e77b033d5b37d01f82cd02ee60d1387ba3e27eb5b3daf2a0d41ad142b4ffba0433872c85b3b08ba32b2b799d5ca9102e0a789564e109d51c72497cacf58cb8080e8030d005982a02d58abf11f63521520e449bf3"}, &(0x7f00000000c0)=0xa3) r10 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r10, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$MON_IOCT_RING_SIZE(r10, 0x9204, 0xf2e3a) socket$inet_udplite(0x2, 0x2, 0x88) r11 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') poll(&(0x7f0000000080)=[{r11}, {r12}], 0x2, 0x0) r13 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r13, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$MON_IOCQ_URB_LEN(r13, 0x9201) 12:19:44 executing program 4: 12:19:44 executing program 3: 12:19:44 executing program 1: 12:19:44 executing program 5: 12:19:44 executing program 0: 12:19:44 executing program 4: 12:19:44 executing program 5: 12:19:44 executing program 3: 12:19:44 executing program 1: 12:19:44 executing program 0: 12:19:44 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f00000000c0)=""/235) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:44 executing program 4: 12:19:44 executing program 3: 12:19:44 executing program 5: 12:19:44 executing program 1: 12:19:45 executing program 0: 12:19:45 executing program 4: 12:19:45 executing program 3: 12:19:45 executing program 1: 12:19:45 executing program 5: 12:19:45 executing program 4: 12:19:45 executing program 0: 12:19:45 executing program 2: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r0, 0xffffffffffffffff, 0x0) write(r0, 0x0, 0x0) 12:19:45 executing program 3: 12:19:45 executing program 1: 12:19:45 executing program 5: 12:19:45 executing program 3: 12:19:45 executing program 4: 12:19:45 executing program 1: 12:19:45 executing program 0: 12:19:45 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) fsetxattr$trusted_overlay_nlink(r1, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L-', 0xf3}, 0x28, 0x2) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000000)=0x1e, 0x4) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:45 executing program 5: 12:19:45 executing program 3: 12:19:45 executing program 4: 12:19:45 executing program 1: 12:19:45 executing program 0: 12:19:45 executing program 5: 12:19:45 executing program 3: 12:19:46 executing program 4: 12:19:46 executing program 1: 12:19:46 executing program 0: 12:19:46 executing program 5: 12:19:46 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000100), 0x4) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) accept$unix(r3, &(0x7f0000000000), &(0x7f00000000c0)=0x6e) 12:19:46 executing program 1: 12:19:46 executing program 3: 12:19:46 executing program 4: 12:19:46 executing program 0: 12:19:46 executing program 5: 12:19:46 executing program 3: 12:19:46 executing program 4: 12:19:46 executing program 1: 12:19:46 executing program 0: 12:19:46 executing program 4: 12:19:46 executing program 5: 12:19:46 executing program 3: 12:19:46 executing program 1: 12:19:46 executing program 0: 12:19:46 executing program 4: 12:19:46 executing program 5: 12:19:46 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000180)=@keyring={'key_or_keyring:'}) r3 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="855544e2aae8336598ab1c5c3e1dab70b520a2a2a4c4a6f80a353c70dfda0ecaf8dc37c7fcad262358e28c78ba0df663f37671408941d3379e730ddc971f7dd0923f02d9d73236e3d8c39b60c85886b9cef9ebb5cd206375a9a94e4dfd816f2b279acf6abb06176cd38820e1b6bc40", 0x6f, r2) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$negate(0xd, r3, 0x9, r4) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r5, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r5, r0, 0x0) write(r5, 0x0, 0x0) 12:19:47 executing program 1: 12:19:47 executing program 3: 12:19:47 executing program 4: 12:19:47 executing program 5: 12:19:47 executing program 0: 12:19:47 executing program 1: 12:19:47 executing program 3: 12:19:47 executing program 0: 12:19:47 executing program 5: 12:19:47 executing program 4: 12:19:47 executing program 2: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r0, 0xffffffffffffffff, 0x0) write(r0, 0x0, 0x0) 12:19:47 executing program 1: 12:19:47 executing program 3: 12:19:47 executing program 0: 12:19:47 executing program 5: 12:19:47 executing program 4: 12:19:47 executing program 1: 12:19:47 executing program 4: 12:19:47 executing program 5: 12:19:47 executing program 3: 12:19:47 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f00000000c0)=""/251) dup3(r1, r0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) write(r1, 0x0, 0x0) 12:19:47 executing program 0: 12:19:47 executing program 1: 12:19:47 executing program 3: 12:19:47 executing program 4: 12:19:48 executing program 0: 12:19:48 executing program 5: 12:19:48 executing program 1: 12:19:48 executing program 4: 12:19:48 executing program 3: 12:19:48 executing program 5: 12:19:48 executing program 0: 12:19:48 executing program 1: 12:19:48 executing program 4: 12:19:48 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000180)=@keyring={'key_or_keyring:'}) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000180)=@keyring={'key_or_keyring:'}) keyctl$unlink(0x9, r3, r5) 12:19:48 executing program 0: 12:19:48 executing program 3: 12:19:48 executing program 1: 12:19:48 executing program 4: 12:19:48 executing program 5: 12:19:48 executing program 1: 12:19:48 executing program 0: 12:19:48 executing program 3: 12:19:48 executing program 5: 12:19:48 executing program 4: 12:19:48 executing program 3: 12:19:48 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) signalfd4(r0, &(0x7f0000000000)={0x6d9}, 0x8, 0x100000) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:48 executing program 0: 12:19:49 executing program 1: 12:19:49 executing program 5: 12:19:49 executing program 4: 12:19:49 executing program 3: 12:19:49 executing program 0: 12:19:49 executing program 1: 12:19:49 executing program 4: 12:19:49 executing program 5: 12:19:49 executing program 0: 12:19:49 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000640)=""/246) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x19, 0x101080) syz_open_dev$sndpcmc(&(0x7f00000005c0)='/dev/snd/pcmC#D#c\x00', 0x9, 0x20000) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x6000, 0x0) ioctl$EVIOCGPROP(r6, 0x4004743d, &(0x7f0000000440)=""/251) dup3(r3, r2, 0x0) write(r3, 0x0, 0x0) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x185) ioctl$PPPIOCGFLAGS(r7, 0x8004745a, &(0x7f0000000040)) 12:19:49 executing program 1: 12:19:49 executing program 3: 12:19:49 executing program 4: 12:19:49 executing program 5: 12:19:49 executing program 1: 12:19:49 executing program 0: 12:19:49 executing program 3: 12:19:49 executing program 5: 12:19:49 executing program 4: 12:19:49 executing program 1: 12:19:49 executing program 3: 12:19:50 executing program 5: 12:19:50 executing program 0: 12:19:50 executing program 4: 12:19:50 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x200, 0x13c) sendmsg$inet_sctp(r1, &(0x7f0000000880)={&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x48d1, @dev={0xfe, 0x80, [], 0x18}, 0x447}, 0x1c, &(0x7f0000000940)=[{&(0x7f0000000d00)="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", 0x1000}, {&(0x7f00000000c0)="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", 0xfc}, {&(0x7f00000001c0)="8880a11cbbdc3d2a5849c5d879366c8e6cb3dd9099e92cd9b364f0b80620edadc6413af8cf24d393251b1cd85f8117119af0", 0x32}, {&(0x7f0000000200)="3d0fddbe05a087722abbf83e9be479451d869ca3144656735b1c78858e405639b211f16af5bf53eb02fbce18c2c9cf4e4e5f58504300e0496658f093f1a278ff0368da84bcfcd4d32838c672c1d4f3693e6b4a88fc89b3c6752b2cff1515342e5b6e9710cc12a51beb4a3c3b292e3fe222a8e9b989461d0abba5256810b414814cf7680877a7111d1950087c2f13016a74bfd1b66832ba47ca9ee8e8b14229c9c95c4d214aa491bc945de0f65ee71d8ed9c1b75757ccdbe4b05b2083915380d9ce686432bb187dda100d", 0xca}, {&(0x7f0000000300)="03b55a039088f3507c5256f8f223367785c83832f1e6b6ca0fd632953dc964c69c2e24f5fa971203c05ed41fa133b69781d68b2e2d8f0561c24604f615bcf5235e234cebf387c89b8c54131c92d4462741537317d4785d52eea508ea0d18dc4d56ef56b54b3326c6adffdcdae86f4cef9e5b4b6e675f4fde196ff6fb8d352f269c1c4448b45627e84b67ef982bf3cb228c520a9b5044aecfe2bea97e532b144c58bf4b0857426ddb8ad24da7220ea2b5d82f63573683d4f200a57adf9663bd9e62ee2817c936ef4a54a78bf98e9cc438", 0xd0}, {&(0x7f0000000400)="4e39e136d20bbfe982cc94fccf62d64db80e6970729d48d2d5e99f39a1690dd094d930e0fb4b80ecbbcf6c7d846054dca287e2cbd861155fe9663907582b2d097ae4c00c0878f7e36a676ff700498b94a42da77c75938fc6fbb91b097739240b1b2f50fa7c54abe35ea1d1a213ca14987102bd36d51710828d69ea60997e26e7cdc57b5a8aec45c3ed4f1a54e844fd2fb0412cc1232a67db757879cbbaddf0d9838eff97177eb420c988afb086e76e7f1e028d7b6cb778f00d0d28264ed766595325725bc870be92aa906a8eaf9cd1709037f358f5", 0xd5}, {&(0x7f0000000500)="c5f7d9b954a291725cf9c1382c2e76d548753bd06b85277dc2af", 0x1a}, {&(0x7f0000000540)="d2490cd2d02a545f1662f191f24df2ec1f28d0c3bf015e982bd1204198c1debf86d23415afcba912039032bb501e368217b8331d1125c968e14c2f797d92b92619553b91e1387c3299e1a1d30b8f5a72ea7e2eb0f2e2681a5995a1c84b9b293fc2bfc2815350203a2a1255f1f24ef220064f2424dcaf7af194c8fecdd287a7c657385b3f7f2463f693a3e200d634784f53f1208f6ebabb634fd8297855b8cbd6dd423eb5108591dab17d2f2096f8f6d0fa5dfd193edd3f68e802e5d41aa002587653d3c1fd3e46315d729cadae07ee3eb3bc6f06", 0xd4}, {&(0x7f0000000740)="847224524ddbee0ee81c83db247ed792d00210e944089546479b2e4027ded3260f44f947bd902088e62c0b50bdb8c12a6fc7d095e421ff65e043c8449a08ff51f07b5aaaa6e71a363e530ec0", 0x4c}, {&(0x7f00000007c0)="24eaeb366d70854790c07e30508840c31801d14e9989febdf9c0556460562bb3daa29744a365fc5184b9cc9335d2f49ed6df20c2f96a09fadaae1a7577bd4db61bd1fc2ee3daaa816e35feab428e154f1f821077ca635a62c08f69d9240ec41651e3fe655cd7feb383f34743f42aabfca9c34a704569e3a20dda64b3db87c97513e79058520e3962c144", 0x8a}], 0xa, 0x0, 0x0, 0x12008825}, 0x11) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/246) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$RTC_EPOCH_SET(r4, 0x4008700e, 0x0) dup3(r2, r0, 0x0) write(r2, 0x0, 0x0) 12:19:50 executing program 1: 12:19:50 executing program 3: 12:19:50 executing program 5: 12:19:50 executing program 0: 12:19:50 executing program 4: 12:19:50 executing program 1: 12:19:50 executing program 3: 12:19:50 executing program 5: 12:19:50 executing program 0: 12:19:50 executing program 4: 12:19:50 executing program 1: 12:19:50 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r2, &(0x7f0000000140)=[{{r3, r4/1000+10000}, 0x1f, 0x400}, {{r5, r6/1000+30000}, 0x4, 0x8000}, {{r7, r8/1000+10000}, 0x5}], 0x48) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f00000001c0)={{0x9, 0x7}, 0x0, 0x3, 0x7f, {0x9, 0x7}, 0x6, 0xa170}) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r9, 0x4004743d, &(0x7f0000000c00)=""/246) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x8200, 0x0) dup3(r9, r0, 0x0) write(r9, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240)=[@sack_perm, @mss={0x2, 0x7}, @sack_perm, @sack_perm, @window={0x3, 0x3b, 0xf427}, @sack_perm], 0x6) 12:19:50 executing program 3: 12:19:50 executing program 5: 12:19:50 executing program 4: 12:19:50 executing program 1: 12:19:50 executing program 0: 12:19:50 executing program 3: 12:19:50 executing program 4: 12:19:50 executing program 5: 12:19:50 executing program 1: 12:19:51 executing program 0: 12:19:51 executing program 4: 12:19:51 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f0000000100)) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:51 executing program 5: 12:19:51 executing program 3: 12:19:51 executing program 1: 12:19:51 executing program 0: 12:19:51 executing program 4: 12:19:51 executing program 1: 12:19:51 executing program 5: 12:19:51 executing program 3: 12:19:51 executing program 4: 12:19:51 executing program 0: 12:19:51 executing program 5: 12:19:51 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x110040, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r1) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r2) tee(r1, r2, 0x0, 0x8) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r3, r0, 0x0) write(r3, 0x0, 0x0) 12:19:51 executing program 1: 12:19:51 executing program 4: 12:19:51 executing program 3: 12:19:51 executing program 0: 12:19:51 executing program 5: 12:19:51 executing program 3: 12:19:51 executing program 4: 12:19:51 executing program 0: 12:19:51 executing program 1: 12:19:52 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r2) dup(r2) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:52 executing program 5: 12:19:52 executing program 0: 12:19:52 executing program 3: 12:19:52 executing program 1: 12:19:52 executing program 4: 12:19:52 executing program 5: 12:19:52 executing program 3: 12:19:52 executing program 0: 12:19:52 executing program 1: 12:19:52 executing program 4: 12:19:52 executing program 3: 12:19:52 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r4, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x402000}, 0xc, &(0x7f0000000380)={&(0x7f00000000c0)={0x2a0, r5, 0x6, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xa276}]}, @TIPC_NLA_LINK={0xac, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8419}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0xb0, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf5cd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe871}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x82}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x800}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ID={0x8}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x2a0}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) dup(r2) ioctl$void(r2, 0x5451) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:52 executing program 5: 12:19:52 executing program 0: 12:19:52 executing program 4: 12:19:52 executing program 1: 12:19:52 executing program 3: 12:19:52 executing program 1: 12:19:52 executing program 5: 12:19:52 executing program 4: 12:19:52 executing program 0: 12:19:53 executing program 1: 12:19:53 executing program 0: 12:19:53 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x101001) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000040)='\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r2, r0, 0x0) write(r2, 0x0, 0x0) 12:19:53 executing program 5: 12:19:53 executing program 3: 12:19:53 executing program 4: 12:19:53 executing program 1: 12:19:53 executing program 0: 12:19:53 executing program 4: 12:19:53 executing program 5: 12:19:53 executing program 3: 12:19:53 executing program 1: 12:19:53 executing program 5: 12:19:53 executing program 0: 12:19:53 executing program 4: 12:19:53 executing program 3: 12:19:53 executing program 5: 12:19:53 executing program 1: 12:19:53 executing program 3: 12:19:53 executing program 4: 12:19:53 executing program 1: 12:19:53 executing program 0: 12:19:53 executing program 3: 12:19:53 executing program 5: 12:19:53 executing program 4: 12:19:53 executing program 1: 12:19:54 executing program 3: 12:19:54 executing program 0: 12:19:54 executing program 5: 12:19:54 executing program 4: 12:19:54 executing program 1: 12:19:54 executing program 3: 12:19:54 executing program 0: 12:19:54 executing program 4: 12:19:54 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$CAN_RAW_RECV_OWN_MSGS(r3, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:54 executing program 1: 12:19:54 executing program 5: 12:19:54 executing program 3: 12:19:54 executing program 0: 12:19:54 executing program 5: 12:19:54 executing program 1: 12:19:54 executing program 4: 12:19:54 executing program 3: 12:19:54 executing program 5: 12:19:54 executing program 0: 12:19:54 executing program 3: 12:19:54 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa00, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:54 executing program 4: 12:19:54 executing program 1: 12:19:54 executing program 5: 12:19:54 executing program 0: 12:19:55 executing program 4: 12:19:55 executing program 1: 12:19:55 executing program 3: 12:19:55 executing program 5: 12:19:55 executing program 0: 12:19:55 executing program 4: 12:19:55 executing program 1: 12:19:55 executing program 3: 12:19:55 executing program 5: 12:19:55 executing program 0: 12:19:55 executing program 4: 12:19:55 executing program 1: 12:19:55 executing program 5: 12:19:55 executing program 0: 12:19:55 executing program 3: 12:19:55 executing program 4: 12:19:55 executing program 1: 12:19:55 executing program 0: 12:19:55 executing program 4: 12:19:55 executing program 5: 12:19:55 executing program 1: 12:19:55 executing program 3: 12:19:55 executing program 0: 12:19:56 executing program 4: 12:19:56 executing program 3: 12:19:56 executing program 1: 12:19:56 executing program 5: 12:19:56 executing program 0: 12:19:56 executing program 3: 12:19:56 executing program 4: 12:19:56 executing program 1: 12:19:56 executing program 5: 12:19:56 executing program 0: 12:19:56 executing program 4: 12:19:56 executing program 3: 12:19:56 executing program 5: 12:19:56 executing program 1: 12:19:56 executing program 0: 12:19:56 executing program 3: 12:19:56 executing program 4: 12:19:56 executing program 5: 12:19:56 executing program 1: 12:19:56 executing program 0: 12:19:56 executing program 3: 12:19:56 executing program 1: 12:19:56 executing program 5: 12:19:56 executing program 3: 12:19:56 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDIO(r4, 0x80345621, &(0x7f00000003c0)) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0xff4f) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r7}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r7}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000d00)=@deltfilter={0xb48, 0x2d, 0x2, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r3, {0x8, 0xeec7397a59ed30a2}, {0x5, 0xfff2}, {0x6, 0x8}}, [@filter_kind_options=@f_rsvp={{0xc, 0x1, 'rsvp\x00'}, {0x45c, 0x2, [@TCA_RSVP_POLICE={0x408, 0x5, @TCA_POLICE_RATE={0x404, 0x2, [0x2, 0x7, 0xbcc, 0x4, 0x7, 0x8, 0xd949, 0x4, 0x9, 0x1, 0x0, 0x400, 0x1, 0x10000, 0x6, 0x8, 0x1, 0x3, 0xfffff001, 0x4, 0x3, 0x5, 0x9, 0x7, 0x6, 0x5, 0x4, 0x6, 0x0, 0x2, 0xa95, 0x7, 0x40, 0x200, 0xc571, 0x0, 0x1, 0x9, 0xfa81, 0x2, 0x1, 0xbcf4, 0x7, 0x3, 0x7, 0xfffffa7a, 0x4a9, 0x3, 0x21e1, 0x1, 0x5e, 0xef9, 0x401, 0x0, 0x3, 0x291, 0x3, 0xfff, 0x4, 0xffffffff, 0x101, 0x0, 0x7, 0x2, 0x5, 0xf807, 0x7ff, 0x7, 0x8001, 0x2, 0x1ff, 0x0, 0x6, 0x3f, 0x3, 0x4, 0x7fff, 0x3ff, 0x4, 0x4, 0x6, 0x7ff, 0x5, 0xbc2, 0x81, 0xef, 0x3, 0x80000000, 0x6, 0x8, 0x54da, 0x3, 0x1, 0xfffffffe, 0x5, 0x6, 0x556, 0x74e, 0xffff, 0x9, 0x20, 0x75, 0x2, 0x400, 0x2b5cb6f4, 0x40, 0x7f, 0xffff, 0x3ff, 0x7, 0xffffffff, 0x0, 0x8, 0x8000, 0x3825b99, 0x6, 0x0, 0x6, 0x0, 0x1, 0x7, 0x1, 0x4, 0x5, 0x7, 0x9, 0x1, 0xef70, 0x3, 0x8, 0x3, 0x5, 0x31d, 0x7, 0x7e5e61ed, 0x9, 0x0, 0x1, 0x1000, 0x2, 0x7, 0x5, 0x401, 0x1f, 0xb439, 0x6, 0x5, 0x30f, 0x28, 0x5, 0x200, 0x8, 0x66e737f8, 0x6, 0x6, 0x0, 0x0, 0x6, 0xfffffff7, 0xd26, 0x59, 0x8c, 0x3, 0x4, 0x6, 0x4, 0x3, 0x920, 0x7, 0x10000, 0xfffffffb, 0x3ff, 0x82f7, 0x5, 0x7f, 0x3, 0x10001, 0x1, 0x99f, 0x7, 0x7, 0x0, 0x400, 0x101, 0x5, 0x1, 0x7ff, 0x28, 0x0, 0x3, 0x1f, 0x3, 0x8000, 0x401, 0x101, 0x4, 0x800, 0x4cf, 0x1, 0x20, 0xe74, 0x401, 0xe61, 0x7, 0x80000000, 0x9, 0x5, 0x4, 0x1, 0x10001, 0x7, 0x64c, 0x8, 0x0, 0x671, 0x1, 0x7fffffff, 0xe, 0x800, 0x897b, 0x1ff, 0xfffffff7, 0x3f, 0x8, 0x7, 0x9, 0xffffffff, 0x7, 0x9, 0x4, 0xfffffffe, 0x2b85, 0x80, 0x3, 0x0, 0x0, 0xffffffff, 0x2, 0x5, 0x2, 0x7, 0x2, 0x3, 0x8, 0x4b, 0x80000000, 0x1, 0x2, 0xfffffffc, 0x83d3, 0x80, 0x155, 0x7e46, 0x3, 0xd0, 0x7]}}, @TCA_RSVP_CLASSID={0x8, 0x1, {0xfff2, 0xa}}, @TCA_RSVP_POLICE={0x40, 0x5, @TCA_POLICE_TBF={0x3c, 0x1, {0x3, 0x5, 0x7, 0x0, 0x3f, {0xfe, 0x6, 0x1e, 0x5, 0xbf5, 0x7fffffff}, {0x3f, 0x0, 0x5, 0x1}, 0x2, 0x0, 0xf9}}}, @TCA_RSVP_CLASSID={0x8, 0x1, {0x9, 0x6}}]}}, @TCA_CHAIN={0x8, 0xb, 0xa5}, @TCA_RATE={0x8, 0x5, {0xff, 0x7f}}, @filter_kind_options=@f_basic={{0xc, 0x1, 'basic\x00'}, {0x190, 0x2, [@TCA_BASIC_EMATCHES={0x178, 0x2, [@TCA_EMATCH_TREE_LIST={0x20, 0x2, @TCF_EM_CMP={0x1c, 0xd15, {0x5, 0x1, 0x1, 0x0, {0x3, 0x3f, 0x4, 0x0, 0x3, 0x1}}}}, @TCA_EMATCH_TREE_LIST={0x114, 0x2, @TCF_EM_CONTAINER={0x110, 0x4, {0x0, 0x0, 0x8000, 0x0, "4d905d2afe5b651596d749dae16ed1b21aa5526e0651be1e1909f55b38687731254de388ffd62e9af07231d513ad6caaadf2f3fb11f530459acb14d8781025843a4035a52ea11a933b436f213a1848736a52de48e0b357e73b12cd7d6c19ed65fd16159bf559d67912e2bfe2c198fffff28b57a66295656f4c70e41903b173bda3c86c32cc11ec73e795c55d4d59c5b98bf8384e0b665001925422a6ab52dd30ad1b4b4f69aec08b09e809ab9b7dc990dd9efb64bb728c801777175d26a0e2749730bf8f3e8b92344e9e9a35b6b19e7b37b9685ce1179b8cc415d939066afcb869bca7247e47fa14b6bf89a529297063f9b972746fa5682852cfa99b7ff097"}}}, @TCA_EMATCH_TREE_LIST={0x1c, 0x2, @TCF_EM_CANID={0x18, 0x2, {0x401, 0x7, 0x29, 0x0, {{0x2}}}}}, @TCA_EMATCH_TREE_LIST={0x1c, 0x2, @TCF_EM_CANID={0x18, 0x0, {0x6, 0x7, 0x5, 0x0, {{0x2}, {0x2}}}}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x100}}]}, @TCA_BASIC_EMATCHES={0x14, 0x2, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x9}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x81}}]}]}}, @TCA_RATE={0x8, 0x5, {0xbb, 0x1}}, @filter_kind_options=@f_fw={{0x8, 0x1, 'fw\x00'}, {0x4fc, 0x2, [@TCA_FW_POLICE={0xc, 0x2, @TCA_POLICE_AVRATE={0x8, 0x4, 0x1}}, @TCA_FW_POLICE={0xc, 0x2, @TCA_POLICE_RESULT={0x8, 0x5, 0x4af4}}, @TCA_FW_POLICE={0x408, 0x2, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x5, 0x1000, 0x40, 0x7, 0x7, 0x5, 0x6, 0x6, 0x6, 0x4000, 0x0, 0x3, 0x6, 0xffffff28, 0x1, 0x1f, 0x100, 0x5, 0x4, 0xbf4, 0x0, 0x5ad0, 0x5, 0x7, 0x10001, 0x200, 0x7, 0x1, 0x7fffffff, 0x1, 0x0, 0x6, 0x7c00, 0x24834ffe, 0x180f, 0x8, 0xe72, 0xffffffff, 0x1, 0x5, 0x1000, 0x3, 0x80000001, 0x0, 0x26c7351a, 0x6, 0x3f, 0x8, 0x0, 0x7ff, 0x5, 0x5, 0x8, 0x5, 0xca5, 0x6, 0xfffffe01, 0x5, 0x6, 0x73b, 0x9, 0x4569dd8f, 0x5, 0x0, 0x7, 0x2, 0x200, 0x14, 0x3, 0x3, 0xe4, 0x98, 0x200, 0x5, 0xf, 0x2, 0x4, 0x7, 0x5, 0x81, 0x6, 0x4, 0x10001, 0x400, 0x7fff, 0x6, 0x1f, 0x8001, 0x1, 0x3, 0x2, 0x2, 0xbbb5, 0x7, 0x200, 0x35, 0x4, 0x7, 0xe8b, 0xe35a, 0x0, 0xfff, 0x86a, 0x0, 0xffffff01, 0x8b0, 0x800, 0x8001, 0x40, 0x2000000, 0x5, 0x8, 0x401, 0x3f, 0x8, 0x8, 0x5, 0x35d2cac6, 0x800, 0x9, 0x9, 0x2, 0x6, 0x1, 0x40, 0x80000000, 0x5, 0x2, 0xfb, 0x1, 0x0, 0xffffffa7, 0x0, 0x9, 0x7, 0x0, 0x4, 0x1ff, 0x5, 0x8fe, 0x11, 0x0, 0x401, 0x7, 0x10000, 0x200, 0x9, 0xa13, 0x36, 0x4, 0x9, 0x80, 0x6, 0x96, 0x80, 0x4, 0xc5, 0x0, 0x7, 0x0, 0xb3, 0x2, 0x4, 0x7, 0x101, 0x6, 0x7, 0x9, 0x11, 0xc, 0x1, 0x401, 0x5, 0x401, 0x0, 0xeb, 0x10001, 0x401, 0xad, 0x0, 0xd7, 0x1, 0xfff, 0x8, 0x2, 0x1000, 0x9, 0x400, 0x7, 0xfff, 0x5, 0x2, 0xffffffff, 0x0, 0x4, 0x0, 0x7, 0x195c28d9, 0x81, 0x8, 0x400, 0x4, 0xc, 0x4, 0x8, 0x2, 0x6, 0x7fffffff, 0x80000001, 0x2, 0x101, 0x8, 0xb1, 0x7, 0x2, 0x6, 0x8001, 0x7, 0x7f, 0x1000, 0x4, 0xa08, 0x1, 0x10000000, 0x1f, 0x6, 0x0, 0x0, 0x0, 0x9, 0x83f2, 0x6, 0x8001, 0x5, 0x200, 0x4c, 0xfff, 0x7, 0x3, 0x4808, 0x4, 0xcddd, 0x401, 0x7, 0x4adf, 0x1f, 0x89df, 0x3ff, 0x65, 0x1, 0x5, 0x7e, 0x9, 0x414, 0x2, 0x9]}}, @TCA_FW_ACT={0xd8, 0x4, @m_mirred={0xd4, 0x5, {{0xc, 0x1, 'mirred\x00'}, {0x24, 0x2, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x5, 0x7, 0x6, 0x20, 0x400}, 0xe, r7}}}, {0x9c, 0x6, "cd5a43128f5b55ff34041b96ae5d1346a078bf8f8827b82dc49107952d4b7d9525f6727edb552e274f30f61989efa836cf8482b4f5a54dbe8c4f39bcebdbe827b02b434904d52b8c5d13cd85c82650ad80bef367a8332038dde9e3856907e39ad803a0dc34e87d8f1fb8aab142da1eb0cf803ffd19268e6da4105ae1b947c32103a094a8e0a2403b5fab96cafd7bb460bc51e78628284fef"}}}}]}}]}, 0xb48}, 0x1, 0x0, 0x0, 0xc000}, 0x8040) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r8, 0x4004743d, &(0x7f0000000c00)=""/246) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r9) r10 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0x60) dup3(r8, r10, 0x0) write(r8, 0x0, 0x0) 12:19:56 executing program 4: 12:19:56 executing program 0: 12:19:56 executing program 1: 12:19:56 executing program 4: 12:19:57 executing program 3: 12:19:57 executing program 5: 12:19:57 executing program 1: 12:19:57 executing program 4: 12:19:57 executing program 3: 12:19:57 executing program 0: 12:19:57 executing program 1: 12:19:57 executing program 2: clone3(&(0x7f0000000240)={0x930300, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0), 0x1d, 0x0, &(0x7f0000000100)=""/81, 0x51, &(0x7f0000000180)=""/189}, 0x40) ioctl$VIDIOC_G_INPUT(0xffffffffffffffff, 0x80045626, &(0x7f0000000280)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:57 executing program 3: 12:19:57 executing program 4: 12:19:57 executing program 5: 12:19:57 executing program 0: 12:19:57 executing program 1: 12:19:57 executing program 5: 12:19:57 executing program 0: 12:19:57 executing program 1: 12:19:57 executing program 3: 12:19:57 executing program 4: 12:19:58 executing program 5: 12:19:58 executing program 2: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/242) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) r1 = dup3(r0, 0xffffffffffffffff, 0x0) accept4$llc(r1, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x10, 0x0) write(r0, 0x0, 0x0) 12:19:58 executing program 0: 12:19:58 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000), 0x32a) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@timestamp], 0x1) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040), 0x4) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f00000000c0)={0x0, "7abb8aff7e5214ceb9e05fab6b1e4b1955a851d8387fa468b1fe6e28913d8909"}) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x618) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@timestamp, @sack_perm], 0x2) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r1, 0x0, 0x0) close(0xffffffffffffffff) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 12:19:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f00000006c0)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0x24}}, 0x0) 12:19:58 executing program 3: prctl$PR_SET_FPEMU(0xa, 0x0) 12:19:58 executing program 5: r0 = socket(0x1, 0x1, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERROR(r0, 0x0, 0x0) 12:19:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)='2', 0x1, 0x0, 0x0, 0x0) 12:19:58 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="019db8ec96e94fe38c403970297b1d33934e", 0x12}, {&(0x7f0000001200)="a181b8e145fa34100271a137cc08d2c6e35bf43ebe5a", 0x16}], 0x2}}], 0x1, 0x20040b8a) 12:19:58 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/257) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:58 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000180), 0x4) 12:19:58 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x5) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xffffffe8) dup2(r0, r1) 12:19:58 executing program 0: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) ioctl$KDADDIO(r0, 0x5415, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x13f4ec435b4a9db6, 0x1000, &(0x7f0000018000/0x1000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000100)={0xa2a33faffb2f4d2b}) 12:19:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:19:58 executing program 5: r0 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000180), 0x4) [ 300.948983][T13545] BPF:[1] DATASEC 12:19:58 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) dup(r0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r1, 0x0) [ 300.971995][T13545] BPF:size=3436 vlen=1 12:19:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) [ 301.009865][T13545] BPF: 12:19:58 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) write(r1, 0x0, 0x0) [ 301.032884][T13545] BPF:Invalid name 12:19:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) [ 301.070779][T13545] BPF: [ 301.070779][T13545] 12:19:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x2) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) [ 301.127541][T13559] BPF:[1] DATASEC [ 301.154832][T13559] BPF:size=3436 vlen=1 [ 301.161543][T13561] BPF:hdr_len not found [ 301.177170][T13559] BPF: 12:19:59 executing program 4: mmap(&(0x7f000038f000/0x2000)=nil, 0x2000, 0x0, 0x8086031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0xcb) [ 301.195111][T13559] BPF:Invalid name [ 301.207909][T13559] BPF: [ 301.207909][T13559] 12:19:59 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./bus\x00', &(0x7f0000000300)='fuseblk\x00', 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) fstat(0xffffffffffffffff, &(0x7f0000000100)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./bus\x00', &(0x7f0000000340)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) r7 = getpid() r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',ro \x00\x00\x00de=00000000000040000140000,user_id=', @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',max_read=0x00000000000003ff,allow_other,default_permissi', @ANYRESDEC=r9, @ANYBLOB=',subj_user=\'.vmnet0/{{,smackfshat=cpuset*GPL%\',\x00']) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'bpq0\x00'}) sendmsg$unix(r6, &(0x7f0000000400)={&(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000200)="9524", 0x2}], 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=r9, @ANYRES32, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r5, @ANYBLOB="00010000c4aa13e08ac1090f5bd35d4aa6a8e64f8c627cf2fe31b5062e3b9e1151e5bc81f39983af80eb9973f848a8c02a35283a949217"], 0x50, 0xc15331b0ee3b450f}, 0x48) 12:19:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:19:59 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000080)="85", 0x1, 0xa3a660a4e6e5cc9a, &(0x7f0000000180)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c) 12:19:59 executing program 4: [ 301.397655][T13581] BPF:[1] DATASEC [ 301.404694][T13581] BPF:size=3436 vlen=1 [ 301.452041][T13581] BPF: [ 301.458549][T13581] BPF:Invalid name [ 301.468492][T13581] BPF: [ 301.468492][T13581] 12:19:59 executing program 0: 12:19:59 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40000, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f00000002c0)=""/236) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:19:59 executing program 4: 12:19:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:19:59 executing program 3: 12:19:59 executing program 4: [ 301.716289][T13596] BPF:[1] DATASEC [ 301.725946][T13596] BPF:size=3436 vlen=1 [ 301.735758][T13596] BPF: [ 301.758111][T13596] BPF:Invalid name [ 301.764295][T13596] BPF: [ 301.764295][T13596] 12:19:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:19:59 executing program 0: 12:19:59 executing program 3: 12:19:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x2) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) 12:19:59 executing program 4: 12:20:00 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101000, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) [ 302.108403][T13614] BPF:[1] DATASEC 12:20:00 executing program 4: 12:20:00 executing program 3: 12:20:00 executing program 0: [ 302.139805][T13614] BPF:size=3436 vlen=1 [ 302.151098][T13614] BPF: [ 302.177275][T13614] BPF:Invalid name [ 302.220725][T13614] BPF: [ 302.220725][T13614] 12:20:00 executing program 0: 12:20:00 executing program 1: socket$inet6(0xa, 0x3, 0x6b) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:20:00 executing program 4: 12:20:00 executing program 3: [ 302.388070][T13632] BPF:[1] DATASEC [ 302.416434][T13632] BPF:size=3436 vlen=1 [ 302.428731][T13632] BPF: [ 302.437510][T13632] BPF:Invalid name 12:20:00 executing program 4: 12:20:00 executing program 0: [ 302.459029][T13632] BPF: [ 302.459029][T13632] 12:20:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x2) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) 12:20:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:20:00 executing program 3: 12:20:00 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/259) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:00 executing program 0: 12:20:00 executing program 4: 12:20:00 executing program 3: 12:20:00 executing program 0: [ 302.993807][T13653] BPF:[1] DATASEC [ 303.005143][T13653] BPF:size=3436 vlen=1 [ 303.012706][T13653] BPF: [ 303.017835][T13653] BPF:Invalid name [ 303.023091][T13653] BPF: [ 303.023091][T13653] 12:20:00 executing program 4: 12:20:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 12:20:01 executing program 3: 12:20:01 executing program 4: 12:20:01 executing program 5: 12:20:01 executing program 0: 12:20:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 12:20:01 executing program 4: 12:20:01 executing program 3: 12:20:01 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r4, 0x301}, 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcb29}]}, 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x8010) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/\xd9\xa5\xff\xee+\xd9\x99\x8b', 0x40a02, 0x0) ioctl$EVIOCGPROP(r5, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r5, r0, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$sock_inet6_udp_SIOCINQ(r7, 0x541b, &(0x7f00000001c0)) write(r5, 0x0, 0x0) 12:20:01 executing program 5: 12:20:01 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000008a80)={0x5, &(0x7f0000008740)=""/215, &(0x7f0000008a00)=[{0xa, 0x5, 0x401, &(0x7f0000000140)=""/5}, {0x0, 0x38, 0x1, &(0x7f0000000540)=""/56}, {0x10000, 0x7b, 0x6, &(0x7f0000008840)=""/123}, {0x100, 0xa3, 0x100, &(0x7f00000088c0)=""/163}, {0x5, 0x65, 0x6, &(0x7f0000008980)=""/101}]}) unshare(0x40000000) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x648041, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000640)=""/246) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) recvmmsg(r4, &(0x7f0000008440)=[{{&(0x7f00000000c0)=@pppoe, 0x80, &(0x7f0000000140)}, 0xff}, {{&(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000200)=""/154, 0x9a}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000000300)=""/168, 0xa8}, {&(0x7f00000003c0)=""/146, 0x92}, {&(0x7f0000000480)=""/179, 0xb3}, {&(0x7f0000000540)}, {&(0x7f0000000580)=""/183, 0xb7}, {&(0x7f0000000d00)=""/4096, 0x1000}, {&(0x7f0000000740)=""/35, 0x23}], 0x9, &(0x7f0000000840)=""/124, 0x7c}, 0x8001}, {{&(0x7f0000000940)=@pppol2tp, 0x80, &(0x7f00000008c0)=[{&(0x7f00000009c0)=""/209, 0xd1}, {&(0x7f0000000ac0)=""/207, 0xcf}, {&(0x7f0000001d00)=""/4096, 0x1000}], 0x3, &(0x7f0000002d00)=""/171, 0xab}, 0x95e7}, {{&(0x7f0000002dc0)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000002e40)=""/131, 0x83}], 0x1, &(0x7f0000002f00)=""/175, 0xaf}, 0x6}, {{&(0x7f0000002fc0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000034c0)=[{&(0x7f0000003040)=""/1, 0x1}, {&(0x7f0000003080)=""/239, 0xef}, {&(0x7f0000003180)=""/211, 0xd3}, {&(0x7f0000003280)=""/59, 0x3b}, {&(0x7f00000032c0)=""/218, 0xda}, {&(0x7f00000033c0)=""/232, 0xe8}], 0x6, &(0x7f0000008ac0)=""/4096, 0x1000}, 0x7}, {{&(0x7f0000009ac0)=@ax25={{0x3, @bcast}, [@bcast, @netrom, @remote, @netrom, @remote, @bcast, @null, @bcast]}, 0x80, &(0x7f0000004940)=[{&(0x7f00000045c0)=""/140, 0x8c}, {&(0x7f0000004680)=""/7, 0x7}, {&(0x7f00000046c0)=""/163, 0xa3}, {&(0x7f0000004780)=""/175, 0xaf}, {&(0x7f0000004840)=""/19, 0x13}, {&(0x7f0000004880)=""/170, 0xaa}], 0x6, &(0x7f00000049c0)=""/224, 0xe0}, 0xffffffff}, {{&(0x7f0000004ac0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000004b80)=[{&(0x7f0000004b40)=""/64, 0x40}], 0x1, &(0x7f0000004bc0)=""/4096, 0x1000}, 0x2}, {{0x0, 0x0, &(0x7f0000006e40)=[{&(0x7f0000005bc0)=""/156, 0x9c}, {&(0x7f0000005c80)=""/154, 0x9a}, {&(0x7f0000005d40)=""/44, 0x2c}, {&(0x7f0000005d80)=""/4096, 0x1000}, {&(0x7f0000006d80)=""/159, 0x9f}], 0x5}, 0x8}, {{&(0x7f0000006ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000007000)=[{&(0x7f0000006f40)=""/52, 0x34}, {&(0x7f0000006f80)=""/118, 0x76}], 0x2, &(0x7f0000007040)=""/17, 0x11}, 0x7ff}, {{0x0, 0x0, &(0x7f00000083c0)=[{&(0x7f0000007080)=""/48, 0x30}, {&(0x7f00000070c0)=""/44, 0x2c}, {&(0x7f0000007100)=""/4096, 0x1000}, {&(0x7f0000008100)=""/140, 0x8c}, {&(0x7f00000081c0)=""/255, 0xff}, {&(0x7f00000082c0)=""/235, 0x3f}], 0x6}, 0x6}], 0xa, 0x100, 0x0) ioctl$TIOCGRS485(r2, 0x542e, &(0x7f0000000000)) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r3, r2, 0x0) write(r3, 0x0, 0x0) ioctl$KVM_GET_PIT2(r5, 0x8070ae9f, &(0x7f00000086c0)) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 12:20:01 executing program 4: 12:20:01 executing program 0: 12:20:01 executing program 3: 12:20:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 12:20:02 executing program 5: [ 304.094402][T13689] IPVS: ftp: loaded support on port[0] = 21 12:20:02 executing program 3: 12:20:02 executing program 4: 12:20:02 executing program 0: 12:20:02 executing program 5: 12:20:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000240)=""/191, 0x0, 0xbf, 0x8}, 0x20) 12:20:02 executing program 4: [ 304.416609][T13714] BPF:hdr_len not found 12:20:02 executing program 0: 12:20:02 executing program 3: 12:20:02 executing program 5: 12:20:02 executing program 4: [ 304.833761][T13703] IPVS: ftp: loaded support on port[0] = 21 12:20:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000240)=""/191, 0x0, 0xbf, 0x8}, 0x20) 12:20:02 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = openat$cgroup_ro(r1, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f0000000280)={0x7fffffff, 0x6, {0x0, 0xc9395255fe30fcec, 0x4, 0x3, 0x4}}) r4 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000004c0)={r6, &(0x7f0000000300)="041f313123fc8d9648674a4d989e8c2d827eebddf5617227bcba7ede7e24be8a2e0845ddcecc6587e189ed237a639ac5aa219e828580251da8672f852aff0789450713ef51ef6ffc730dd5ce0a1826677d56a9b439afa068b3734ddc9090d0aea34e48e9cb515b9ca4fc01c3a364aaea7edb3506b8a665fc11f4dc7f4c4d794d269f5b800ad8bf7cd6add10befb1fc6089a63b5fe04ff5ceab20db2de8c9b5", &(0x7f00000003c0)=""/211, 0x4}, 0x20) ioctl$SG_GET_REQUEST_TABLE(r4, 0x2286, &(0x7f00000000c0)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'ifb0\x00', {0x2, 0x4e24, @rand_addr=0x7}}) write(r1, 0x0, 0x0) 12:20:02 executing program 5: 12:20:02 executing program 4: [ 304.945844][T13728] BPF:hdr_len not found 12:20:02 executing program 3: 12:20:02 executing program 0: 12:20:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000240)=""/191, 0x0, 0xbf, 0x8}, 0x20) [ 305.010814][ T359] tipc: TX() has been purged, node left! 12:20:03 executing program 5: 12:20:03 executing program 4: 12:20:03 executing program 3: [ 305.200746][T13743] BPF:hdr_len not found 12:20:03 executing program 4: 12:20:03 executing program 0: 12:20:03 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x1b, 0xbf, 0x8}, 0x20) 12:20:03 executing program 3: 12:20:03 executing program 5: 12:20:03 executing program 4: 12:20:03 executing program 0: 12:20:03 executing program 3: 12:20:03 executing program 5: [ 305.575256][T13766] BPF:No type found 12:20:03 executing program 4: 12:20:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x1b, 0xbf, 0x8}, 0x20) 12:20:03 executing program 0: 12:20:03 executing program 3: [ 305.865908][T13784] BPF:No type found 12:20:03 executing program 4: 12:20:03 executing program 5: 12:20:03 executing program 0: 12:20:03 executing program 3: 12:20:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x1b, 0xbf, 0x8}, 0x20) 12:20:03 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f00000000c0)=""/244) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1f9493f86b7fe0cb, &(0x7f0000000000)=0x2, 0x4) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r4) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) dup3(r6, r4, 0x0) write(r3, 0x0, 0x0) 12:20:03 executing program 0: 12:20:03 executing program 3: 12:20:04 executing program 4: 12:20:04 executing program 5: [ 306.086416][T13795] BPF:No type found 12:20:04 executing program 0: 12:20:04 executing program 3: 12:20:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:20:04 executing program 4: 12:20:04 executing program 5: 12:20:04 executing program 3: 12:20:04 executing program 4: [ 306.425987][T13811] BPF:[1] DATASEC (anon) [ 306.430376][T13811] BPF:size=3436 vlen=1 [ 306.480623][T13811] BPF: [ 306.495866][T13811] BPF:Invalid name [ 306.525788][T13811] BPF: [ 306.525788][T13811] 12:20:04 executing program 5: 12:20:04 executing program 0: 12:20:04 executing program 3: 12:20:04 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000000)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f00000000c0)={0x0, 0x7530}, 0x10) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r3, r0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r4) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f00000001c0), 0x4) fstat(r4, &(0x7f0000000140)) pipe2(&(0x7f0000000100), 0x89400) write(r3, 0x0, 0x0) 12:20:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:20:04 executing program 0: 12:20:04 executing program 5: 12:20:04 executing program 4: 12:20:04 executing program 3: [ 306.764623][T13834] BPF:[1] DATASEC (anon) [ 306.769011][T13834] BPF:size=3436 vlen=1 [ 306.862949][T13834] BPF: [ 306.878182][T13834] BPF:Invalid name 12:20:04 executing program 0: 12:20:04 executing program 5: [ 306.905132][T13834] BPF: [ 306.905132][T13834] 12:20:04 executing program 4: 12:20:04 executing program 3: 12:20:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:20:05 executing program 4: [ 307.130253][T13856] BPF:[1] DATASEC (anon) [ 307.146510][T13856] BPF:size=3436 vlen=1 12:20:05 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:05 executing program 5: 12:20:05 executing program 0: 12:20:05 executing program 3: [ 307.205762][T13856] BPF: [ 307.219931][T13856] BPF:Invalid name [ 307.228498][T13856] BPF: [ 307.228498][T13856] 12:20:05 executing program 4: 12:20:05 executing program 5: 12:20:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0x0, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:20:05 executing program 0: 12:20:05 executing program 3: 12:20:05 executing program 4: 12:20:05 executing program 5: 12:20:05 executing program 0: [ 307.601180][T13882] BPF:[1] DATASEC [ 307.621530][T13882] BPF:size=0 vlen=1 [ 307.657375][T13882] BPF: [ 307.695600][T13882] BPF:size == 0 12:20:05 executing program 3: 12:20:05 executing program 4: 12:20:05 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EVIOCGID(r3, 0x80084502, &(0x7f0000000d00)=""/4096) write(r1, 0x0, 0x0) [ 307.738789][T13882] BPF: [ 307.738789][T13882] 12:20:05 executing program 0: 12:20:05 executing program 5: 12:20:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0x0, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:20:05 executing program 4: 12:20:05 executing program 3: 12:20:05 executing program 5: [ 308.012735][T13906] BPF:[1] DATASEC [ 308.039436][T13906] BPF:size=0 vlen=1 12:20:05 executing program 0: 12:20:05 executing program 3: 12:20:05 executing program 4: [ 308.060498][T13906] BPF: [ 308.071283][T13906] BPF:size == 0 [ 308.074889][T13906] BPF: [ 308.074889][T13906] 12:20:06 executing program 5: 12:20:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0x0, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:20:06 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/tev/ppp\x00', 0x60003, 0x0) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7ff, 0x80000) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$PPPIOCSMRRU(r3, 0x4004743b, &(0x7f00000000c0)=0x7ff) r4 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x4f4a, 0x80) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) r5 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EVIOCGPROP(r5, 0xc004743e, &(0x7f0000000640)=""/217) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r6, 0x4004743d, &(0x7f0000000c00)=""/246) rmdir(&(0x7f0000000000)='./file0\x00') r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) getsockopt$bt_BT_DEFER_SETUP(r8, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$inet_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000200)='illinois\x00', 0x9) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup3(r4, r0, 0x100000) write(r6, 0x0, 0x0) 12:20:06 executing program 0: 12:20:06 executing program 3: 12:20:06 executing program 4: [ 308.354057][T13922] BPF:[1] DATASEC [ 308.395089][T13922] BPF:size=0 vlen=1 12:20:06 executing program 5: [ 308.416228][T13922] BPF: [ 308.434013][T13922] BPF:size == 0 [ 308.466859][T13922] BPF: [ 308.466859][T13922] 12:20:06 executing program 0: 12:20:06 executing program 3: 12:20:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xf, 0x0, 0xd6c}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) 12:20:06 executing program 4: 12:20:06 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$VIDIOC_G_EDID(0xffffffffffffffff, 0xc0285628, &(0x7f0000000180)={0x0, 0x7f, 0x1f, [], &(0x7f0000000000)=0x2}) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f00000000c0)=ANY=[@ANYBLOB="0300000000000000010000000200000000000000000000000700000007000000000000000000000000000000000000000000000000000000b9f3ffff01000000000000000000000008000000010000800000000000000000000000000000000000000000000000000900000000000000000000e3ffffff00810000000100"/152]) 12:20:06 executing program 5: 12:20:06 executing program 0: 12:20:06 executing program 3: 12:20:06 executing program 4: [ 308.789891][T13943] BPF:[1] DATASEC [ 308.840669][T13943] BPF:size=3436 vlen=0 [ 308.886652][T13943] BPF: 12:20:06 executing program 5: [ 308.910900][T13943] BPF:vlen == 0 12:20:06 executing program 3: [ 308.950842][T13943] BPF: [ 308.950842][T13943] 12:20:06 executing program 0: 12:20:06 executing program 4: 12:20:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xf, 0x0, 0xd6c}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) 12:20:07 executing program 5: 12:20:07 executing program 3: [ 309.197434][T13965] BPF:[1] DATASEC [ 309.207035][T13965] BPF:size=3436 vlen=0 [ 309.222235][T13965] BPF: [ 309.225166][T13965] BPF:vlen == 0 [ 309.252338][T13965] BPF: [ 309.252338][T13965] 12:20:07 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = dup3(r1, r0, 0x0) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000040)=0x2) ioctl$USBDEVFS_RELEASEINTERFACE(r2, 0x80045510, &(0x7f0000000000)=0xff) write(r1, 0x0, 0x0) 12:20:07 executing program 0: 12:20:07 executing program 4: 12:20:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xf, 0x0, 0xd6c}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) 12:20:07 executing program 5: 12:20:07 executing program 3: [ 309.509746][T13980] BPF:[1] DATASEC 12:20:07 executing program 4: [ 309.540718][T13980] BPF:size=3436 vlen=0 12:20:07 executing program 0: [ 309.561129][T13980] BPF: 12:20:07 executing program 3: [ 309.586498][T13980] BPF:vlen == 0 [ 309.602936][T13980] BPF: [ 309.602936][T13980] 12:20:07 executing program 5: 12:20:07 executing program 4: 12:20:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 309.848064][T13999] BPF:[1] Invalid name_offset:2 12:20:07 executing program 0: 12:20:07 executing program 3: 12:20:07 executing program 5: 12:20:07 executing program 4: 12:20:07 executing program 3: 12:20:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:20:08 executing program 0: 12:20:08 executing program 5: 12:20:08 executing program 4: 12:20:08 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0xf4d4c6dbcf17659a, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$TCXONC(r2, 0x540a, 0x1) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) writev(r4, &(0x7f0000000680)=[{0x0}, {&(0x7f00000002c0)="be658d4f3db1a19c4de3df6c0b53958a02c7aec554ba470b2a50b8152413d47ab7d150a6341961cd", 0x45c}, {0x0, 0x5000000}], 0x3) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) mq_open(&(0x7f0000000100)='/dev/ppp\x00', 0x800, 0x100, &(0x7f0000000140)={0x0, 0x7, 0x7f, 0x1, 0x0, 0x394, 0x80000000, 0x54bc}) r5 = dup3(r3, r0, 0x0) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f00000000c0)=0x6) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r7, 0x5441, 0x2) write(r3, 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) write$cgroup_int(r5, &(0x7f0000000040)=0xfffffffffffffffe, 0x12) 12:20:08 executing program 3: [ 310.255952][T14021] BPF:[1] Invalid name_offset:2 12:20:08 executing program 4: 12:20:08 executing program 0: 12:20:08 executing program 5: 12:20:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:20:08 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0xffffffffffffffd3) 12:20:08 executing program 3: 12:20:08 executing program 4: 12:20:08 executing program 0: 12:20:08 executing program 5: [ 310.595513][T14038] BPF:[1] Invalid name_offset:2 12:20:08 executing program 3: 12:20:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, 0x0, 0x33, 0x0, 0x8}, 0x20) 12:20:08 executing program 0: 12:20:08 executing program 4: 12:20:08 executing program 5: 12:20:08 executing program 3: 12:20:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, 0x0, 0x33, 0x0, 0x8}, 0x20) 12:20:08 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x5, 0x3, 0x200, [{0x0, 0x2, 0x1000000}]}, @enum={0x0, 0x2000000000000217}]}}, &(0x7f00000002c0)=""/236, 0x3e, 0xfffffffffffffe45, 0x1}, 0x20) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:08 executing program 4: 12:20:08 executing program 0: 12:20:08 executing program 5: 12:20:08 executing program 3: 12:20:09 executing program 0: 12:20:09 executing program 4: 12:20:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, 0x0, 0x33, 0x0, 0x8}, 0x20) 12:20:09 executing program 3: 12:20:09 executing program 5: 12:20:09 executing program 0: 12:20:09 executing program 4: 12:20:09 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000640)=""/238) inotify_init() r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r3, r0, 0x0) write(r3, 0x0, 0x0) 12:20:09 executing program 5: 12:20:09 executing program 3: 12:20:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf}, 0x20) 12:20:09 executing program 4: 12:20:09 executing program 0: 12:20:09 executing program 5: 12:20:09 executing program 3: 12:20:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf}, 0x20) 12:20:09 executing program 4: 12:20:09 executing program 0: 12:20:09 executing program 5: 12:20:10 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = dup3(r1, r0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x7fff}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000000c0)={r5, @in6={{0xa, 0x4e20, 0x80, @mcast1, 0x7}}}, &(0x7f0000000180)=0x84) write(r1, 0x0, 0x0) 12:20:10 executing program 4: 12:20:10 executing program 3: 12:20:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf}, 0x20) 12:20:10 executing program 0: 12:20:10 executing program 5: 12:20:10 executing program 3: 12:20:10 executing program 4: 12:20:10 executing program 1: 12:20:10 executing program 0: 12:20:10 executing program 3: 12:20:10 executing program 5: 12:20:10 executing program 1: 12:20:10 executing program 4: 12:20:10 executing program 0: 12:20:10 executing program 3: 12:20:10 executing program 5: 12:20:10 executing program 4: 12:20:10 executing program 1: 12:20:10 executing program 0: 12:20:10 executing program 3: 12:20:11 executing program 5: 12:20:11 executing program 4: 12:20:11 executing program 1: 12:20:11 executing program 3: 12:20:11 executing program 0: 12:20:11 executing program 1: 12:20:11 executing program 0: 12:20:11 executing program 5: 12:20:11 executing program 4: 12:20:11 executing program 1: 12:20:11 executing program 3: 12:20:11 executing program 0: 12:20:11 executing program 3: 12:20:11 executing program 4: 12:20:11 executing program 5: 12:20:11 executing program 1: 12:20:11 executing program 0: 12:20:11 executing program 4: 12:20:11 executing program 3: 12:20:11 executing program 1: 12:20:12 executing program 1: 12:20:12 executing program 5: 12:20:12 executing program 4: 12:20:12 executing program 0: 12:20:12 executing program 3: 12:20:12 executing program 5: 12:20:12 executing program 0: 12:20:12 executing program 3: 12:20:12 executing program 4: 12:20:12 executing program 1: 12:20:12 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = dup3(r1, r0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f00000001c0)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="5b5d03d21df1aa6c7352c687223c2334d4010ec0fddd13d540b87c7cefd9b20374b26ecf5b433af7a817eee2ac99d5513d0f2ff67d5248d0233eaf38ff"], 0x14}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800001}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b5ec0000", @ANYRES16=r4, @ANYBLOB="200027bd7000fddbdf25020000001400010000000000000000000000ffffe00000021800040008000000ff030000ea04885206000000090000000800030002f2000008000200bf000000080003000200000014000100fe880000000000000000000000000001"], 0x6c}, 0x1, 0x0, 0x0, 0x4040}, 0x80) write(r1, 0x0, 0x0) [ 314.311150][ T359] tipc: TX() has been purged, node left! 12:20:12 executing program 5: 12:20:12 executing program 4: 12:20:12 executing program 3: 12:20:12 executing program 0: 12:20:12 executing program 1: 12:20:12 executing program 5: 12:20:12 executing program 3: 12:20:12 executing program 4: 12:20:12 executing program 0: 12:20:12 executing program 1: 12:20:12 executing program 2: getitimer(0x0, &(0x7f00000004c0)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='\x00\x00@\x00', 0x12d500, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) bind$bt_l2cap(r2, &(0x7f0000000240)={0x1f, 0x0, {0x9, 0x70, 0x9, 0x4, 0x1f, 0x79}, 0x5, 0x20}, 0xe) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000140)=""/246) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000000)=0x7fff, 0x4) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000300)={0x4a, 0xfffe, 0xe, 0x4, 0x1000009, 0x2, 0x5a95, 0x3, 0x0}, &(0x7f0000000340)=0x1fc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000380)={r5, @in6={{0xa, 0x4e22, 0x20, @empty, 0x6}}, [0x2000, 0xb3, 0x77, 0x8, 0x9, 0x7f, 0x1, 0x99f, 0x4, 0x1, 0x1000, 0x1, 0x5, 0x6, 0x9]}, &(0x7f0000000480)=0x100) dup3(r1, r0, 0x0) keyctl$link(0x8, 0x0, 0xfffffffffffffffc) write(r1, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000280)=0x100, 0x4) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'bpq0\x00', 0x200}) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000100)={0x6, &(0x7f0000000080)=[{0x401, 0x6, 0x2, 0x8}, {0x0, 0x1f, 0x9b}, {0x6, 0x0, 0x1, 0x5}, {0xfffa, 0x8c, 0x3, 0xb6}, {0x2, 0x8, 0x40, 0x727}, {0x1, 0x3f, 0x9}]}) 12:20:12 executing program 5: 12:20:12 executing program 4: 12:20:12 executing program 1: 12:20:12 executing program 0: 12:20:12 executing program 3: 12:20:13 executing program 5: 12:20:13 executing program 4: 12:20:13 executing program 0: 12:20:13 executing program 1: 12:20:13 executing program 3: 12:20:13 executing program 4: 12:20:13 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0xc0000, 0x0) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:13 executing program 5: 12:20:13 executing program 3: 12:20:13 executing program 4: 12:20:13 executing program 0: 12:20:13 executing program 1: 12:20:13 executing program 5: 12:20:13 executing program 1: 12:20:13 executing program 3: 12:20:13 executing program 5: 12:20:13 executing program 4: 12:20:13 executing program 0: 12:20:13 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f00000000c0)={0xff, 0x4}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:13 executing program 1: 12:20:13 executing program 5: 12:20:13 executing program 4: 12:20:13 executing program 3: 12:20:13 executing program 0: 12:20:13 executing program 1: 12:20:13 executing program 5: 12:20:13 executing program 4: 12:20:13 executing program 3: 12:20:14 executing program 1: 12:20:14 executing program 3: 12:20:14 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000000)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/236) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='\x13dev/ppp\x00', 0x4000, 0x0) dup3(r3, r0, 0x0) write(r3, 0x0, 0x0) 12:20:14 executing program 4: 12:20:14 executing program 0: 12:20:14 executing program 5: 12:20:14 executing program 1: 12:20:14 executing program 3: 12:20:14 executing program 0: 12:20:14 executing program 4: 12:20:14 executing program 5: 12:20:14 executing program 1: 12:20:14 executing program 3: 12:20:14 executing program 0: 12:20:14 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x401, 0x200) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:14 executing program 4: 12:20:14 executing program 1: 12:20:14 executing program 5: 12:20:14 executing program 3: 12:20:14 executing program 0: 12:20:14 executing program 4: 12:20:14 executing program 5: 12:20:14 executing program 1: 12:20:15 executing program 3: 12:20:15 executing program 0: 12:20:15 executing program 1: 12:20:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='\x03\x00gv/Ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) write(r1, 0x0, 0x0) 12:20:15 executing program 4: 12:20:15 executing program 5: 12:20:15 executing program 3: 12:20:15 executing program 0: 12:20:15 executing program 1: 12:20:15 executing program 5: 12:20:15 executing program 4: 12:20:15 executing program 0: 12:20:15 executing program 3: 12:20:15 executing program 1: 12:20:15 executing program 5: 12:20:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$VIDIOC_G_AUDOUT(r2, 0x80345631, &(0x7f0000000100)) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$KDGKBTYPE(r4, 0x4b33, &(0x7f0000000000)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r4, 0x4004743d, &(0x7f00000001c0)=""/239) dup3(r5, r0, 0x0) write(r5, 0x0, 0x0) 12:20:15 executing program 0: 12:20:15 executing program 4: 12:20:15 executing program 3: 12:20:15 executing program 5: 12:20:15 executing program 1: 12:20:16 executing program 4: 12:20:16 executing program 0: 12:20:16 executing program 5: 12:20:16 executing program 3: 12:20:16 executing program 1: 12:20:16 executing program 0: 12:20:16 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$inet6_dccp_buf(r3, 0x21, 0xe, &(0x7f00000000c0)="ca304e9df2351e8b4381d80e2f9f810ba29f4872d0b76afccdf26d15b65276e3c4cf055b9fe819712401028beb8f93ddb82bab99566587746bdf62504b9c842747a77399f350d3e20ba929d4b2e4ab5c4629ec8795f618600c6031328a32a139f35f7401415a94d5eb0fc1627e8fdf4d004488e35fddc264dde456201c6122b671158824c7832592b04e39751b87bf38743d21de2fb61543d90f2940796647", 0x9f) write(r1, 0x0, 0x0) 12:20:16 executing program 4: 12:20:16 executing program 5: 12:20:16 executing program 3: 12:20:16 executing program 1: 12:20:16 executing program 0: 12:20:16 executing program 5: 12:20:16 executing program 3: 12:20:16 executing program 4: 12:20:16 executing program 1: 12:20:16 executing program 0: 12:20:16 executing program 4: 12:20:17 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x4409c1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r0, 0x0, 0x0) 12:20:17 executing program 5: 12:20:17 executing program 1: 12:20:17 executing program 3: 12:20:17 executing program 0: 12:20:17 executing program 4: 12:20:17 executing program 0: 12:20:17 executing program 3: 12:20:17 executing program 1: 12:20:17 executing program 4: 12:20:17 executing program 5: 12:20:17 executing program 0: 12:20:17 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f00000000c0)=""/135) 12:20:17 executing program 3: 12:20:17 executing program 1: 12:20:17 executing program 4: 12:20:17 executing program 5: 12:20:17 executing program 1: 12:20:17 executing program 0: 12:20:17 executing program 5: 12:20:17 executing program 3: 12:20:17 executing program 4: 12:20:17 executing program 3: 12:20:17 executing program 5: 12:20:18 executing program 0: 12:20:18 executing program 1: 12:20:18 executing program 4: 12:20:18 executing program 3: 12:20:18 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x100, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r5) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x40000, 0x0) write$P9_RLOPEN(r6, &(0x7f0000000240)={0x18, 0xd, 0x2, {{0x4, 0x1, 0x8}, 0x401}}, 0x18) r7 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={r8, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000440)={r8, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000a80)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f0000000000)=0x6b) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f00000000c0)={r8, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x4, @empty, 0x7fffffff}]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000140)={r9, 0x8}, 0x8) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:18 executing program 0: 12:20:18 executing program 5: 12:20:18 executing program 4: 12:20:18 executing program 3: 12:20:18 executing program 1: 12:20:18 executing program 3: 12:20:18 executing program 4: 12:20:18 executing program 5: 12:20:18 executing program 1: 12:20:18 executing program 0: 12:20:18 executing program 3: 12:20:18 executing program 1: 12:20:18 executing program 0: 12:20:18 executing program 4: 12:20:18 executing program 5: 12:20:18 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x3, 0x200) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x10200, 0x0) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000240)='ppp1trusted%\x00', &(0x7f0000000280)='./file0\x00', r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) open(&(0x7f0000000000)='./file0\x00', 0x181000, 0x4) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r6) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) getsockopt$bt_BT_DEFER_SETUP(r8, 0x12, 0x7, 0x0, &(0x7f0000000040)) r9 = pidfd_open(0xffffffffffffffff, 0x0) dup3(r3, r9, 0x0) write(r3, 0x0, 0x0) timer_gettime(0x0, &(0x7f00000001c0)) r10 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x80000000, 0xda71ea1f68753f00) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r10, 0x800448d3, &(0x7f0000000300)={{0xff, 0x4, 0xff, 0xcf, 0x80, 0x3f}, 0x9, 0x2, 0x1, 0x7, 0x0, "b6f9615a6d87c21ac1d9cb1487b7f9fb609ca821e9bed89b7f5567e8a6a33b501574e969f853d6aceae5e01c2efe34393f19278a27492a5df883f1d58099de883ea24bdcb20cada6850d8c904080ffcd51fb016600f184d1c63e985d5c4cb059ebc3474704ef0ad6a240d9088db04ce374f172c34cb62b88de5132863e6dbb95"}) 12:20:18 executing program 3: 12:20:18 executing program 4: 12:20:18 executing program 5: 12:20:18 executing program 0: 12:20:19 executing program 1: 12:20:19 executing program 3: 12:20:19 executing program 1: 12:20:19 executing program 4: 12:20:19 executing program 5: 12:20:19 executing program 0: 12:20:19 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x154, 0x2) getsockopt$inet_udp_int(r4, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f0000000000)={0x1d, 0x21, 0x17, 0x1c, 0x2, 0x0, 0x3, 0xd2}) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:19 executing program 3: 12:20:19 executing program 0: 12:20:19 executing program 1: 12:20:19 executing program 5: 12:20:19 executing program 4: 12:20:19 executing program 4: 12:20:19 executing program 1: 12:20:19 executing program 5: 12:20:19 executing program 0: 12:20:19 executing program 3: 12:20:19 executing program 5: 12:20:19 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x300180) write(r1, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r3, 0x110, 0x4, &(0x7f0000000040), 0x4) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x300102, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r6, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0xc028ae92, &(0x7f0000000100)={0x6, 0x6}) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) 12:20:19 executing program 1: 12:20:19 executing program 3: 12:20:19 executing program 4: 12:20:19 executing program 5: 12:20:19 executing program 0: 12:20:20 executing program 3: 12:20:20 executing program 4: 12:20:20 executing program 0: 12:20:20 executing program 1: 12:20:20 executing program 5: 12:20:20 executing program 4: 12:20:20 executing program 0: 12:20:20 executing program 3: 12:20:20 executing program 1: 12:20:20 executing program 5: 12:20:20 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f00000000c0)={{0x81, 0x2}}, 0x10) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EVIOCGPROP(r4, 0xc004743e, &(0x7f00000002c0)=""/251) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r5, 0x4004743d, &(0x7f0000000c00)=""/246) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f0000000000)={0x9, 0x400, [0x101, 0x7f, 0x1, 0x0, 0x701], 0xd7a3}) dup3(r5, r0, 0x0) write(r5, 0x0, 0xc86b802ba729d939) 12:20:20 executing program 0: 12:20:20 executing program 3: 12:20:20 executing program 4: 12:20:20 executing program 1: 12:20:20 executing program 5: 12:20:20 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x301a00, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:20 executing program 0: 12:20:20 executing program 3: 12:20:20 executing program 1: 12:20:20 executing program 4: 12:20:20 executing program 5: 12:20:21 executing program 0: 12:20:21 executing program 3: 12:20:21 executing program 4: 12:20:21 executing program 1: 12:20:21 executing program 5: 12:20:21 executing program 0: 12:20:21 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x7fffffff, 0x400000) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000040)='/dev/ppp\x00', &(0x7f00000000c0)='./file0\x00', r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r3, r0, 0x0) write(r3, 0x0, 0x0) 12:20:21 executing program 3: 12:20:21 executing program 4: 12:20:21 executing program 1: 12:20:21 executing program 5: 12:20:21 executing program 0: 12:20:21 executing program 3: 12:20:21 executing program 1: 12:20:21 executing program 5: 12:20:21 executing program 4: 12:20:21 executing program 3: 12:20:21 executing program 5: 12:20:21 executing program 1: 12:20:21 executing program 0: 12:20:21 executing program 4: 12:20:21 executing program 3: 12:20:22 executing program 5: 12:20:22 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) socket$inet6(0xa, 0x2, 0x20) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$TIPC_CONN_TIMEOUT(r4, 0x10f, 0x82, &(0x7f0000000000)=0x4, 0x4) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r6, 0x4) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) getsockopt$bt_BT_DEFER_SETUP(r8, 0x12, 0x7, 0x0, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r8, &(0x7f0000000140)={0x15, 0x110, 0xfa00, {r9, 0x9, 0x0, 0x0, 0x0, @ib={0x1b, 0x4, 0xf3, {"358b9af12e725130809664ab45bb4f23"}, 0x67f, 0x10}, @in={0x2, 0x4e20, @remote}}}, 0x118) accept4$alg(r4, 0x0, 0x0, 0x100000) write(r1, 0x0, 0x28b) 12:20:22 executing program 1: 12:20:22 executing program 0: 12:20:22 executing program 4: 12:20:22 executing program 3: 12:20:22 executing program 5: 12:20:22 executing program 1: 12:20:22 executing program 0: 12:20:22 executing program 4: 12:20:22 executing program 3: 12:20:22 executing program 5: 12:20:22 executing program 1: 12:20:22 executing program 2: ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000000)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:22 executing program 4: 12:20:22 executing program 0: 12:20:22 executing program 5: 12:20:22 executing program 3: 12:20:22 executing program 1: 12:20:22 executing program 0: 12:20:22 executing program 4: 12:20:22 executing program 3: 12:20:22 executing program 5: 12:20:22 executing program 1: 12:20:23 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r4, 0x301}, 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcb29}]}, 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x8010) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/\xd9\xa5\xff\xee+\xd9\x99\x8b', 0x40a02, 0x0) ioctl$EVIOCGPROP(r5, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r5, r0, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$sock_inet6_udp_SIOCINQ(r7, 0x541b, &(0x7f00000001c0)) write(r5, 0x0, 0x0) 12:20:23 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000100), 0x4) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) accept$unix(r3, &(0x7f0000000000), &(0x7f00000000c0)=0x6e) 12:20:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:20:23 executing program 1: 12:20:23 executing program 5: 12:20:23 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x28002, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000880)={@dev, @multicast2, 0x0}, &(0x7f00000008c0)=0xc) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000340)=""/245, 0xf5, 0x40010102, &(0x7f0000000940)={0x11, 0x3, r2, 0x1, 0x4, 0x6, @random="3baaadb068e0"}, 0x14) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x3f, 0x10000) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = dup(r6) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r8) pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x0) accept4$unix(r9, &(0x7f0000000500)=@abs, &(0x7f0000000580)=0x6e, 0x81800) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, r8, 0x6f09000) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r7, 0x80045700, &(0x7f0000000180)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={0x1, &(0x7f0000000140)="e933498a6b9e", &(0x7f00000001c0)=""/151, 0xf3e7396fdfa0e627}, 0x20) r10 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x40800, 0x0) ioctl$FS_IOC_GETVERSION(r10, 0x80087601, &(0x7f0000000100)) [ 325.330885][T14805] BPF:[1] DATASEC (anon) [ 325.335300][T14805] BPF:size=3436 vlen=1 12:20:23 executing program 1: [ 325.384648][T14805] BPF: [ 325.387638][T14805] BPF:Invalid name [ 325.413711][T14805] BPF: [ 325.413711][T14805] 12:20:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:20:23 executing program 1: 12:20:23 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r4, 0x301}, 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcb29}]}, 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x8010) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/\xd9\xa5\xff\xee+\xd9\x99\x8b', 0x40a02, 0x0) ioctl$EVIOCGPROP(r5, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r5, r0, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$sock_inet6_udp_SIOCINQ(r7, 0x541b, &(0x7f00000001c0)) write(r5, 0x0, 0x0) 12:20:23 executing program 5: [ 325.649172][T14825] BPF:[1] DATASEC (anon) [ 325.663188][T14825] BPF:size=3436 vlen=1 [ 325.667470][T14825] BPF: [ 325.670416][T14825] BPF:Invalid name [ 325.674773][T14825] BPF: [ 325.674773][T14825] 12:20:23 executing program 1: 12:20:23 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x10000) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000040)=0x704) write(0xffffffffffffffff, 0x0, 0x0) 12:20:23 executing program 3: 12:20:23 executing program 5: 12:20:23 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r4, 0x301}, 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcb29}]}, 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x8010) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/\xd9\xa5\xff\xee+\xd9\x99\x8b', 0x40a02, 0x0) ioctl$EVIOCGPROP(r5, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r5, r0, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$sock_inet6_udp_SIOCINQ(r7, 0x541b, &(0x7f00000001c0)) write(r5, 0x0, 0x0) 12:20:23 executing program 1: 12:20:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 325.994755][T14844] BPF:[1] DATASEC (anon) [ 326.023805][T14844] BPF:size=3436 vlen=1 [ 326.038187][T14844] BPF: [ 326.044831][T14844] BPF:Invalid name [ 326.059404][T14844] BPF: [ 326.059404][T14844] 12:20:24 executing program 5: 12:20:24 executing program 1: 12:20:24 executing program 3: 12:20:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 12:20:24 executing program 5: 12:20:24 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r4, 0x301}, 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcb29}]}, 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x8010) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/\xd9\xa5\xff\xee+\xd9\x99\x8b', 0x40a02, 0x0) ioctl$EVIOCGPROP(r5, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r5, r0, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$sock_inet6_udp_SIOCINQ(r7, 0x541b, &(0x7f00000001c0)) 12:20:24 executing program 1: 12:20:24 executing program 3: 12:20:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 12:20:24 executing program 1: 12:20:24 executing program 5: 12:20:24 executing program 3: 12:20:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 12:20:24 executing program 5: 12:20:24 executing program 1: 12:20:24 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r4, 0x301}, 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcb29}]}, 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x8010) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/\xd9\xa5\xff\xee+\xd9\x99\x8b', 0x40a02, 0x0) ioctl$EVIOCGPROP(r5, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r5, r0, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) 12:20:24 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x44a000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="14dec4bd", @ANYRES16=r3, @ANYBLOB="d53f00000000a7c95dce603c62438c53d204000000"], 0x14}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f00000005c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000740)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x1a0}}, 0x8000) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r4) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) restart_syscall() r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r7) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r9 = dup(r8) getsockopt$bt_BT_DEFER_SETUP(r9, 0x12, 0x7, 0x0, &(0x7f0000000040)) r10 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r10, 0x12, 0x7, 0x0, &(0x7f0000000040)) r11 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r12 = dup(r11) getsockopt$bt_BT_DEFER_SETUP(r12, 0x12, 0x7, 0x0, &(0x7f0000000040)) r13 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r13, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_NO_ENOBUFS(r13, 0x10e, 0x5, &(0x7f0000000000)=0xaa, 0x4) r14 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r14, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EVIOCGPROP(r14, 0xc004743e, &(0x7f0000000640)=""/234) r15 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r16 = dup(r15) getsockopt$bt_BT_DEFER_SETUP(r16, 0x12, 0x7, 0x0, &(0x7f0000000040)) r17 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x5, 0x301000) renameat(r16, &(0x7f00000000c0)='./file0\x00', r17, &(0x7f0000000140)='./file0\x00') r18 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) dup3(r18, r0, 0x0) write(r18, 0x0, 0x0) 12:20:24 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r4, 0x301}, 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcb29}]}, 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x8010) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/\xd9\xa5\xff\xee+\xd9\x99\x8b', 0x40a02, 0x0) ioctl$EVIOCGPROP(r5, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r5, r0, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r6) 12:20:24 executing program 1: 12:20:24 executing program 3: 12:20:24 executing program 5: 12:20:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000240)=""/191, 0x0, 0xbf, 0x8}, 0x20) 12:20:25 executing program 3: [ 327.135909][T14901] BPF:hdr_len not found 12:20:25 executing program 5: 12:20:25 executing program 1: 12:20:25 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r4, 0x301}, 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcb29}]}, 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x8010) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/\xd9\xa5\xff\xee+\xd9\x99\x8b', 0x40a02, 0x0) ioctl$EVIOCGPROP(r5, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r5, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) 12:20:25 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000000)='veth1_to_bond\x00') r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000640)=""/246) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r3, r2, 0x0) write(r3, 0x0, 0x0) 12:20:25 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000240)=""/191, 0x0, 0xbf, 0x8}, 0x20) 12:20:25 executing program 3: 12:20:25 executing program 5: 12:20:25 executing program 1: 12:20:25 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r4, 0x301}, 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcb29}]}, 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x8010) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/\xd9\xa5\xff\xee+\xd9\x99\x8b', 0x40a02, 0x0) ioctl$EVIOCGPROP(r5, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r5, r0, 0x0) [ 327.522941][T14924] BPF:hdr_len not found 12:20:25 executing program 3: 12:20:25 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000240)=""/191, 0x0, 0xbf, 0x8}, 0x20) 12:20:25 executing program 5: 12:20:25 executing program 1: 12:20:25 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r4, 0x301}, 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcb29}]}, 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x8010) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/\xd9\xa5\xff\xee+\xd9\x99\x8b', 0x40a02, 0x0) ioctl$EVIOCGPROP(r5, 0x4004743d, &(0x7f0000000c00)=""/246) 12:20:25 executing program 3: [ 327.876091][T14942] BPF:hdr_len not found 12:20:25 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 12:20:25 executing program 1: 12:20:25 executing program 5: 12:20:25 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x1b, 0xbf, 0x8}, 0x20) 12:20:26 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r4, 0x301}, 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcb29}]}, 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x8010) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/\xd9\xa5\xff\xee+\xd9\x99\x8b', 0x40a02, 0x0) 12:20:26 executing program 3: 12:20:26 executing program 1: [ 328.201471][T14958] BPF:No type found 12:20:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x1b, 0xbf, 0x8}, 0x20) 12:20:26 executing program 5: 12:20:26 executing program 1: 12:20:26 executing program 3: 12:20:26 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r4, 0x301}, 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcb29}]}, 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x8010) [ 328.499176][T14972] BPF:No type found 12:20:26 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) write$P9_RLOPEN(r3, &(0x7f0000000000)={0x18, 0xd, 0x1, {{0x20, 0x2, 0x8}, 0x20}}, 0x18) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f00000001c0)=""/259) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:26 executing program 5: 12:20:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x1b, 0xbf, 0x8}, 0x20) 12:20:26 executing program 1: 12:20:26 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r4, 0x301}, 0x14}}, 0x0) 12:20:26 executing program 3: [ 328.823206][T14991] BPF:No type found 12:20:26 executing program 5: 12:20:26 executing program 1: 12:20:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0x0, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:20:26 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x301}, 0x14}}, 0x0) 12:20:26 executing program 3: 12:20:27 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='\xfb\x89\t\xc0\x00[\x00', 0x8440, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) unshare(0x20000000) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000000)=0xcab6) write(r1, 0x0, 0x0) 12:20:27 executing program 5: [ 329.117602][T15005] BPF:[1] DATASEC (anon) 12:20:27 executing program 1: [ 329.150510][T15005] BPF:size=0 vlen=1 [ 329.167800][T15005] BPF: [ 329.188411][T15005] BPF:size == 0 [ 329.252922][T15005] BPF: [ 329.252922][T15005] 12:20:27 executing program 3: 12:20:27 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x301}, 0x14}}, 0x0) 12:20:27 executing program 5: 12:20:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0x0, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:20:27 executing program 1: 12:20:27 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) times(&(0x7f0000000000)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:27 executing program 3: [ 329.569487][T15030] BPF:[1] DATASEC (anon) 12:20:27 executing program 1: 12:20:27 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x301}, 0x14}}, 0x0) [ 329.602807][T15030] BPF:size=0 vlen=1 [ 329.622426][T15030] BPF: [ 329.637661][T15030] BPF:size == 0 12:20:27 executing program 5: [ 329.650750][T15030] BPF: [ 329.650750][T15030] 12:20:27 executing program 3: 12:20:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0x0, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:20:27 executing program 1: 12:20:27 executing program 5: 12:20:27 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r3, 0x301}, 0x14}}, 0x0) [ 329.926918][T15051] BPF:[1] DATASEC (anon) 12:20:27 executing program 3: [ 329.960586][T15051] BPF:size=0 vlen=1 [ 330.035865][T15051] BPF: 12:20:27 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r3, 0x301}, 0x14}}, 0x0) [ 330.072828][T15051] BPF:size == 0 [ 330.077836][T15051] BPF: [ 330.077836][T15051] 12:20:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r2) dup3(r0, r0, 0x0) write(r1, 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='illinois\x00', 0x9) 12:20:28 executing program 5: 12:20:28 executing program 1: 12:20:28 executing program 3: 12:20:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x0, 0x0, 0x0, 0xf, 0x0, 0xd6c}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) 12:20:28 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r3, 0x301}, 0x14}}, 0x0) 12:20:28 executing program 5: [ 330.395144][T15080] BPF:[1] DATASEC (anon) [ 330.415376][T15080] BPF:size=3436 vlen=0 12:20:28 executing program 1: 12:20:28 executing program 3: 12:20:28 executing program 5: [ 330.437607][T15080] BPF: [ 330.448462][T15080] BPF:vlen == 0 [ 330.460709][T15080] BPF: [ 330.460709][T15080] 12:20:28 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r3, 0x301}, 0x14}}, 0x0) 12:20:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x0, 0x0, 0x0, 0xf, 0x0, 0xd6c}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) [ 330.705931][T15097] BPF:[1] DATASEC (anon) 12:20:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$FICLONE(r0, 0x40049409, r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x80000, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3, 0x101000) dup3(r1, r2, 0x80000) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) fremovexattr(r4, &(0x7f0000000040)=@random={'osx.', '],\x00'}) write(r1, 0x0, 0x0) 12:20:28 executing program 3: 12:20:28 executing program 5: 12:20:28 executing program 1: 12:20:28 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r2, 0x301}, 0x14}}, 0x0) [ 330.733263][T15097] BPF:size=3436 vlen=0 [ 330.737379][T15097] BPF: [ 330.740150][T15097] BPF:vlen == 0 12:20:28 executing program 3: 12:20:28 executing program 5: 12:20:28 executing program 1: [ 330.857557][T15097] BPF: [ 330.857557][T15097] 12:20:28 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r2, 0x301}, 0x14}}, 0x0) 12:20:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x0, 0x0, 0x0, 0xf, 0x0, 0xd6c}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) 12:20:28 executing program 3: 12:20:28 executing program 5: [ 331.181694][T15127] BPF:[1] DATASEC (anon) [ 331.186082][T15127] BPF:size=3436 vlen=0 12:20:29 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r2, r0, 0x0) write(r2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x4400, 0x0) 12:20:29 executing program 1: 12:20:29 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400400, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) 12:20:29 executing program 3: 12:20:29 executing program 5: [ 331.223792][T15127] BPF: [ 331.236580][T15127] BPF:vlen == 0 [ 331.258551][T15127] BPF: [ 331.258551][T15127] 12:20:29 executing program 1: 12:20:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:20:29 executing program 3: 12:20:29 executing program 5: 12:20:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) 12:20:29 executing program 1: [ 331.522888][T15146] BPF:[1] DATASEC (anon) [ 331.527272][T15146] BPF:size=3436 vlen=1 [ 331.585940][T15146] BPF: [ 331.609936][T15146] BPF:Invalid name 12:20:29 executing program 3: [ 331.637339][T15146] BPF: [ 331.637339][T15146] 12:20:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) 12:20:29 executing program 5: 12:20:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, 0x0, 0x32, 0x0, 0x8}, 0x20) 12:20:29 executing program 2: 12:20:29 executing program 1: 12:20:29 executing program 5: 12:20:29 executing program 3: 12:20:29 executing program 1: 12:20:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, 0x0, 0x32, 0x0, 0x8}, 0x20) 12:20:29 executing program 2: 12:20:29 executing program 5: 12:20:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) 12:20:30 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, 0x0, 0x32, 0x0, 0x8}, 0x20) 12:20:30 executing program 2: 12:20:30 executing program 5: 12:20:30 executing program 3: 12:20:30 executing program 1: 12:20:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) 12:20:30 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf}, 0x20) 12:20:30 executing program 3: 12:20:30 executing program 1: 12:20:30 executing program 2: 12:20:30 executing program 5: 12:20:30 executing program 3: 12:20:30 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf}, 0x20) 12:20:30 executing program 1: 12:20:30 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r0, 0x301}, 0x14}}, 0x0) 12:20:30 executing program 2: 12:20:30 executing program 5: 12:20:30 executing program 1: 12:20:30 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf}, 0x20) 12:20:30 executing program 5: 12:20:30 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r0, 0x301}, 0x14}}, 0x0) 12:20:30 executing program 3: 12:20:30 executing program 2: 12:20:30 executing program 1: 12:20:31 executing program 5: 12:20:31 executing program 0: 12:20:31 executing program 3: 12:20:31 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r0, 0x301}, 0x14}}, 0x0) 12:20:31 executing program 2: 12:20:31 executing program 1: 12:20:31 executing program 5: 12:20:31 executing program 0: 12:20:31 executing program 3: 12:20:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, 0x0, 0x0) 12:20:31 executing program 2: 12:20:31 executing program 5: 12:20:31 executing program 1: 12:20:31 executing program 0: 12:20:31 executing program 2: 12:20:31 executing program 3: 12:20:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, 0x0, 0x0) 12:20:31 executing program 1: 12:20:31 executing program 0: 12:20:31 executing program 5: 12:20:31 executing program 2: 12:20:31 executing program 3: 12:20:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, 0x0, 0x0) 12:20:31 executing program 1: 12:20:31 executing program 0: 12:20:31 executing program 5: 12:20:31 executing program 2: 12:20:31 executing program 3: 12:20:32 executing program 1: 12:20:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 12:20:32 executing program 0: 12:20:32 executing program 2: 12:20:32 executing program 5: 12:20:32 executing program 3: 12:20:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 12:20:32 executing program 0: 12:20:32 executing program 1: 12:20:32 executing program 3: 12:20:32 executing program 2: 12:20:32 executing program 5: 12:20:32 executing program 0: 12:20:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 12:20:32 executing program 2: 12:20:32 executing program 3: 12:20:32 executing program 1: 12:20:32 executing program 5: 12:20:32 executing program 0: 12:20:32 executing program 2: 12:20:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 12:20:32 executing program 1: 12:20:32 executing program 3: 12:20:32 executing program 5: 12:20:32 executing program 0: 12:20:32 executing program 2: 12:20:33 executing program 3: 12:20:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 12:20:33 executing program 0: 12:20:33 executing program 1: 12:20:33 executing program 2: 12:20:33 executing program 5: 12:20:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 12:20:33 executing program 3: 12:20:33 executing program 1: 12:20:33 executing program 2: 12:20:33 executing program 0: 12:20:33 executing program 5: 12:20:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x301}, 0x14}}, 0x0) 12:20:33 executing program 3: 12:20:33 executing program 1: 12:20:33 executing program 2: 12:20:33 executing program 0: 12:20:33 executing program 5: 12:20:33 executing program 3: 12:20:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x301}, 0x14}}, 0x0) 12:20:33 executing program 2: 12:20:33 executing program 1: 12:20:33 executing program 0: 12:20:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x301}, 0x14}}, 0x0) 12:20:33 executing program 3: 12:20:33 executing program 1: 12:20:33 executing program 5: 12:20:34 executing program 2: 12:20:34 executing program 0: 12:20:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1}, 0x14}}, 0x0) 12:20:34 executing program 3: 12:20:34 executing program 1: 12:20:34 executing program 5: 12:20:34 executing program 2: 12:20:34 executing program 0: 12:20:34 executing program 3: 12:20:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1}, 0x14}}, 0x0) 12:20:34 executing program 5: 12:20:34 executing program 1: 12:20:34 executing program 3: 12:20:34 executing program 2: 12:20:34 executing program 0: 12:20:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1}, 0x14}}, 0x0) 12:20:34 executing program 1: 12:20:34 executing program 5: 12:20:34 executing program 2: 12:20:34 executing program 3: 12:20:34 executing program 1: 12:20:34 executing program 0: 12:20:34 executing program 5: 12:20:34 executing program 4: 12:20:34 executing program 2: 12:20:35 executing program 5: 12:20:35 executing program 3: 12:20:35 executing program 1: 12:20:35 executing program 0: 12:20:35 executing program 4: 12:20:35 executing program 0: 12:20:35 executing program 4: 12:20:35 executing program 2: 12:20:35 executing program 5: 12:20:35 executing program 1: 12:20:35 executing program 3: 12:20:35 executing program 0: 12:20:35 executing program 4: 12:20:35 executing program 2: 12:20:35 executing program 5: 12:20:35 executing program 1: 12:20:35 executing program 3: 12:20:35 executing program 0: 12:20:35 executing program 4: 12:20:35 executing program 5: 12:20:35 executing program 1: 12:20:35 executing program 3: 12:20:35 executing program 2: 12:20:35 executing program 0: 12:20:35 executing program 4: 12:20:35 executing program 5: 12:20:35 executing program 1: 12:20:35 executing program 2: 12:20:35 executing program 3: 12:20:36 executing program 0: 12:20:36 executing program 4: 12:20:36 executing program 5: 12:20:36 executing program 1: 12:20:36 executing program 3: 12:20:36 executing program 2: 12:20:36 executing program 0: 12:20:36 executing program 4: 12:20:36 executing program 5: 12:20:36 executing program 1: 12:20:36 executing program 3: 12:20:36 executing program 2: 12:20:36 executing program 0: 12:20:36 executing program 4: 12:20:36 executing program 5: 12:20:36 executing program 3: 12:20:36 executing program 1: 12:20:36 executing program 0: 12:20:36 executing program 2: 12:20:36 executing program 5: 12:20:36 executing program 4: 12:20:36 executing program 3: 12:20:36 executing program 1: 12:20:36 executing program 2: 12:20:36 executing program 4: 12:20:37 executing program 5: 12:20:37 executing program 3: 12:20:37 executing program 0: 12:20:37 executing program 1: 12:20:37 executing program 2: 12:20:37 executing program 4: 12:20:37 executing program 5: 12:20:37 executing program 0: 12:20:37 executing program 3: 12:20:37 executing program 1: 12:20:37 executing program 2: 12:20:37 executing program 5: 12:20:37 executing program 4: 12:20:37 executing program 3: 12:20:37 executing program 1: 12:20:37 executing program 0: 12:20:37 executing program 2: 12:20:37 executing program 5: 12:20:37 executing program 4: 12:20:37 executing program 1: 12:20:37 executing program 2: 12:20:37 executing program 3: 12:20:37 executing program 0: 12:20:37 executing program 5: 12:20:37 executing program 4: 12:20:38 executing program 1: 12:20:38 executing program 2: 12:20:38 executing program 3: 12:20:38 executing program 5: 12:20:38 executing program 4: 12:20:38 executing program 0: 12:20:38 executing program 1: 12:20:38 executing program 2: 12:20:38 executing program 3: 12:20:38 executing program 5: 12:20:38 executing program 0: 12:20:38 executing program 1: 12:20:38 executing program 4: 12:20:38 executing program 2: 12:20:38 executing program 5: 12:20:38 executing program 3: 12:20:38 executing program 0: 12:20:38 executing program 4: 12:20:38 executing program 1: 12:20:38 executing program 2: 12:20:38 executing program 5: 12:20:38 executing program 3: 12:20:38 executing program 0: 12:20:38 executing program 4: 12:20:38 executing program 2: 12:20:38 executing program 1: 12:20:38 executing program 5: 12:20:39 executing program 3: 12:20:39 executing program 0: 12:20:39 executing program 2: 12:20:39 executing program 1: 12:20:39 executing program 5: 12:20:39 executing program 4: 12:20:39 executing program 3: 12:20:39 executing program 0: 12:20:39 executing program 2: 12:20:39 executing program 5: 12:20:39 executing program 1: 12:20:39 executing program 3: 12:20:39 executing program 4: 12:20:39 executing program 0: 12:20:39 executing program 2: 12:20:39 executing program 5: 12:20:39 executing program 3: 12:20:39 executing program 4: 12:20:39 executing program 1: 12:20:39 executing program 0: 12:20:39 executing program 5: 12:20:39 executing program 2: 12:20:39 executing program 3: 12:20:39 executing program 4: 12:20:40 executing program 0: 12:20:40 executing program 2: 12:20:40 executing program 1: 12:20:40 executing program 5: 12:20:40 executing program 3: 12:20:40 executing program 4: 12:20:40 executing program 0: 12:20:40 executing program 1: 12:20:40 executing program 3: 12:20:40 executing program 5: 12:20:40 executing program 4: 12:20:40 executing program 1: 12:20:40 executing program 2: 12:20:40 executing program 0: 12:20:40 executing program 5: 12:20:40 executing program 3: 12:20:40 executing program 4: 12:20:40 executing program 2: 12:20:40 executing program 5: 12:20:40 executing program 1: 12:20:40 executing program 3: 12:20:40 executing program 0: 12:20:40 executing program 4: 12:20:40 executing program 2: 12:20:40 executing program 5: 12:20:41 executing program 1: 12:20:41 executing program 4: 12:20:41 executing program 0: 12:20:41 executing program 3: 12:20:41 executing program 2: 12:20:41 executing program 1: 12:20:41 executing program 5: 12:20:41 executing program 3: 12:20:41 executing program 0: 12:20:41 executing program 4: 12:20:41 executing program 2: 12:20:41 executing program 5: 12:20:41 executing program 0: 12:20:41 executing program 1: 12:20:41 executing program 3: 12:20:41 executing program 4: 12:20:41 executing program 2: 12:20:41 executing program 5: 12:20:41 executing program 0: 12:20:41 executing program 4: 12:20:41 executing program 3: 12:20:41 executing program 2: 12:20:41 executing program 5: 12:20:41 executing program 1: 12:20:41 executing program 0: 12:20:41 executing program 4: 12:20:41 executing program 3: 12:20:41 executing program 5: 12:20:42 executing program 2: 12:20:42 executing program 0: 12:20:42 executing program 1: 12:20:42 executing program 4: 12:20:42 executing program 3: 12:20:42 executing program 5: 12:20:42 executing program 0: 12:20:42 executing program 2: 12:20:42 executing program 4: 12:20:42 executing program 3: 12:20:42 executing program 5: 12:20:42 executing program 1: 12:20:42 executing program 2: 12:20:42 executing program 0: 12:20:42 executing program 4: 12:20:42 executing program 3: 12:20:42 executing program 1: 12:20:42 executing program 5: 12:20:42 executing program 0: 12:20:42 executing program 2: 12:20:42 executing program 4: 12:20:42 executing program 3: 12:20:42 executing program 1: 12:20:42 executing program 5: 12:20:42 executing program 0: 12:20:42 executing program 4: 12:20:43 executing program 3: 12:20:43 executing program 2: 12:20:43 executing program 1: 12:20:43 executing program 0: 12:20:43 executing program 4: 12:20:43 executing program 5: 12:20:43 executing program 1: 12:20:43 executing program 3: 12:20:43 executing program 2: 12:20:43 executing program 4: 12:20:43 executing program 5: 12:20:43 executing program 0: 12:20:43 executing program 1: 12:20:43 executing program 2: 12:20:43 executing program 4: 12:20:43 executing program 3: 12:20:43 executing program 0: 12:20:43 executing program 5: 12:20:43 executing program 1: 12:20:43 executing program 2: 12:20:43 executing program 4: 12:20:43 executing program 3: 12:20:43 executing program 0: 12:20:44 executing program 4: 12:20:44 executing program 5: 12:20:44 executing program 2: 12:20:44 executing program 1: 12:20:44 executing program 0: 12:20:44 executing program 3: 12:20:44 executing program 5: 12:20:44 executing program 4: 12:20:44 executing program 1: 12:20:44 executing program 2: 12:20:44 executing program 3: 12:20:44 executing program 0: 12:20:44 executing program 1: 12:20:44 executing program 2: 12:20:44 executing program 4: 12:20:44 executing program 5: 12:20:44 executing program 3: 12:20:44 executing program 0: 12:20:44 executing program 1: 12:20:44 executing program 4: 12:20:44 executing program 2: 12:20:44 executing program 5: 12:20:44 executing program 3: 12:20:44 executing program 0: 12:20:44 executing program 1: 12:20:44 executing program 2: 12:20:44 executing program 4: 12:20:44 executing program 5: 12:20:45 executing program 3: 12:20:45 executing program 0: 12:20:45 executing program 4: 12:20:45 executing program 5: 12:20:45 executing program 2: 12:20:45 executing program 1: 12:20:45 executing program 3: 12:20:45 executing program 0: 12:20:45 executing program 4: 12:20:45 executing program 1: 12:20:45 executing program 5: 12:20:45 executing program 2: 12:20:45 executing program 3: 12:20:45 executing program 0: 12:20:45 executing program 1: 12:20:45 executing program 5: 12:20:45 executing program 4: 12:20:45 executing program 2: 12:20:45 executing program 3: 12:20:45 executing program 0: 12:20:45 executing program 1: 12:20:45 executing program 4: 12:20:45 executing program 5: 12:20:46 executing program 2: 12:20:46 executing program 3: 12:20:46 executing program 4: 12:20:46 executing program 0: 12:20:46 executing program 5: 12:20:46 executing program 1: 12:20:46 executing program 2: 12:20:46 executing program 4: 12:20:46 executing program 3: 12:20:46 executing program 0: 12:20:46 executing program 5: 12:20:46 executing program 4: 12:20:46 executing program 1: 12:20:46 executing program 2: 12:20:46 executing program 3: 12:20:46 executing program 0: 12:20:46 executing program 5: 12:20:46 executing program 3: 12:20:46 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200, 0x0) 12:20:46 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, 0x0) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:46 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, 0x0) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:46 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:46 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x1000000) 12:20:46 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:47 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:47 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200, 0x0) 12:20:47 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:47 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x1000000) 12:20:47 executing program 4: 12:20:47 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) 12:20:47 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200, 0x0) 12:20:47 executing program 1: 12:20:47 executing program 4: 12:20:47 executing program 3: 12:20:47 executing program 1: 12:20:47 executing program 4: 12:20:47 executing program 1: 12:20:47 executing program 3: 12:20:47 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) dup3(r1, r0, 0x0) 12:20:47 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x1000000) 12:20:47 executing program 2: 12:20:47 executing program 4: 12:20:47 executing program 1: 12:20:47 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) dup3(0xffffffffffffffff, r0, 0x0) 12:20:47 executing program 3: 12:20:48 executing program 2: 12:20:48 executing program 1: 12:20:48 executing program 4: 12:20:48 executing program 2: 12:20:48 executing program 3: 12:20:48 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) dup3(0xffffffffffffffff, r0, 0x0) 12:20:48 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:20:48 executing program 1: 12:20:48 executing program 4: 12:20:48 executing program 3: 12:20:48 executing program 2: 12:20:48 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) dup3(0xffffffffffffffff, r0, 0x0) 12:20:48 executing program 1: 12:20:48 executing program 4: 12:20:48 executing program 2: 12:20:48 executing program 3: 12:20:48 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) dup3(r1, r0, 0x0) 12:20:48 executing program 1: 12:20:48 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) write(r1, 0x0, 0x1000000) 12:20:48 executing program 4: 12:20:48 executing program 2: 12:20:48 executing program 3: 12:20:48 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 12:20:48 executing program 1: 12:20:49 executing program 2: 12:20:49 executing program 3: 12:20:49 executing program 4: 12:20:49 executing program 1: 12:20:49 executing program 2: 12:20:49 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 12:20:49 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) write(r1, 0x0, 0x1000000) 12:20:49 executing program 3: 12:20:49 executing program 4: 12:20:49 executing program 1: 12:20:49 executing program 2: 12:20:49 executing program 3: 12:20:49 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 12:20:49 executing program 1: 12:20:49 executing program 4: 12:20:49 executing program 2: 12:20:49 executing program 3: 12:20:49 executing program 1: 12:20:49 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) write(r1, 0x0, 0x1000000) 12:20:49 executing program 4: 12:20:49 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) dup3(r1, r0, 0x0) 12:20:49 executing program 2: 12:20:49 executing program 3: 12:20:50 executing program 1: 12:20:50 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) dup3(r1, r0, 0x0) 12:20:50 executing program 2: 12:20:50 executing program 4: 12:20:50 executing program 3: 12:20:50 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) dup3(r1, r0, 0x0) 12:20:50 executing program 2: 12:20:50 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) write(0xffffffffffffffff, 0x0, 0x1000000) 12:20:50 executing program 1: 12:20:50 executing program 4: 12:20:50 executing program 3: 12:20:50 executing program 1: 12:20:50 executing program 2: 12:20:50 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) dup3(r1, r0, 0x0) 12:20:50 executing program 4: 12:20:50 executing program 3: 12:20:50 executing program 2: 12:20:50 executing program 1: 12:20:50 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) dup3(r1, r0, 0x0) 12:20:50 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) write(0xffffffffffffffff, 0x0, 0x1000000) 12:20:50 executing program 4: 12:20:50 executing program 1: 12:20:50 executing program 2: 12:20:50 executing program 3: 12:20:50 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) dup3(r1, r0, 0x0) 12:20:51 executing program 4: 12:20:51 executing program 2: 12:20:51 executing program 1: 12:20:51 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0xa02, 0x0) dup3(r1, r0, 0x0) 12:20:51 executing program 3: 12:20:51 executing program 2: 12:20:51 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) write(0xffffffffffffffff, 0x0, 0x1000000) 12:20:51 executing program 4: 12:20:51 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0xa02, 0x0) dup3(r1, r0, 0x0) 12:20:51 executing program 1: 12:20:51 executing program 2: 12:20:51 executing program 3: 12:20:51 executing program 4: 12:20:51 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0xa02, 0x0) dup3(r1, r0, 0x0) 12:20:51 executing program 1: 12:20:51 executing program 4: 12:20:51 executing program 3: 12:20:51 executing program 2: 12:20:51 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) write(r0, 0x0, 0x1000000) 12:20:51 executing program 1: 12:20:51 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 12:20:51 executing program 4: 12:20:51 executing program 2: 12:20:51 executing program 3: 12:20:52 executing program 2: 12:20:52 executing program 4: 12:20:52 executing program 1: 12:20:52 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 12:20:52 executing program 3: 12:20:52 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) write(r0, 0x0, 0x1000000) 12:20:52 executing program 4: 12:20:52 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) write(r0, 0x0, 0x1000000) 12:20:52 executing program 2: 12:20:52 executing program 1: 12:20:52 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 12:20:52 executing program 3: 12:20:52 executing program 2: 12:20:52 executing program 4: 12:20:52 executing program 5: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) write(r0, 0x0, 0x1000000) 12:20:52 executing program 1: 12:20:52 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 12:20:52 executing program 2: 12:20:52 executing program 3: 12:20:52 executing program 4: 12:20:52 executing program 5: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) write(r0, 0x0, 0x1000000) 12:20:52 executing program 2: 12:20:52 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 12:20:52 executing program 1: 12:20:53 executing program 3: 12:20:53 executing program 4: 12:20:53 executing program 5: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) write(r0, 0x0, 0x1000000) 12:20:53 executing program 1: 12:20:53 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 12:20:53 executing program 2: 12:20:53 executing program 3: 12:20:53 executing program 4: 12:20:53 executing program 2: 12:20:53 executing program 1: 12:20:53 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:20:53 executing program 3: 12:20:53 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 12:20:53 executing program 1: 12:20:53 executing program 4: 12:20:53 executing program 2: 12:20:53 executing program 3: 12:20:53 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:20:53 executing program 4: 12:20:53 executing program 0: 12:20:53 executing program 2: 12:20:53 executing program 1: 12:20:53 executing program 3: 12:20:53 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:20:54 executing program 0: 12:20:54 executing program 4: 12:20:54 executing program 2: 12:20:54 executing program 3: 12:20:54 executing program 1: 12:20:54 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) write(r0, 0x0, 0x1000000) 12:20:54 executing program 0: 12:20:54 executing program 4: 12:20:54 executing program 3: 12:20:54 executing program 1: 12:20:54 executing program 2: 12:20:54 executing program 0: 12:20:54 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) write(r0, 0x0, 0x1000000) 12:20:54 executing program 4: 12:20:54 executing program 3: 12:20:54 executing program 1: 12:20:54 executing program 2: 12:20:54 executing program 0: 12:20:54 executing program 4: 12:20:54 executing program 3: 12:20:54 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) write(r0, 0x0, 0x1000000) 12:20:54 executing program 2: 12:20:54 executing program 4: 12:20:54 executing program 0: 12:20:54 executing program 1: 12:20:55 executing program 0: 12:20:55 executing program 3: 12:20:55 executing program 2: 12:20:55 executing program 4: 12:20:55 executing program 1: 12:20:55 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:20:55 executing program 3: 12:20:55 executing program 0: 12:20:55 executing program 1: 12:20:55 executing program 2: 12:20:55 executing program 4: 12:20:55 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:20:55 executing program 3: 12:20:55 executing program 0: 12:20:55 executing program 1: 12:20:55 executing program 4: 12:20:55 executing program 2: 12:20:55 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:20:55 executing program 3: 12:20:55 executing program 0: 12:20:55 executing program 1: 12:20:55 executing program 4: 12:20:55 executing program 2: 12:20:55 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:20:56 executing program 3: 12:20:56 executing program 0: 12:20:56 executing program 1 (fault-call:2 fault-nth:0): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 12:20:56 executing program 4 (fault-call:2 fault-nth:0): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) 12:20:56 executing program 2 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:20:56 executing program 3 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:20:56 executing program 0 (fault-call:5 fault-nth:0): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:56 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) [ 358.348695][T16601] FAULT_INJECTION: forcing a failure. [ 358.348695][T16601] name failslab, interval 1, probability 0, space 0, times 0 [ 358.393494][T16602] FAULT_INJECTION: forcing a failure. [ 358.393494][T16602] name failslab, interval 1, probability 0, space 0, times 0 [ 358.430807][T16601] CPU: 1 PID: 16601 Comm: syz-executor.2 Not tainted 5.4.0-next-20191126-syzkaller #0 [ 358.440406][T16601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.450456][T16601] Call Trace: [ 358.450486][T16601] dump_stack+0x197/0x210 [ 358.450516][T16601] should_fail.cold+0xa/0x15 [ 358.462805][T16601] ? fault_create_debugfs_attr+0x180/0x180 [ 358.468635][T16601] ? ___might_sleep+0x163/0x2c0 [ 358.473523][T16601] __should_failslab+0x121/0x190 [ 358.478473][T16601] should_failslab+0x9/0x14 [ 358.482983][T16601] kmem_cache_alloc_trace+0x2d3/0x790 [ 358.488467][T16601] ? refcount_sub_and_test_checked+0x154/0x200 [ 358.494629][T16601] ? refcount_dec_not_one+0x1f0/0x1f0 [ 358.500008][T16601] btf_new_fd+0x1c9/0x1d10 [ 358.504443][T16601] ? refcount_dec_and_test_checked+0x1b/0x20 [ 358.510424][T16601] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 358.516763][T16601] ? apparmor_capable+0x2ed/0x630 [ 358.521845][T16601] ? cap_capable+0x205/0x270 [ 358.526437][T16601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 358.532688][T16601] ? btf_type_seq_show+0x1b0/0x1b0 [ 358.537792][T16601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 358.544022][T16601] ? ns_capable_common+0x93/0x100 [ 358.549043][T16601] __do_sys_bpf+0x1529/0x37b0 [ 358.553702][T16601] ? bpf_prog_load+0x1830/0x1830 [ 358.558622][T16601] ? __kasan_check_write+0x14/0x20 [ 358.563724][T16601] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 358.569266][T16601] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 358.574536][T16601] ? wait_for_completion+0x440/0x440 [ 358.579852][T16601] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 358.586097][T16601] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 358.591555][T16601] ? do_syscall_64+0x26/0x790 [ 358.596233][T16601] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 358.602298][T16601] ? do_syscall_64+0x26/0x790 [ 358.606981][T16601] __x64_sys_bpf+0x73/0xb0 [ 358.611403][T16601] do_syscall_64+0xfa/0x790 [ 358.615905][T16601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 358.621785][T16601] RIP: 0033:0x45a639 [ 358.625673][T16601] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 358.645270][T16601] RSP: 002b:00007f64abf46c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 358.653682][T16601] RAX: ffffffffffffffda RBX: 00007f64abf46c90 RCX: 000000000045a639 [ 358.661729][T16601] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 358.669697][T16601] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 358.677665][T16601] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64abf476d4 [ 358.679438][T16609] FAULT_INJECTION: forcing a failure. [ 358.679438][T16609] name failslab, interval 1, probability 0, space 0, times 0 [ 358.685629][T16601] R13: 00000000004c0ada R14: 00000000004d3550 R15: 0000000000000003 [ 358.705212][T16602] CPU: 0 PID: 16602 Comm: syz-executor.4 Not tainted 5.4.0-next-20191126-syzkaller #0 [ 358.715869][T16602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.715875][T16602] Call Trace: [ 358.715896][T16602] dump_stack+0x197/0x210 [ 358.715917][T16602] should_fail.cold+0xa/0x15 [ 358.738127][T16602] ? release_sock+0x156/0x1c0 [ 358.742807][T16602] ? fault_create_debugfs_attr+0x180/0x180 [ 358.742830][T16602] ? ___might_sleep+0x163/0x2c0 [ 358.742848][T16602] __should_failslab+0x121/0x190 [ 358.742869][T16602] should_failslab+0x9/0x14 [ 358.753576][T16602] kmem_cache_alloc_node+0x268/0x740 [ 358.753603][T16602] __alloc_skb+0xd5/0x5e0 [ 358.753625][T16602] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 358.763025][T16602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 358.763143][T16602] ? netlink_autobind.isra.0+0x223/0x300 [ 358.763163][T16602] netlink_sendmsg+0x99c/0xda0 [ 358.772738][T16602] ? netlink_unicast+0x710/0x710 [ 358.772754][T16602] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 358.772770][T16602] ? apparmor_socket_sendmsg+0x2a/0x30 [ 358.772788][T16602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 358.784571][T16602] ? security_socket_sendmsg+0x8d/0xc0 [ 358.784591][T16602] ? netlink_unicast+0x710/0x710 [ 358.794941][T16602] sock_sendmsg+0xd7/0x130 [ 358.794959][T16602] ___sys_sendmsg+0x803/0x920 [ 358.794977][T16602] ? copy_msghdr_from_user+0x440/0x440 [ 358.795002][T16602] ? __kasan_check_read+0x11/0x20 [ 358.805439][T16602] ? __fget+0x37f/0x550 [ 358.805460][T16602] ? ksys_dup3+0x3e0/0x3e0 [ 358.805483][T16602] ? __fget_light+0x1a9/0x230 [ 358.805501][T16602] ? __fdget+0x1b/0x20 [ 358.817154][T16602] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 358.817176][T16602] __sys_sendmsg+0x105/0x1d0 [ 358.817198][T16602] ? __sys_sendmsg_sock+0xd0/0xd0 [ 358.827580][T16602] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 358.827594][T16602] ? do_syscall_64+0x26/0x790 [ 358.827616][T16602] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 358.836656][T16602] ? do_syscall_64+0x26/0x790 [ 358.836679][T16602] __x64_sys_sendmsg+0x78/0xb0 [ 358.836698][T16602] do_syscall_64+0xfa/0x790 [ 358.885762][T16602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 358.896456][T16602] RIP: 0033:0x45a639 [ 358.896470][T16602] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 358.896478][T16602] RSP: 002b:00007f471caa1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 358.896492][T16602] RAX: ffffffffffffffda RBX: 00007f471caa1c90 RCX: 000000000045a639 [ 358.896499][T16602] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 358.896506][T16602] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 358.896519][T16602] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f471caa26d4 [ 358.979964][T16602] R13: 00000000004c8938 R14: 00000000004deff8 R15: 0000000000000004 12:20:56 executing program 2 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:20:56 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x4000) [ 358.987945][T16609] CPU: 1 PID: 16609 Comm: syz-executor.3 Not tainted 5.4.0-next-20191126-syzkaller #0 [ 358.997500][T16609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.007563][T16609] Call Trace: [ 359.010861][T16609] dump_stack+0x197/0x210 [ 359.015205][T16609] should_fail.cold+0xa/0x15 [ 359.019807][T16609] ? fault_create_debugfs_attr+0x180/0x180 [ 359.025623][T16609] ? ___might_sleep+0x163/0x2c0 [ 359.030491][T16609] __should_failslab+0x121/0x190 [ 359.035433][T16609] should_failslab+0x9/0x14 [ 359.039955][T16609] kmem_cache_alloc_trace+0x2d3/0x790 12:20:56 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x1000000) [ 359.045328][T16609] ? refcount_sub_and_test_checked+0x154/0x200 [ 359.051484][T16609] ? refcount_dec_not_one+0x1f0/0x1f0 [ 359.056863][T16609] btf_new_fd+0x1c9/0x1d10 [ 359.061285][T16609] ? refcount_dec_and_test_checked+0x1b/0x20 [ 359.067269][T16609] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 359.073513][T16609] ? apparmor_capable+0x2ed/0x630 [ 359.078539][T16609] ? cap_capable+0x205/0x270 [ 359.083137][T16609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 359.089388][T16609] ? btf_type_seq_show+0x1b0/0x1b0 [ 359.094505][T16609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 359.100753][T16609] ? ns_capable_common+0x93/0x100 [ 359.105785][T16609] __do_sys_bpf+0x1529/0x37b0 [ 359.110466][T16609] ? bpf_prog_load+0x1830/0x1830 [ 359.115404][T16609] ? __kasan_check_write+0x14/0x20 [ 359.120519][T16609] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 359.126065][T16609] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 359.131351][T16609] ? wait_for_completion+0x440/0x440 [ 359.136646][T16609] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 359.142907][T16609] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 359.148365][T16609] ? do_syscall_64+0x26/0x790 [ 359.153047][T16609] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.159115][T16609] ? do_syscall_64+0x26/0x790 [ 359.163802][T16609] __x64_sys_bpf+0x73/0xb0 [ 359.167210][T16622] FAULT_INJECTION: forcing a failure. [ 359.167210][T16622] name failslab, interval 1, probability 0, space 0, times 0 [ 359.168217][T16609] do_syscall_64+0xfa/0x790 [ 359.168241][T16609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.168253][T16609] RIP: 0033:0x45a639 [ 359.168268][T16609] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 359.168275][T16609] RSP: 002b:00007fe5a67b4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 359.223069][T16609] RAX: ffffffffffffffda RBX: 00007fe5a67b4c90 RCX: 000000000045a639 [ 359.231038][T16609] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 359.239004][T16609] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 359.246963][T16609] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5a67b56d4 [ 359.254918][T16609] R13: 00000000004c0ada R14: 00000000004d3550 R15: 0000000000000003 [ 359.273107][T16622] CPU: 0 PID: 16622 Comm: syz-executor.2 Not tainted 5.4.0-next-20191126-syzkaller #0 [ 359.282679][T16622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.292729][T16622] Call Trace: [ 359.296027][T16622] dump_stack+0x197/0x210 [ 359.300367][T16622] should_fail.cold+0xa/0x15 [ 359.304966][T16622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 359.311215][T16622] ? fault_create_debugfs_attr+0x180/0x180 [ 359.317023][T16622] ? ___might_sleep+0x163/0x2c0 [ 359.321872][T16622] __should_failslab+0x121/0x190 [ 359.326801][T16622] should_failslab+0x9/0x14 [ 359.331331][T16622] kmem_cache_alloc_trace+0x2d3/0x790 [ 359.336681][T16622] ? refcount_sub_and_test_checked+0x154/0x200 [ 359.342812][T16622] ? refcount_dec_not_one+0x1f0/0x1f0 [ 359.348168][T16622] btf_new_fd+0x424/0x1d10 [ 359.352608][T16622] ? refcount_dec_and_test_checked+0x1b/0x20 [ 359.358566][T16622] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 359.364827][T16622] ? apparmor_capable+0x2ed/0x630 [ 359.369827][T16622] ? cap_capable+0x205/0x270 [ 359.374396][T16622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 359.380616][T16622] ? btf_type_seq_show+0x1b0/0x1b0 [ 359.385704][T16622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 359.391931][T16622] ? ns_capable_common+0x93/0x100 [ 359.396948][T16622] __do_sys_bpf+0x1529/0x37b0 [ 359.401617][T16622] ? bpf_prog_load+0x1830/0x1830 [ 359.406533][T16622] ? __kasan_check_write+0x14/0x20 [ 359.411636][T16622] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 359.417175][T16622] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 359.422706][T16622] ? wait_for_completion+0x440/0x440 [ 359.427979][T16622] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 359.434205][T16622] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 359.439647][T16622] ? do_syscall_64+0x26/0x790 [ 359.444353][T16622] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.450403][T16622] ? do_syscall_64+0x26/0x790 [ 359.455062][T16622] __x64_sys_bpf+0x73/0xb0 [ 359.459458][T16622] do_syscall_64+0xfa/0x790 [ 359.463944][T16622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.469813][T16622] RIP: 0033:0x45a639 [ 359.473695][T16622] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 359.493391][T16622] RSP: 002b:00007f64abf46c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 359.501781][T16622] RAX: ffffffffffffffda RBX: 00007f64abf46c90 RCX: 000000000045a639 [ 359.509730][T16622] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 359.517684][T16622] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 359.525646][T16622] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64abf476d4 [ 359.533608][T16622] R13: 00000000004c0ada R14: 00000000004d3550 R15: 0000000000000003 12:20:57 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:20:57 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x40000000) 12:20:57 executing program 4 (fault-call:2 fault-nth:1): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) 12:20:57 executing program 3 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:20:57 executing program 2 (fault-call:0 fault-nth:2): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:20:57 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x100000000000000) [ 359.705891][T16634] FAULT_INJECTION: forcing a failure. [ 359.705891][T16634] name failslab, interval 1, probability 0, space 0, times 0 [ 359.738338][T16637] FAULT_INJECTION: forcing a failure. [ 359.738338][T16637] name failslab, interval 1, probability 0, space 0, times 0 [ 359.740628][T16634] CPU: 0 PID: 16634 Comm: syz-executor.4 Not tainted 5.4.0-next-20191126-syzkaller #0 [ 359.760606][T16634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.765372][T16639] FAULT_INJECTION: forcing a failure. [ 359.765372][T16639] name failslab, interval 1, probability 0, space 0, times 0 [ 359.770665][T16634] Call Trace: [ 359.770690][T16634] dump_stack+0x197/0x210 [ 359.770712][T16634] should_fail.cold+0xa/0x15 [ 359.770730][T16634] ? fault_create_debugfs_attr+0x180/0x180 [ 359.770747][T16634] ? ___might_sleep+0x163/0x2c0 [ 359.770769][T16634] __should_failslab+0x121/0x190 [ 359.811024][T16634] should_failslab+0x9/0x14 [ 359.815527][T16634] kmem_cache_alloc_node_trace+0x274/0x750 [ 359.821330][T16634] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 359.827295][T16634] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 359.833101][T16634] __kmalloc_node_track_caller+0x3d/0x70 [ 359.838745][T16634] __kmalloc_reserve.isra.0+0x40/0xf0 [ 359.844109][T16634] __alloc_skb+0x10b/0x5e0 [ 359.848528][T16634] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 359.854063][T16634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 359.860287][T16634] ? netlink_autobind.isra.0+0x223/0x300 [ 359.865905][T16634] netlink_sendmsg+0x99c/0xda0 [ 359.870658][T16634] ? netlink_unicast+0x710/0x710 [ 359.875580][T16634] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 359.881197][T16634] ? apparmor_socket_sendmsg+0x2a/0x30 [ 359.886640][T16634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 359.892861][T16634] ? security_socket_sendmsg+0x8d/0xc0 [ 359.898308][T16634] ? netlink_unicast+0x710/0x710 [ 359.903238][T16634] sock_sendmsg+0xd7/0x130 [ 359.907640][T16634] ___sys_sendmsg+0x803/0x920 [ 359.912305][T16634] ? copy_msghdr_from_user+0x440/0x440 [ 359.917753][T16634] ? __kasan_check_read+0x11/0x20 [ 359.922773][T16634] ? __fget+0x37f/0x550 [ 359.926922][T16634] ? ksys_dup3+0x3e0/0x3e0 [ 359.931327][T16634] ? __fget_light+0x1a9/0x230 [ 359.935993][T16634] ? __fdget+0x1b/0x20 [ 359.940061][T16634] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 359.946288][T16634] __sys_sendmsg+0x105/0x1d0 [ 359.950866][T16634] ? __sys_sendmsg_sock+0xd0/0xd0 [ 359.955883][T16634] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 359.961327][T16634] ? do_syscall_64+0x26/0x790 [ 359.966004][T16634] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.972050][T16634] ? do_syscall_64+0x26/0x790 [ 359.976715][T16634] __x64_sys_sendmsg+0x78/0xb0 [ 359.981477][T16634] do_syscall_64+0xfa/0x790 [ 359.985968][T16634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.991843][T16634] RIP: 0033:0x45a639 [ 359.995722][T16634] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 360.015306][T16634] RSP: 002b:00007f471caa1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 360.023709][T16634] RAX: ffffffffffffffda RBX: 00007f471caa1c90 RCX: 000000000045a639 [ 360.031758][T16634] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 360.039724][T16634] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 360.047681][T16634] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f471caa26d4 [ 360.055637][T16634] R13: 00000000004c8938 R14: 00000000004deff8 R15: 0000000000000004 [ 360.063618][T16639] CPU: 1 PID: 16639 Comm: syz-executor.2 Not tainted 5.4.0-next-20191126-syzkaller #0 [ 360.073274][T16639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.083332][T16639] Call Trace: [ 360.086631][T16639] dump_stack+0x197/0x210 [ 360.090976][T16639] should_fail.cold+0xa/0x15 [ 360.095575][T16639] ? fs_reclaim_release+0xf/0x30 [ 360.100521][T16639] ? fault_create_debugfs_attr+0x180/0x180 12:20:58 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x4000000000000000) [ 360.106338][T16639] ? ___might_sleep+0x163/0x2c0 [ 360.111195][T16639] __should_failslab+0x121/0x190 [ 360.116138][T16639] should_failslab+0x9/0x14 [ 360.120658][T16639] kmem_cache_alloc_node_trace+0x274/0x750 [ 360.126470][T16639] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 360.132460][T16639] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 360.138277][T16639] __kmalloc_node+0x3d/0x70 [ 360.142774][T16639] kvmalloc_node+0x68/0x100 [ 360.142793][T16639] btf_new_fd+0x468/0x1d10 [ 360.142811][T16639] ? refcount_dec_and_test_checked+0x1b/0x20 [ 360.142824][T16639] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 360.142842][T16639] ? apparmor_capable+0x2ed/0x630 [ 360.168929][T16639] ? cap_capable+0x205/0x270 [ 360.173521][T16639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 360.179777][T16639] ? btf_type_seq_show+0x1b0/0x1b0 [ 360.184895][T16639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 360.191145][T16639] ? ns_capable_common+0x93/0x100 [ 360.196174][T16639] __do_sys_bpf+0x1529/0x37b0 [ 360.200857][T16639] ? bpf_prog_load+0x1830/0x1830 [ 360.205803][T16639] ? __kasan_check_write+0x14/0x20 [ 360.210927][T16639] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 360.216475][T16639] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 360.221758][T16639] ? wait_for_completion+0x440/0x440 [ 360.227056][T16639] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 360.233334][T16639] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 360.238793][T16639] ? do_syscall_64+0x26/0x790 [ 360.243467][T16639] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.243481][T16639] ? do_syscall_64+0x26/0x790 [ 360.243500][T16639] __x64_sys_bpf+0x73/0xb0 [ 360.243517][T16639] do_syscall_64+0xfa/0x790 [ 360.243536][T16639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.243547][T16639] RIP: 0033:0x45a639 [ 360.243562][T16639] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 360.243569][T16639] RSP: 002b:00007f64abf46c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 360.243582][T16639] RAX: ffffffffffffffda RBX: 00007f64abf46c90 RCX: 000000000045a639 [ 360.243591][T16639] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 360.243598][T16639] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 360.243611][T16639] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64abf476d4 [ 360.258746][T16639] R13: 00000000004c0ada R14: 00000000004d3550 R15: 0000000000000003 [ 360.336114][T16637] CPU: 1 PID: 16637 Comm: syz-executor.3 Not tainted 5.4.0-next-20191126-syzkaller #0 [ 360.350939][T16637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.360992][T16637] Call Trace: [ 360.361015][T16637] dump_stack+0x197/0x210 [ 360.361035][T16637] should_fail.cold+0xa/0x15 [ 360.361050][T16637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 360.361067][T16637] ? fault_create_debugfs_attr+0x180/0x180 [ 360.361083][T16637] ? ___might_sleep+0x163/0x2c0 [ 360.361105][T16637] __should_failslab+0x121/0x190 [ 360.368693][T16637] should_failslab+0x9/0x14 [ 360.379488][T16637] kmem_cache_alloc_trace+0x2d3/0x790 [ 360.390106][T16637] ? refcount_sub_and_test_checked+0x154/0x200 [ 360.411049][T16637] ? refcount_dec_not_one+0x1f0/0x1f0 [ 360.416451][T16637] btf_new_fd+0x424/0x1d10 [ 360.420895][T16637] ? refcount_dec_and_test_checked+0x1b/0x20 [ 360.426891][T16637] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 360.433148][T16637] ? apparmor_capable+0x2ed/0x630 [ 360.438233][T16637] ? cap_capable+0x205/0x270 [ 360.442844][T16637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 360.449108][T16637] ? btf_type_seq_show+0x1b0/0x1b0 [ 360.454244][T16637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 360.460499][T16637] ? ns_capable_common+0x93/0x100 [ 360.465534][T16637] __do_sys_bpf+0x1529/0x37b0 [ 360.470223][T16637] ? bpf_prog_load+0x1830/0x1830 [ 360.475167][T16637] ? __kasan_check_write+0x14/0x20 [ 360.480313][T16637] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 360.485873][T16637] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 360.491173][T16637] ? wait_for_completion+0x440/0x440 [ 360.496471][T16637] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 360.502835][T16637] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 360.508306][T16637] ? do_syscall_64+0x26/0x790 [ 360.512993][T16637] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.519062][T16637] ? do_syscall_64+0x26/0x790 [ 360.523749][T16637] __x64_sys_bpf+0x73/0xb0 [ 360.528172][T16637] do_syscall_64+0xfa/0x790 [ 360.532676][T16637] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.538561][T16637] RIP: 0033:0x45a639 [ 360.542435][T16637] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 360.562020][T16637] RSP: 002b:00007fe5a67b4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 360.570410][T16637] RAX: ffffffffffffffda RBX: 00007fe5a67b4c90 RCX: 000000000045a639 [ 360.578364][T16637] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 360.586316][T16637] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 360.594268][T16637] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5a67b56d4 [ 360.602219][T16637] R13: 00000000004c0ada R14: 00000000004d3550 R15: 0000000000000003 12:20:58 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:20:58 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xa00, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'ipddp0\x00', 0x600}) dup3(r1, r0, 0x0) 12:20:58 executing program 2 (fault-call:0 fault-nth:3): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:20:58 executing program 4 (fault-call:2 fault-nth:2): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) 12:20:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 360.697462][T16656] Unknown ioctl 1074025689 [ 360.708167][T16657] FAULT_INJECTION: forcing a failure. [ 360.708167][T16657] name failslab, interval 1, probability 0, space 0, times 0 [ 360.724540][T16656] Unknown ioctl 1074025689 [ 360.736827][T16657] CPU: 1 PID: 16657 Comm: syz-executor.4 Not tainted 5.4.0-next-20191126-syzkaller #0 [ 360.746400][T16657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.756467][T16657] Call Trace: [ 360.759773][T16657] dump_stack+0x197/0x210 [ 360.764123][T16657] should_fail.cold+0xa/0x15 [ 360.764331][T16659] BPF:[1] DATASEC [ 360.768724][T16657] ? fault_create_debugfs_attr+0x180/0x180 [ 360.768775][T16657] __should_failslab+0x121/0x190 [ 360.783294][T16657] should_failslab+0x9/0x14 [ 360.787796][T16657] kmem_cache_alloc+0x47/0x710 [ 360.792563][T16657] ? lock_acquire+0x190/0x410 [ 360.797246][T16657] ? netlink_deliver_tap+0x146/0xbe0 [ 360.802541][T16657] skb_clone+0x154/0x3d0 [ 360.806807][T16657] netlink_deliver_tap+0x943/0xbe0 [ 360.811943][T16657] netlink_unicast+0x5a2/0x710 [ 360.817062][T16657] ? netlink_attachskb+0x7c0/0x7c0 [ 360.821006][T16662] BPF:[1] DATASEC (anon) [ 360.822248][T16657] ? _copy_from_iter_full+0x25d/0x8c0 [ 360.822272][T16657] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 360.826657][T16662] BPF:size=3436 vlen=1 [ 360.831942][T16657] ? __check_object_size+0x3d/0x437 [ 360.831965][T16657] netlink_sendmsg+0x8cf/0xda0 [ 360.831985][T16657] ? netlink_unicast+0x710/0x710 [ 360.832002][T16657] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 360.832018][T16657] ? apparmor_socket_sendmsg+0x2a/0x30 [ 360.832035][T16657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 360.832048][T16657] ? security_socket_sendmsg+0x8d/0xc0 [ 360.832067][T16657] ? netlink_unicast+0x710/0x710 [ 360.851749][T16657] sock_sendmsg+0xd7/0x130 [ 360.851767][T16657] ___sys_sendmsg+0x803/0x920 [ 360.851783][T16657] ? copy_msghdr_from_user+0x440/0x440 [ 360.851809][T16657] ? __kasan_check_read+0x11/0x20 [ 360.861484][T16659] BPF:size=3436 vlen=1 [ 360.862259][T16657] ? __fget+0x37f/0x550 [ 360.862280][T16657] ? ksys_dup3+0x3e0/0x3e0 [ 360.874043][T16657] ? __fget_light+0x1a9/0x230 [ 360.874059][T16657] ? __fdget+0x1b/0x20 [ 360.874077][T16657] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 360.874098][T16657] __sys_sendmsg+0x105/0x1d0 [ 360.874121][T16657] ? __sys_sendmsg_sock+0xd0/0xd0 [ 360.894317][T16662] BPF: [ 360.898983][T16657] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 360.899000][T16657] ? do_syscall_64+0x26/0x790 [ 360.899027][T16657] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.905227][T16659] BPF: [ 360.908078][T16657] ? do_syscall_64+0x26/0x790 [ 360.908104][T16657] __x64_sys_sendmsg+0x78/0xb0 [ 360.908118][T16657] do_syscall_64+0xfa/0x790 [ 360.908142][T16657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.931610][T16657] RIP: 0033:0x45a639 [ 360.931628][T16657] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 360.931636][T16657] RSP: 002b:00007f471caa1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 360.931649][T16657] RAX: ffffffffffffffda RBX: 00007f471caa1c90 RCX: 000000000045a639 [ 360.931657][T16657] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 360.931665][T16657] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 360.931673][T16657] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f471caa26d4 [ 360.931680][T16657] R13: 00000000004c8938 R14: 00000000004deff8 R15: 0000000000000004 [ 360.939575][T16662] BPF:Invalid name [ 360.957552][T16659] BPF:Invalid name [ 360.978700][T16662] BPF: [ 360.978700][T16662] [ 361.034707][T16659] BPF: [ 361.034707][T16659] 12:20:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:20:59 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x7, 0x100006) r1 = dup(0xffffffffffffffff) getsockopt$bt_BT_DEFER_SETUP(r1, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(r1, 0x29, 0x5, &(0x7f0000000080)={@empty}, &(0x7f00000000c0)=0x14) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) dup3(r2, r0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x800, 0x0) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) write$rfkill(r3, &(0x7f0000000140)={0x3, 0x4, 0x1, 0x0, 0x1}, 0x8) 12:20:59 executing program 4 (fault-call:2 fault-nth:3): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) 12:20:59 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:20:59 executing program 3: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 361.261937][T16677] BPF:[1] DATASEC (anon) [ 361.285656][T16677] BPF:size=3436 vlen=1 [ 361.295587][T16677] BPF: [ 361.298481][T16677] BPF:Invalid name [ 361.305298][T16677] BPF: [ 361.305298][T16677] [ 361.306285][T16680] FAULT_INJECTION: forcing a failure. [ 361.306285][T16680] name failslab, interval 1, probability 0, space 0, times 0 [ 361.355510][T16680] CPU: 0 PID: 16680 Comm: syz-executor.4 Not tainted 5.4.0-next-20191126-syzkaller #0 [ 361.365323][T16680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.375389][T16680] Call Trace: [ 361.378704][T16680] dump_stack+0x197/0x210 [ 361.383052][T16680] should_fail.cold+0xa/0x15 [ 361.387661][T16680] ? fault_create_debugfs_attr+0x180/0x180 [ 361.393483][T16680] ? ___might_sleep+0x163/0x2c0 [ 361.398349][T16680] __should_failslab+0x121/0x190 [ 361.403302][T16680] should_failslab+0x9/0x14 [ 361.407814][T16680] kmem_cache_alloc_trace+0x2d3/0x790 [ 361.413212][T16680] ? ns_capable+0x20/0x30 [ 361.417554][T16680] ? __netlink_ns_capable+0x104/0x140 [ 361.422938][T16680] genl_rcv_msg+0x90c/0xea0 [ 361.427456][T16680] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 361.433798][T16680] ? __kasan_check_read+0x11/0x20 [ 361.438849][T16680] ? mark_held_locks+0xf0/0xf0 [ 361.443623][T16680] ? find_held_lock+0x35/0x130 [ 361.448399][T16680] netlink_rcv_skb+0x177/0x450 12:20:59 executing program 3: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:20:59 executing program 2: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 361.453171][T16680] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 361.459500][T16680] ? netlink_ack+0xb50/0xb50 [ 361.464102][T16680] ? __kasan_check_write+0x14/0x20 [ 361.469230][T16680] ? netlink_deliver_tap+0x24a/0xbe0 [ 361.474527][T16680] genl_rcv+0x29/0x40 [ 361.478522][T16680] netlink_unicast+0x531/0x710 [ 361.483301][T16680] ? netlink_attachskb+0x7c0/0x7c0 [ 361.488413][T16680] ? _copy_from_iter_full+0x25d/0x8c0 [ 361.493787][T16680] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 361.499512][T16680] ? __check_object_size+0x3d/0x437 [ 361.504733][T16680] netlink_sendmsg+0x8cf/0xda0 [ 361.509510][T16680] ? netlink_unicast+0x710/0x710 [ 361.514446][T16680] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 361.514463][T16680] ? apparmor_socket_sendmsg+0x2a/0x30 [ 361.514479][T16680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 361.514492][T16680] ? security_socket_sendmsg+0x8d/0xc0 [ 361.514508][T16680] ? netlink_unicast+0x710/0x710 [ 361.514525][T16680] sock_sendmsg+0xd7/0x130 [ 361.514540][T16680] ___sys_sendmsg+0x803/0x920 [ 361.514559][T16680] ? copy_msghdr_from_user+0x440/0x440 [ 361.525552][T16680] ? __kasan_check_read+0x11/0x20 [ 361.525571][T16680] ? __fget+0x37f/0x550 [ 361.537257][T16680] ? ksys_dup3+0x3e0/0x3e0 [ 361.537285][T16680] ? __fget_light+0x1a9/0x230 [ 361.546603][T16680] ? __fdget+0x1b/0x20 [ 361.546620][T16680] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 361.546643][T16680] __sys_sendmsg+0x105/0x1d0 [ 361.556733][T16680] ? __sys_sendmsg_sock+0xd0/0xd0 [ 361.556766][T16680] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 361.567728][T16680] ? do_syscall_64+0x26/0x790 [ 361.567747][T16680] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.567764][T16680] ? do_syscall_64+0x26/0x790 [ 361.576838][T16680] __x64_sys_sendmsg+0x78/0xb0 [ 361.576860][T16680] do_syscall_64+0xfa/0x790 [ 361.587142][T16680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.587158][T16680] RIP: 0033:0x45a639 [ 361.596733][T16680] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 361.596741][T16680] RSP: 002b:00007f471caa1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 361.596759][T16680] RAX: ffffffffffffffda RBX: 00007f471caa1c90 RCX: 000000000045a639 [ 361.672545][T16680] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 361.680523][T16680] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 361.688503][T16680] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f471caa26d4 [ 361.696483][T16680] R13: 00000000004c8938 R14: 00000000004deff8 R15: 0000000000000004 12:20:59 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x7ffffffff000) 12:20:59 executing program 3: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:20:59 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:20:59 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x90400, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000240)={{0x5, 0xffffffff}, 0x40}, 0x10) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$PPPIOCSCOMPRESS(r4, 0x4010744d) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xfffffffffffffffd) dup3(r1, r0, 0x0) r5 = geteuid() r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r7) setresuid(0x0, r5, r7) 12:20:59 executing program 4 (fault-call:2 fault-nth:4): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) 12:20:59 executing program 3: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 361.860231][T16704] FAULT_INJECTION: forcing a failure. [ 361.860231][T16704] name failslab, interval 1, probability 0, space 0, times 0 [ 361.896956][T16704] CPU: 0 PID: 16704 Comm: syz-executor.4 Not tainted 5.4.0-next-20191126-syzkaller #0 12:20:59 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) fadvise64(r2, 0x8, 0x0, 0x4) 12:20:59 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) [ 361.906565][T16704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.916624][T16704] Call Trace: [ 361.916677][T16704] dump_stack+0x197/0x210 [ 361.924277][T16704] should_fail.cold+0xa/0x15 [ 361.928888][T16704] ? fault_create_debugfs_attr+0x180/0x180 [ 361.934712][T16704] ? ___might_sleep+0x163/0x2c0 [ 361.939578][T16704] __should_failslab+0x121/0x190 [ 361.939607][T16704] should_failslab+0x9/0x14 [ 361.949015][T16704] kmem_cache_alloc_trace+0x2d3/0x790 [ 361.954405][T16704] ? __kasan_check_read+0x11/0x20 [ 361.959535][T16704] seg6_genl_dumphmac_start+0x13b/0x1c0 [ 361.965093][T16704] __netlink_dump_start+0x4f8/0x7d0 [ 361.970292][T16704] ? __netlink_ns_capable+0x104/0x140 [ 361.975659][T16704] ? seg6_genl_dumphmac_done+0x50/0x50 [ 361.975687][T16704] genl_rcv_msg+0xab1/0xea0 [ 361.985719][T16704] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 361.992060][T16704] ? seg6_genl_dumphmac_done+0x50/0x50 [ 361.997521][T16704] ? seg6_genl_dumphmac_start+0x1c0/0x1c0 [ 362.003237][T16704] ? lockdep_genl_is_held+0x30/0x30 [ 362.003271][T16704] ? mark_held_locks+0xf0/0xf0 [ 362.013198][T16704] ? find_held_lock+0x35/0x130 [ 362.017974][T16704] netlink_rcv_skb+0x177/0x450 [ 362.022750][T16704] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 362.029091][T16704] ? netlink_ack+0xb50/0xb50 [ 362.029109][T16704] ? __kasan_check_write+0x14/0x20 [ 362.029129][T16704] ? netlink_deliver_tap+0x24a/0xbe0 [ 362.044077][T16704] genl_rcv+0x29/0x40 [ 362.048063][T16704] netlink_unicast+0x531/0x710 [ 362.048086][T16704] ? netlink_attachskb+0x7c0/0x7c0 12:20:59 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x12, 0x7, 0x0, &(0x7f0000000040)) connect$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e21, @empty}}, 0x24) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000000c0)={0x2, r4, 0x1}) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x800) dup3(r5, r2, 0x0) 12:20:59 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 362.048102][T16704] ? _copy_from_iter_full+0x25d/0x8c0 [ 362.048123][T16704] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 362.069034][T16704] ? __check_object_size+0x3d/0x437 [ 362.074248][T16704] netlink_sendmsg+0x8cf/0xda0 [ 362.079014][T16704] ? netlink_unicast+0x710/0x710 [ 362.079037][T16704] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 362.079057][T16704] ? apparmor_socket_sendmsg+0x2a/0x30 [ 362.094950][T16704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 362.101198][T16704] ? security_socket_sendmsg+0x8d/0xc0 [ 362.106659][T16704] ? netlink_unicast+0x710/0x710 [ 362.106680][T16704] sock_sendmsg+0xd7/0x130 [ 362.106702][T16704] ___sys_sendmsg+0x803/0x920 [ 362.120705][T16704] ? copy_msghdr_from_user+0x440/0x440 [ 362.126174][T16704] ? __kasan_check_read+0x11/0x20 [ 362.126195][T16704] ? __fget+0x37f/0x550 [ 362.135366][T16704] ? ksys_dup3+0x3e0/0x3e0 [ 362.139801][T16704] ? __fget_light+0x1a9/0x230 [ 362.144513][T16704] ? __fdget+0x1b/0x20 [ 362.144533][T16704] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 362.144557][T16704] __sys_sendmsg+0x105/0x1d0 [ 362.144576][T16704] ? __sys_sendmsg_sock+0xd0/0xd0 [ 362.154879][T16704] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 362.154896][T16704] ? do_syscall_64+0x26/0x790 [ 362.154916][T16704] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.154933][T16704] ? do_syscall_64+0x26/0x790 [ 362.169975][T16704] __x64_sys_sendmsg+0x78/0xb0 [ 362.170004][T16704] do_syscall_64+0xfa/0x790 [ 362.170030][T16704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.194650][T16704] RIP: 0033:0x45a639 12:21:00 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) [ 362.194669][T16704] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 362.194677][T16704] RSP: 002b:00007f471caa1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 362.194697][T16704] RAX: ffffffffffffffda RBX: 00007f471caa1c90 RCX: 000000000045a639 [ 362.194705][T16704] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 362.194713][T16704] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 12:21:00 executing program 2: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 362.194729][T16704] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f471caa26d4 [ 362.224193][T16704] R13: 00000000004c8938 R14: 00000000004deff8 R15: 0000000000000004 12:21:00 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0xf0ffffff7f0000) 12:21:00 executing program 3: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:00 executing program 2: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:00 executing program 4 (fault-call:2 fault-nth:5): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) 12:21:00 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000200)=0x31b) ioctl$VIDIOC_S_AUDIO(r3, 0x40345622, &(0x7f0000000000)={0xfffffff7, "0491ac13833b4e3c362d79a2cdb0dafad38708a0c978b122bc3005ec8c524678", 0x1, 0x2}) r4 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x8, 0xe0000) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000380)={0x2000000a, &(0x7f0000000340)=[{}, {0x0}, {}, {}, {}, {}]}) r9 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8001, 0x100) ioctl$DRM_IOCTL_AGP_RELEASE(r9, 0x6431) r10 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r10, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x6000000, 0x0, 0x0, 0x600, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) r11 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) accept4$inet6(r11, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000280)=0x1c, 0x800) r12 = syz_open_dev$adsp(0x0, 0x100, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r12, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) ioctl$DRM_IOCTL_ADD_CTX(r11, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r12, 0xc010641d, &(0x7f0000000500)={r13, &(0x7f0000000480)=""/69}) ioctl$DRM_IOCTL_LOCK(r10, 0x4008642a, &(0x7f0000000300)={r13, 0x17}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r9, 0x4010641c, &(0x7f0000000040)={r13, &(0x7f0000000200)=""/4096}) r14 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r15 = dup(r14) getsockopt$bt_BT_DEFER_SETUP(r15, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$DRM_IOCTL_GET_CTX(r15, 0xc0086423, &(0x7f00000007c0)={r8, 0x2}) r16 = dup(r5) r17 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r17) fsetxattr$security_capability(r17, &(0x7f0000000400)='security.capability\x00', &(0x7f0000000500)=@v2={0x2000000, [{0x2, 0x1}, {0xffff, 0x1000}]}, 0x14, 0x3) getsockopt$bt_BT_DEFER_SETUP(r16, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r16, 0x84, 0x76, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000180)={r18, 0x8, 0x5}, &(0x7f00000001c0)=0x8) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x1) r19 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r19) r20 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r20, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={r21, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r19, 0x84, 0x6, &(0x7f0000000440)={r21, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)=0x2) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000240)={r21, 0x1, 0x30, 0x800, 0x3}, &(0x7f0000000280)=0x18) dup3(r1, r0, 0x0) 12:21:00 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) [ 362.744929][T16738] FAULT_INJECTION: forcing a failure. [ 362.744929][T16738] name failslab, interval 1, probability 0, space 0, times 0 [ 362.780485][T16738] CPU: 0 PID: 16738 Comm: syz-executor.4 Not tainted 5.4.0-next-20191126-syzkaller #0 12:21:00 executing program 3: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 362.790100][T16738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.800165][T16738] Call Trace: [ 362.803498][T16738] dump_stack+0x197/0x210 [ 362.807853][T16738] should_fail.cold+0xa/0x15 [ 362.812478][T16738] ? fault_create_debugfs_attr+0x180/0x180 [ 362.818323][T16738] ? ___might_sleep+0x163/0x2c0 [ 362.823189][T16738] __should_failslab+0x121/0x190 [ 362.828151][T16738] should_failslab+0x9/0x14 [ 362.832668][T16738] kmem_cache_alloc_node+0x268/0x740 [ 362.837969][T16738] ? mutex_trylock+0x2f0/0x2f0 [ 362.842747][T16738] ? __netlink_dump_start+0x5a9/0x7d0 [ 362.848135][T16738] __alloc_skb+0xd5/0x5e0 [ 362.852478][T16738] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 362.858016][T16738] ? lock_downgrade+0x920/0x920 [ 362.862881][T16738] netlink_dump+0x71f/0xfb0 [ 362.867409][T16738] ? netlink_broadcast+0x50/0x50 [ 362.872349][T16738] ? do_raw_spin_unlock+0x178/0x270 [ 362.877566][T16738] __netlink_dump_start+0x5b1/0x7d0 [ 362.882772][T16738] ? __netlink_ns_capable+0x104/0x140 [ 362.888159][T16738] ? seg6_genl_dumphmac_done+0x50/0x50 [ 362.893630][T16738] genl_rcv_msg+0xab1/0xea0 [ 362.898143][T16738] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 362.904483][T16738] ? seg6_genl_dumphmac_done+0x50/0x50 [ 362.909952][T16738] ? seg6_genl_dumphmac_start+0x1c0/0x1c0 [ 362.915674][T16738] ? lockdep_genl_is_held+0x30/0x30 [ 362.920896][T16738] ? mark_held_locks+0xf0/0xf0 [ 362.925673][T16738] ? find_held_lock+0x35/0x130 [ 362.930481][T16738] netlink_rcv_skb+0x177/0x450 [ 362.935259][T16738] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 12:21:00 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0xc915b85f1c679bf9, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x80000, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$TIOCSIG(r3, 0x40045436, 0x19) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x11, 0x101}) r4 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f0000000100)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$sock_linger(r6, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x81}, 0x8) 12:21:00 executing program 3: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 362.941596][T16738] ? netlink_ack+0xb50/0xb50 [ 362.946190][T16738] ? __kasan_check_write+0x14/0x20 [ 362.951307][T16738] ? netlink_deliver_tap+0x24a/0xbe0 [ 362.956597][T16738] genl_rcv+0x29/0x40 [ 362.960583][T16738] netlink_unicast+0x531/0x710 [ 362.965380][T16738] ? netlink_attachskb+0x7c0/0x7c0 [ 362.970505][T16738] ? _copy_from_iter_full+0x25d/0x8c0 [ 362.975885][T16738] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 362.981629][T16738] ? __check_object_size+0x3d/0x437 [ 362.981653][T16738] netlink_sendmsg+0x8cf/0xda0 [ 362.981674][T16738] ? netlink_unicast+0x710/0x710 [ 362.996545][T16738] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 363.002099][T16738] ? apparmor_socket_sendmsg+0x2a/0x30 [ 363.002118][T16738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 363.002132][T16738] ? security_socket_sendmsg+0x8d/0xc0 [ 363.002151][T16738] ? netlink_unicast+0x710/0x710 [ 363.002173][T16738] sock_sendmsg+0xd7/0x130 [ 363.028627][T16738] ___sys_sendmsg+0x803/0x920 [ 363.033320][T16738] ? copy_msghdr_from_user+0x440/0x440 [ 363.038803][T16738] ? __kasan_check_read+0x11/0x20 [ 363.043840][T16738] ? __fget+0x37f/0x550 [ 363.043866][T16738] ? ksys_dup3+0x3e0/0x3e0 [ 363.052422][T16738] ? __fget_light+0x1a9/0x230 [ 363.057113][T16738] ? __fdget+0x1b/0x20 [ 363.061192][T16738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 363.067454][T16738] __sys_sendmsg+0x105/0x1d0 [ 363.072054][T16738] ? __sys_sendmsg_sock+0xd0/0xd0 [ 363.077107][T16738] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 363.082579][T16738] ? do_syscall_64+0x26/0x790 [ 363.087305][T16738] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:21:00 executing program 3: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 363.093380][T16738] ? do_syscall_64+0x26/0x790 [ 363.098095][T16738] __x64_sys_sendmsg+0x78/0xb0 [ 363.102882][T16738] do_syscall_64+0xfa/0x790 [ 363.107404][T16738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.113309][T16738] RIP: 0033:0x45a639 [ 363.117209][T16738] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 363.117217][T16738] RSP: 002b:00007f471caa1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 12:21:01 executing program 1: prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r2, r0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r5) r6 = socket$inet(0x2, 0x5cb0d76e4ce88f23, 0x22) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={r7, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000440)={r7, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000a80)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000000)=0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000040)={r7, 0xc8e, 0x9}, 0x8) 12:21:01 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 363.145248][T16738] RAX: ffffffffffffffda RBX: 00007f471caa1c90 RCX: 000000000045a639 [ 363.153232][T16738] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 363.161208][T16738] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 363.169179][T16738] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f471caa26d4 [ 363.177160][T16738] R13: 00000000004c8938 R14: 00000000004deff8 R15: 0000000000000004 12:21:01 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) remap_file_pages(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0xf9e, 0x40000) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) sendmsg$tipc(r3, &(0x7f0000000280)={&(0x7f0000000000)=@id={0x1e, 0x3, 0x0, {0x4e24, 0x3}}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="4ff162c24fbb0f971dc3eed40a7ce2a50ea2a02f038fb9aa46a395a6efcd9220cd876527045791485049dd66c71bde505c2534edfd67f9d2d567f4fc1dcebd85faefa99d75c95c593e3f28ec246eb859a95fbdb37a300f2ff46d05fd77d7c35f9838af1c4ce75bf1c20f915bd4ff53802835636f1c7825158215b8cc30d09b44b84c8c84fc5ada88d8ba293a3314c811f97eb7ac372a3b4361b2eafbc41b09dbbd26b402da7c4496e1fff8e6ff4e47", 0xaf}, {&(0x7f0000000180)="122fc89773601f7a889bf44a230c6cdee0a7ecb029cdf11e0975e7f25c2e05d9c6821b7e3cf24e1479966591371233f343d9da07b660c9d217908921a47fd7b725b54a66ec9abc5b20040867f10eb429d8b32345f79befb9c182f82a5852bbb8d98a2fd14973e5ed8a78a4ed0adb8e222bb2bbd37778eb93b819340fdb9588e0fb4b3944756185e35000f9ae0dfa3929747469933878d8841b5127849028b1facc2c3131f0676a2ab3015302c64d0de27fa8f2eb94e1", 0xb6}], 0x2, &(0x7f0000000240)="09b7dd5a6cec330d4a", 0x9, 0x4000000}, 0x4010008) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$PPPIOCSMRRU(r5, 0x4004743b, &(0x7f00000002c0)=0x9) 12:21:01 executing program 3: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:01 executing program 2: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:01 executing program 4 (fault-call:2 fault-nth:6): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) 12:21:01 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:21:01 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$KVM_REINJECT_CONTROL(r2, 0xae71, &(0x7f0000000000)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r3, r0, 0x0) 12:21:01 executing program 3: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 363.727056][T16781] FAULT_INJECTION: forcing a failure. [ 363.727056][T16781] name failslab, interval 1, probability 0, space 0, times 0 12:21:01 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) [ 363.790392][T16781] CPU: 0 PID: 16781 Comm: syz-executor.4 Not tainted 5.4.0-next-20191126-syzkaller #0 [ 363.799998][T16781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.800007][T16781] Call Trace: [ 363.800035][T16781] dump_stack+0x197/0x210 [ 363.800064][T16781] should_fail.cold+0xa/0x15 [ 363.822563][T16781] ? fault_create_debugfs_attr+0x180/0x180 [ 363.828384][T16781] ? ___might_sleep+0x163/0x2c0 [ 363.833236][T16781] __should_failslab+0x121/0x190 [ 363.833256][T16781] should_failslab+0x9/0x14 [ 363.833273][T16781] kmem_cache_alloc_node_trace+0x274/0x750 [ 363.833291][T16781] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 363.833304][T16781] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 363.833323][T16781] __kmalloc_node_track_caller+0x3d/0x70 [ 363.833343][T16781] __kmalloc_reserve.isra.0+0x40/0xf0 [ 363.833359][T16781] __alloc_skb+0x10b/0x5e0 [ 363.833377][T16781] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 363.842789][T16781] ? lock_downgrade+0x920/0x920 [ 363.842816][T16781] netlink_dump+0x71f/0xfb0 12:21:01 executing program 2: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 363.842833][T16781] ? netlink_broadcast+0x50/0x50 [ 363.842852][T16781] ? do_raw_spin_unlock+0x178/0x270 [ 363.842878][T16781] __netlink_dump_start+0x5b1/0x7d0 [ 363.842891][T16781] ? __netlink_ns_capable+0x104/0x140 [ 363.842914][T16781] ? seg6_genl_dumphmac_done+0x50/0x50 [ 363.854683][T16781] genl_rcv_msg+0xab1/0xea0 [ 363.854705][T16781] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 363.854730][T16781] ? seg6_genl_dumphmac_done+0x50/0x50 [ 363.886309][T16781] ? seg6_genl_dumphmac_start+0x1c0/0x1c0 [ 363.886324][T16781] ? lockdep_genl_is_held+0x30/0x30 [ 363.886351][T16781] ? mark_held_locks+0xf0/0xf0 [ 363.911494][T16781] ? find_held_lock+0x35/0x130 [ 363.911522][T16781] netlink_rcv_skb+0x177/0x450 [ 363.911537][T16781] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 363.911555][T16781] ? netlink_ack+0xb50/0xb50 [ 363.938967][T16781] ? __kasan_check_write+0x14/0x20 [ 363.938998][T16781] ? netlink_deliver_tap+0x24a/0xbe0 12:21:01 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)=0x137) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f00000000c0)=0x5, 0x4) r3 = dup(r0) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x8) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r5, r4, 0x0) [ 363.971288][T16795] mmap: syz-executor.0 (16795) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 363.974449][T16781] genl_rcv+0x29/0x40 [ 363.974476][T16781] netlink_unicast+0x531/0x710 [ 364.000787][T16781] ? netlink_attachskb+0x7c0/0x7c0 [ 364.005929][T16781] ? _copy_from_iter_full+0x25d/0x8c0 [ 364.011310][T16781] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 364.017042][T16781] ? __check_object_size+0x3d/0x437 [ 364.022264][T16781] netlink_sendmsg+0x8cf/0xda0 [ 364.027047][T16781] ? netlink_unicast+0x710/0x710 [ 364.027063][T16781] ? aa_sock_msg_perm.isra.0+0xba/0x170 12:21:01 executing program 2: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 364.027081][T16781] ? apparmor_socket_sendmsg+0x2a/0x30 [ 364.042983][T16781] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 364.042999][T16781] ? security_socket_sendmsg+0x8d/0xc0 [ 364.043019][T16781] ? netlink_unicast+0x710/0x710 [ 364.043036][T16781] sock_sendmsg+0xd7/0x130 [ 364.043051][T16781] ___sys_sendmsg+0x803/0x920 [ 364.043074][T16781] ? copy_msghdr_from_user+0x440/0x440 [ 364.054782][T16781] ? __kasan_check_read+0x11/0x20 [ 364.054801][T16781] ? __fget+0x37f/0x550 [ 364.054821][T16781] ? ksys_dup3+0x3e0/0x3e0 [ 364.054848][T16781] ? __fget_light+0x1a9/0x230 [ 364.054865][T16781] ? __fdget+0x1b/0x20 [ 364.096586][T16781] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 364.102844][T16781] __sys_sendmsg+0x105/0x1d0 [ 364.102862][T16781] ? __sys_sendmsg_sock+0xd0/0xd0 [ 364.102892][T16781] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 364.102905][T16781] ? do_syscall_64+0x26/0x790 [ 364.102924][T16781] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 364.102935][T16781] ? do_syscall_64+0x26/0x790 [ 364.102953][T16781] __x64_sys_sendmsg+0x78/0xb0 [ 364.102971][T16781] do_syscall_64+0xfa/0x790 [ 364.128799][T16781] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 364.128819][T16781] RIP: 0033:0x45a639 [ 364.148771][T16781] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 364.148780][T16781] RSP: 002b:00007f471caa1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 364.148795][T16781] RAX: ffffffffffffffda RBX: 00007f471caa1c90 RCX: 000000000045a639 12:21:02 executing program 3: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 364.148803][T16781] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 364.148817][T16781] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 364.172295][T16781] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f471caa26d4 [ 364.172305][T16781] R13: 00000000004c8938 R14: 00000000004deff8 R15: 0000000000000004 12:21:02 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x0) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:21:02 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xdb42, 0x400) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r4) r5 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={r6, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000440)={r6, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000a80)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], &(0x7f0000000000)=0x6b) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000000c0)={r6, @in={{0x2, 0x4e24, @broadcast}}, 0x9, 0x2}, 0x90) fcntl$dupfd(r1, 0x0, r0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r7, r0, 0x0) 12:21:02 executing program 4 (fault-call:2 fault-nth:7): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) 12:21:02 executing program 3: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:02 executing program 2: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:02 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) [ 364.794126][T16823] FAULT_INJECTION: forcing a failure. [ 364.794126][T16823] name failslab, interval 1, probability 0, space 0, times 0 [ 364.840396][T16823] CPU: 1 PID: 16823 Comm: syz-executor.4 Not tainted 5.4.0-next-20191126-syzkaller #0 [ 364.849981][T16823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.860037][T16823] Call Trace: [ 364.863342][T16823] dump_stack+0x197/0x210 [ 364.867692][T16823] should_fail.cold+0xa/0x15 [ 364.872302][T16823] ? fault_create_debugfs_attr+0x180/0x180 [ 364.878138][T16823] __should_failslab+0x121/0x190 [ 364.883095][T16823] should_failslab+0x9/0x14 [ 364.887606][T16823] kmem_cache_alloc+0x47/0x710 [ 364.892389][T16823] ? lock_acquire+0x190/0x410 [ 364.897082][T16823] ? netlink_deliver_tap+0x146/0xbe0 [ 364.902379][T16823] skb_clone+0x154/0x3d0 [ 364.906636][T16823] netlink_deliver_tap+0x943/0xbe0 [ 364.911753][T16823] ? skb_put+0x177/0x1d0 [ 364.916007][T16823] __netlink_sendskb+0x62/0xc0 [ 364.920771][T16823] netlink_dump+0xc4e/0xfb0 [ 364.925280][T16823] ? netlink_broadcast+0x50/0x50 [ 364.930218][T16823] ? do_raw_spin_unlock+0x178/0x270 [ 364.935432][T16823] __netlink_dump_start+0x5b1/0x7d0 [ 364.940991][T16823] ? __netlink_ns_capable+0x104/0x140 [ 364.946355][T16823] ? seg6_genl_dumphmac_done+0x50/0x50 [ 364.951835][T16823] genl_rcv_msg+0xab1/0xea0 [ 364.956350][T16823] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 364.962683][T16823] ? seg6_genl_dumphmac_done+0x50/0x50 [ 364.968145][T16823] ? seg6_genl_dumphmac_start+0x1c0/0x1c0 [ 364.973863][T16823] ? lockdep_genl_is_held+0x30/0x30 [ 364.979083][T16823] ? mark_held_locks+0xf0/0xf0 [ 364.983856][T16823] ? find_held_lock+0x35/0x130 [ 364.988632][T16823] netlink_rcv_skb+0x177/0x450 [ 364.993486][T16823] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 364.999822][T16823] ? netlink_ack+0xb50/0xb50 [ 365.004412][T16823] ? __kasan_check_write+0x14/0x20 [ 365.009533][T16823] ? netlink_deliver_tap+0x24a/0xbe0 [ 365.014828][T16823] genl_rcv+0x29/0x40 [ 365.018821][T16823] netlink_unicast+0x531/0x710 [ 365.023579][T16823] ? netlink_attachskb+0x7c0/0x7c0 [ 365.023610][T16823] ? _copy_from_iter_full+0x25d/0x8c0 [ 365.023626][T16823] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 365.023647][T16823] ? __check_object_size+0x3d/0x437 [ 365.044997][T16823] netlink_sendmsg+0x8cf/0xda0 [ 365.049779][T16823] ? netlink_unicast+0x710/0x710 [ 365.054720][T16823] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 365.054739][T16823] ? apparmor_socket_sendmsg+0x2a/0x30 [ 365.054759][T16823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 365.071969][T16823] ? security_socket_sendmsg+0x8d/0xc0 [ 365.071987][T16823] ? netlink_unicast+0x710/0x710 [ 365.072006][T16823] sock_sendmsg+0xd7/0x130 [ 365.072023][T16823] ___sys_sendmsg+0x803/0x920 [ 365.072047][T16823] ? copy_msghdr_from_user+0x440/0x440 [ 365.096939][T16823] ? __kasan_check_read+0x11/0x20 [ 365.101981][T16823] ? __fget+0x37f/0x550 [ 365.106155][T16823] ? ksys_dup3+0x3e0/0x3e0 [ 365.110585][T16823] ? __fget_light+0x1a9/0x230 [ 365.115268][T16823] ? __fdget+0x1b/0x20 [ 365.119349][T16823] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 365.125599][T16823] __sys_sendmsg+0x105/0x1d0 [ 365.130197][T16823] ? __sys_sendmsg_sock+0xd0/0xd0 [ 365.135242][T16823] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 365.140706][T16823] ? do_syscall_64+0x26/0x790 [ 365.145388][T16823] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.151457][T16823] ? do_syscall_64+0x26/0x790 [ 365.156145][T16823] __x64_sys_sendmsg+0x78/0xb0 [ 365.160914][T16823] do_syscall_64+0xfa/0x790 [ 365.165863][T16823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.171766][T16823] RIP: 0033:0x45a639 [ 365.175663][T16823] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 365.195271][T16823] RSP: 002b:00007f471caa1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 365.203692][T16823] RAX: ffffffffffffffda RBX: 00007f471caa1c90 RCX: 000000000045a639 [ 365.211671][T16823] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 365.219637][T16823] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 365.219650][T16823] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f471caa26d4 12:21:02 executing program 3: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:02 executing program 3: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:02 executing program 2: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:02 executing program 3: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:03 executing program 2: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:03 executing program 3: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 365.235574][T16823] R13: 00000000004c8938 R14: 00000000004deff8 R15: 0000000000000004 12:21:03 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) setxattr$smack_xattr_label(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64IPOUT\x00', &(0x7f00000000c0)={'/dev/ppp\x00'}, 0xa, 0x1) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:21:03 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40485404, &(0x7f0000000000)={{0x1, 0x0, 0x47be0c58}, 0x81, 0x2}) dup3(r1, r0, 0x0) 12:21:03 executing program 2: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:03 executing program 4 (fault-call:2 fault-nth:8): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) 12:21:03 executing program 3: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:03 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:21:03 executing program 3: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:03 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000000)={0x40, 0x2, 0x1, {}, 0xd3, 0x13}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r3, r2, 0x0) [ 365.897192][T16864] FAULT_INJECTION: forcing a failure. [ 365.897192][T16864] name failslab, interval 1, probability 0, space 0, times 0 [ 365.949622][T16864] CPU: 0 PID: 16864 Comm: syz-executor.4 Not tainted 5.4.0-next-20191126-syzkaller #0 [ 365.959198][T16864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.969256][T16864] Call Trace: [ 365.969280][T16864] dump_stack+0x197/0x210 [ 365.969303][T16864] should_fail.cold+0xa/0x15 [ 365.969324][T16864] ? fault_create_debugfs_attr+0x180/0x180 [ 365.969358][T16864] __should_failslab+0x121/0x190 [ 365.976957][T16864] should_failslab+0x9/0x14 [ 365.976984][T16864] kmem_cache_alloc+0x47/0x710 [ 365.992264][T16864] ? lock_acquire+0x190/0x410 [ 365.992279][T16864] ? netlink_deliver_tap+0x146/0xbe0 [ 365.992301][T16864] skb_clone+0x154/0x3d0 [ 366.006191][T16864] netlink_deliver_tap+0x943/0xbe0 [ 366.006208][T16864] ? skb_put+0x177/0x1d0 [ 366.006228][T16864] __netlink_sendskb+0x62/0xc0 [ 366.029794][T16864] netlink_dump+0xc4e/0xfb0 [ 366.034305][T16864] ? netlink_broadcast+0x50/0x50 [ 366.039241][T16864] ? do_raw_spin_unlock+0x178/0x270 [ 366.039272][T16864] __netlink_dump_start+0x5b1/0x7d0 12:21:03 executing program 2: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:03 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f00000002c0)=0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000200)=0x39cc, 0x8) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2ae, 0x3}}, 0x20) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000100)=@v1={0x0, @aes128, 0x1, "0af1bacfd5bfb9bc"}) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000240)={'ifb0\x00', {0x2, 0x4e24, @empty}}) write$RDMA_USER_CM_CMD_DISCONNECT(r5, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r6}}, 0xc) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000001c0)="100000400300"/16, 0x40000010}]) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x200, 0x0) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x0, 0x0) dup3(r8, r7, 0x0) [ 366.039289][T16864] ? __netlink_ns_capable+0x104/0x140 [ 366.055007][T16864] ? seg6_genl_dumphmac_done+0x50/0x50 [ 366.063857][T16864] genl_rcv_msg+0xab1/0xea0 [ 366.068365][T16864] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 366.074964][T16864] ? seg6_genl_dumphmac_done+0x50/0x50 [ 366.074979][T16864] ? seg6_genl_dumphmac_start+0x1c0/0x1c0 [ 366.074990][T16864] ? lockdep_genl_is_held+0x30/0x30 [ 366.075014][T16864] ? mark_held_locks+0xf0/0xf0 [ 366.075032][T16864] ? find_held_lock+0x35/0x130 [ 366.100851][T16864] netlink_rcv_skb+0x177/0x450 [ 366.100868][T16864] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 366.100886][T16864] ? netlink_ack+0xb50/0xb50 [ 366.100903][T16864] ? __kasan_check_write+0x14/0x20 [ 366.100923][T16864] ? netlink_deliver_tap+0x24a/0xbe0 [ 366.100941][T16864] genl_rcv+0x29/0x40 [ 366.121664][T16864] netlink_unicast+0x531/0x710 [ 366.121685][T16864] ? netlink_attachskb+0x7c0/0x7c0 [ 366.121700][T16864] ? _copy_from_iter_full+0x25d/0x8c0 [ 366.121716][T16864] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 366.121729][T16864] ? __check_object_size+0x3d/0x437 [ 366.121748][T16864] netlink_sendmsg+0x8cf/0xda0 [ 366.135739][T16864] ? netlink_unicast+0x710/0x710 [ 366.135755][T16864] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 366.135773][T16864] ? apparmor_socket_sendmsg+0x2a/0x30 [ 366.151929][T16864] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 366.183995][T16864] ? security_socket_sendmsg+0x8d/0xc0 [ 366.189468][T16864] ? netlink_unicast+0x710/0x710 [ 366.194441][T16864] sock_sendmsg+0xd7/0x130 12:21:04 executing program 2: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 366.198857][T16864] ___sys_sendmsg+0x803/0x920 [ 366.198878][T16864] ? copy_msghdr_from_user+0x440/0x440 [ 366.198905][T16864] ? __kasan_check_read+0x11/0x20 [ 366.214036][T16864] ? __fget+0x37f/0x550 [ 366.218208][T16864] ? ksys_dup3+0x3e0/0x3e0 [ 366.222640][T16864] ? __fget_light+0x1a9/0x230 [ 366.227324][T16864] ? __fdget+0x1b/0x20 [ 366.231407][T16864] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 366.237653][T16864] __sys_sendmsg+0x105/0x1d0 [ 366.237672][T16864] ? __sys_sendmsg_sock+0xd0/0xd0 [ 366.237700][T16864] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 366.252737][T16864] ? do_syscall_64+0x26/0x790 [ 366.257431][T16864] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.263504][T16864] ? do_syscall_64+0x26/0x790 [ 366.263526][T16864] __x64_sys_sendmsg+0x78/0xb0 [ 366.263542][T16864] do_syscall_64+0xfa/0x790 [ 366.263560][T16864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.263571][T16864] RIP: 0033:0x45a639 [ 366.263585][T16864] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 366.263598][T16864] RSP: 002b:00007f471caa1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 366.283370][T16864] RAX: ffffffffffffffda RBX: 00007f471caa1c90 RCX: 000000000045a639 [ 366.283379][T16864] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 366.283387][T16864] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 366.283395][T16864] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f471caa26d4 12:21:04 executing program 3: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 366.283403][T16864] R13: 00000000004c8938 R14: 00000000004deff8 R15: 0000000000000004 12:21:04 executing program 2: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:04 executing program 4 (fault-call:2 fault-nth:9): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) 12:21:04 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x120000, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) poll(&(0x7f0000000000)=[{}, {}, {r1}, {}, {}], 0x20000000000000da, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) dup3(r0, r5, 0x0) 12:21:04 executing program 3: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:04 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:21:04 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r6) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) dup3(r1, r7, 0x0) write(r1, 0x0, 0x0) 12:21:04 executing program 2: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) 12:21:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:04 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) dup3(r0, r2, 0x0) 12:21:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0xf, r1, 0x301}, 0x14}}, 0x0) 12:21:05 executing program 2: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x9, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 367.095436][T16920] BPF:Unsupported version [ 367.101610][T16920] BPF:Unsupported version 12:21:05 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, 0x0) write(r1, 0x0, 0x1000000) 12:21:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0xc0, r1, 0x301}, 0x14}}, 0x0) 12:21:05 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) [ 367.269653][T16936] BPF:Unsupported version [ 367.316751][T16936] BPF:Unsupported version 12:21:05 executing program 2: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:05 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 12:21:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0xec0, r1, 0x301}, 0x14}}, 0x0) 12:21:05 executing program 2: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:05 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000040)={0x4, r3}) fcntl$setown(r1, 0x8, r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r4, 0x4004743d, &(0x7f0000000c00)=""/246) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(r6, 0x405c5503, &(0x7f0000000100)={{0x100, 0x3, 0x39, 0x400}, 'syz0\x00', 0x2f}) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) getsockopt$bt_BT_DEFER_SETUP(r8, 0x12, 0x7, 0x0, &(0x7f0000000040)) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r9) r10 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x84001, 0x0) dup3(r10, r9, 0x80000) r11 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r11) write(r11, 0x0, 0x324) 12:21:05 executing program 2: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:05 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, 0x0) write(r1, 0x0, 0x1000000) [ 367.641462][T16960] BPF:Unsupported version [ 367.659456][T16960] BPF:Unsupported version 12:21:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x33fe0, r1, 0x301}, 0x14}}, 0x0) 12:21:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x25, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:05 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x41080, 0x0) getsockopt$inet6_dccp_buf(r2, 0x21, 0x2, &(0x7f0000000100)=""/48, &(0x7f0000000140)=0x30) r3 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x4, 0x8000) ioctl$VIDIOC_G_CROP(r3, 0xc014563b, &(0x7f0000000040)={0x6, {0x7ff, 0x1457, 0x77, 0x2b5}}) dup3(r1, r0, 0x0) [ 367.883855][T16979] BPF:Unsupported version [ 367.896548][T16979] BPF:Unsupported version 12:21:05 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) dup3(r0, 0xffffffffffffffff, 0x0) r1 = semget(0x3, 0x3, 0x200) semctl$IPC_RMID(r1, 0x0, 0x0) semctl$IPC_INFO(r1, 0x0, 0x3, &(0x7f0000000000)=""/73) 12:21:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x29, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:05 executing program 2: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x7ffff, r1, 0x301}, 0x14}}, 0x0) [ 368.009204][T16987] BPF:Unsupported version [ 368.019405][T16987] BPF:Unsupported version 12:21:06 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, 0x0) write(r1, 0x0, 0x1000000) 12:21:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x63, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 368.264139][T17008] BPF:Unsupported version [ 368.276675][T17008] BPF:Unsupported version 12:21:06 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCAX25DELFWD(r3, 0x89eb, &(0x7f0000000140)={@null, @default}) r4 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$PIO_CMAP(r4, 0x4b71, &(0x7f0000000000)={0x7, 0x10fb, 0x8, 0xffffffffffffffc0, 0xe, 0x8001}) dup3(r1, r0, 0x0) ioctl$IMCLEAR_L2(r4, 0x80044946, &(0x7f00000000c0)=0x1) 12:21:06 executing program 2: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x20000194, r1, 0x301}, 0x14}}, 0x0) 12:21:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:06 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@mcast1, @in=@empty}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000000)=0xe8) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0xff4f) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x8, 0x80000000, 0x1ff, 0x7, 0x294, 0x1, 0x2, [], r4, r6, 0x2, 0x3}, 0x3c) r7 = dup3(r1, r0, 0x0) ioctl$KDSKBMODE(r7, 0x4b45, &(0x7f0000000040)=0x7bff) write(r1, 0x0, 0x0) 12:21:06 executing program 2: bpf$BPF_BTF_LOAD(0x28, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x7ffff000, r1, 0x301}, 0x14}}, 0x0) [ 368.463152][T17021] BPF:[1] DATASEC [ 368.468870][T17021] BPF:size=3436 vlen=1 [ 368.487817][T17021] BPF: [ 368.497406][T17021] BPF:Invalid name 12:21:06 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000180)=@keyring={'key_or_keyring:'}) keyctl$invalidate(0x15, r3) [ 368.539160][T17021] BPF: [ 368.539160][T17021] 12:21:06 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(0xffffffffffffffff, 0x0, 0x1000000) [ 368.559419][T17021] BPF:[1] DATASEC [ 368.578711][T17021] BPF:size=3436 vlen=1 [ 368.621809][T17021] BPF: [ 368.624696][T17021] BPF:Invalid name [ 368.641467][T17021] BPF: [ 368.641467][T17021] 12:21:06 executing program 2: bpf$BPF_BTF_LOAD(0x2c, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0xfffffdef, r1, 0x301}, 0x14}}, 0x0) 12:21:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:06 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101000, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x42, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000040)=0x54) dup3(r1, r0, 0x0) [ 368.813843][T17045] BPF:Unsupported flags 12:21:06 executing program 2: bpf$BPF_BTF_LOAD(0x2f, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 368.848872][T17045] BPF:Unsupported flags 12:21:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:06 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(0xffffffffffffffff, 0x0, 0x1000000) [ 369.003558][T17058] BPF:Unsupported flags [ 369.034327][T17058] BPF:Unsupported flags 12:21:07 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa6784, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:21:07 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/eev/ppp\x00', 0x101080, 0x0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000001000)='\xfb\xe0!\x85\a\x16,\xd1', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000180)=@keyring={'key_or_keyring:'}) keyctl$link(0x8, r2, r4) dup3(r1, r0, 0x0) 12:21:07 executing program 2: bpf$BPF_BTF_LOAD(0x34, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x302}, 0x14}}, 0x0) 12:21:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:07 executing program 2: bpf$BPF_BTF_LOAD(0x8d, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:07 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x42000, 0x0) dup3(r1, r0, 0x0) [ 369.242507][T17077] BPF:Unsupported flags 12:21:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x304}, 0x14}}, 0x0) [ 369.279983][T17077] BPF:Unsupported flags 12:21:07 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(0xffffffffffffffff, 0x0, 0x1000000) 12:21:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:07 executing program 2: bpf$BPF_BTF_LOAD(0x7ffff, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:07 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r5) r6 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={r7, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000440)={r7, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000a80)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000000)=0x6b) getsockopt$inet_sctp_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f00000000c0)={r7, 0x9, 0x589d, 0xff, 0x9, 0x101, 0x400, 0x3, {0x0, @in6={{0xa, 0x4e24, 0x5, @mcast2, 0xfb}}, 0x1ff, 0xb1, 0x3, 0x1, 0x7b309e0e}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x5, 0x3, 0x15d0f2ee804fb4e3, 0x9, 0x6, 0x81, 0xff, 0x1, r8}, 0x20) [ 369.495176][T17095] BPF:Unsupported flags [ 369.520839][T17095] BPF:Unsupported flags 12:21:07 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f00000000c0)=""/239) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:21:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x308}, 0x14}}, 0x0) 12:21:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:07 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) kexec_load(0xffff, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000180)="92f1793ed9fef6fb0887667773b6aedbda64737e426212f6ae94f2e6855381e370231e0b4f", 0x25, 0xfff, 0x5}], 0x9a33f482df913cff) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000040)={'bridge_slave_1\x00', {0x2, 0x4e20, @remote}}) dup3(r3, r2, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r9 = dup(r8) getsockopt$bt_BT_DEFER_SETUP(r9, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$CAN_RAW_RECV_OWN_MSGS(r9, 0x65, 0x4, &(0x7f0000000000), 0x4) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5c4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000200)={r10, 0x5b}, 0x8) r11 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r12 = dup(r11) getsockopt$bt_BT_DEFER_SETUP(r12, 0x12, 0x7, 0x0, &(0x7f0000000040)) r13 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r14 = dup(r13) getsockopt$bt_BT_DEFER_SETUP(r14, 0x12, 0x7, 0x0, &(0x7f0000000040)) r15 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r16 = dup(r15) getsockopt$bt_BT_DEFER_SETUP(r16, 0x12, 0x7, 0x0, &(0x7f0000000040)) r17 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r18 = dup(r17) getsockopt$bt_BT_DEFER_SETUP(r18, 0x12, 0x7, 0x0, &(0x7f0000000040)) r19 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r20 = dup(r19) getsockopt$bt_BT_DEFER_SETUP(r20, 0x12, 0x7, 0x0, &(0x7f0000000040)) r21 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r22 = dup(r21) getsockopt$bt_BT_DEFER_SETUP(r22, 0x12, 0x7, 0x0, &(0x7f0000000040)) r23 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r24 = dup(r23) getsockopt$bt_BT_DEFER_SETUP(r24, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000280)={0x0, 0x7, [{r14, 0x0, 0xfffffffffffff000}, {r16, 0x0, 0x10000, 0xfffff000}, {r18, 0x0, 0xfffffffff0000000, 0x8000}, {r20, 0x0, 0x8000, 0x2000}, {r22, 0x0, 0xfffff000, 0x100000000}, {r5, 0x0, 0x2000, 0xfffff000}, {r24, 0x0, 0xfffffffffffff000, 0x2000}]}) r25 = getpgrp(0xffffffffffffffff) r26 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r27) ioctl$DRM_IOCTL_GET_CLIENT(r12, 0xc0286405, &(0x7f0000000080)={0x6, 0x765, r25, 0x0, r27, 0x0, 0x38da000}) [ 369.828040][T17114] BPF:Unsupported flags 12:21:07 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) [ 369.871114][T17113] BPF:Unsupported version [ 369.887654][T17114] BPF:Unsupported flags [ 369.896704][T17113] BPF:Unsupported version 12:21:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) 12:21:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x9, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:07 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x200, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f00000000c0)="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") 12:21:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x2}, 0x14}}, 0x0) [ 370.105719][T17136] BPF:Unsupported version [ 370.119360][T17137] BPF:Unsupported flags [ 370.134555][T17137] BPF:Unsupported flags [ 370.147274][T17136] BPF:Unsupported version 12:21:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 370.272988][T17149] BPF:Unsupported flags [ 370.324284][T17149] BPF:Unsupported flags 12:21:08 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) prctl$PR_GET_TIMERSLACK(0x1e) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400020}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="0cff03004d7a65a3af965e8dd802ede0ad30d8a61bb8871b4cbc7cc8341bf85f8aea625c9f23239d226be3b1d3aa13c2bdbb1e39b8a2cb2b4329ea9d2592a4589597b1dabc64e3ff8e8bc3a660897b3f9c277f51467e4b64e638fa47b87033f621c0c00c0ce76fb4013521139ed7fab0d9368937aa276757c1d781a089fa29710176b968016bfd70e4cf175b8e1150e7b3e2f313111c69f323c1a622b196da2192d8d95a4f03f4e1", @ANYRES16=r4, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x80}, 0x801) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:21:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:08 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(r7, 0x29, 0x1b, &(0x7f0000000200)={@remote, 0x0}, &(0x7f0000000240)=0x14) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000280)={r8, 0x1, 0x6, @dev={[], 0x11}}, 0x10) r9 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r9, 0x12, 0x7, 0x0, &(0x7f0000000040)) accept$netrom(r9, &(0x7f00000000c0)={{0x3, @null}, [@netrom, @netrom, @netrom, @null, @remote, @default, @netrom, @null]}, &(0x7f0000000040)=0x48) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000000)={0x3, 0x4, 0x6, 0x6}, 0x6) 12:21:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x4}, 0x14}}, 0x0) 12:21:08 executing program 5 (fault-call:4 fault-nth:0): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:21:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x18, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 370.512749][T17165] BPF:Unsupported flags [ 370.518556][T17166] BPF:Unsupported version [ 370.537974][T17165] BPF:Unsupported flags [ 370.542925][T17166] BPF:Unsupported version [ 370.549408][T17163] FAULT_INJECTION: forcing a failure. [ 370.549408][T17163] name failslab, interval 1, probability 0, space 0, times 0 12:21:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xa}, 0x14}}, 0x0) 12:21:08 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = gettid() clone3(&(0x7f0000000140)={0xa000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)=0x0, 0x7, 0x0, &(0x7f0000000100)=""/8, 0x8, &(0x7f0000000940)=""/4096}, 0x40) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r5) kcmp(r3, r4, 0x5, r2, r5) [ 370.612898][T17163] CPU: 0 PID: 17163 Comm: syz-executor.5 Not tainted 5.4.0-next-20191126-syzkaller #0 [ 370.622487][T17163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.632547][T17163] Call Trace: [ 370.635973][T17163] dump_stack+0x197/0x210 [ 370.640322][T17163] should_fail.cold+0xa/0x15 [ 370.644935][T17163] ? fault_create_debugfs_attr+0x180/0x180 [ 370.650757][T17163] ? ___might_sleep+0x163/0x2c0 [ 370.655619][T17163] __should_failslab+0x121/0x190 [ 370.660560][T17163] should_failslab+0x9/0x14 [ 370.660584][T17163] kmem_cache_alloc_node+0x268/0x740 [ 370.660605][T17163] ? __mutex_lock+0x458/0x13c0 [ 370.660627][T17163] __alloc_skb+0xd5/0x5e0 [ 370.660647][T17163] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 370.660661][T17163] ? __fget+0x37f/0x550 [ 370.660685][T17163] ppp_write+0x9f/0x2b0 [ 370.660700][T17163] __vfs_write+0x8a/0x110 [ 370.660715][T17163] ? ppp_start_xmit+0x590/0x590 [ 370.702508][T17163] vfs_write+0x268/0x5d0 [ 370.706775][T17163] ksys_write+0x14f/0x290 [ 370.711120][T17163] ? __ia32_sys_read+0xb0/0xb0 [ 370.715900][T17163] ? do_syscall_64+0x26/0x790 [ 370.720592][T17163] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 370.726663][T17163] ? do_syscall_64+0x26/0x790 [ 370.731356][T17163] __x64_sys_write+0x73/0xb0 [ 370.735959][T17163] do_syscall_64+0xfa/0x790 [ 370.740478][T17163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 370.746367][T17163] RIP: 0033:0x45a639 12:21:08 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40)=[{{&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/236, 0xec}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000280)=""/51, 0x33}, {&(0x7f00000002c0)=""/52, 0x34}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/105, 0x69}], 0x6, &(0x7f0000000480)=""/75, 0x4b}, 0x6}, {{&(0x7f0000000500)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000580)=""/218, 0xda}, {&(0x7f0000000680)=""/113, 0x71}, {&(0x7f0000000700)=""/240, 0xf0}, {&(0x7f0000000800)=""/75, 0x4b}], 0x4, &(0x7f0000000940)=""/240, 0xf0}, 0x4}, {{&(0x7f0000000a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000ac0)=""/117, 0x75}], 0x1}, 0x8}, {{&(0x7f0000000b40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000bc0), 0x0, &(0x7f0000000c00)=""/15, 0xf}, 0x81a6}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000c40)=""/145, 0x91}], 0x1}, 0xb968}], 0x5, 0x4d38f4e9bd27b6b, &(0x7f0000000e80)) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000ec0), &(0x7f0000000f00)=0x4) r2 = dup(r0) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r4, 0xc0046686, &(0x7f0000001040)=ANY=[@ANYBLOB="01000e2e85c0dd000000807351"]) r5 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000f40)={0x767ad1a123fc2f4, @sliced={0x9, [0x3, 0x36c9, 0xff, 0x7, 0x8, 0x7, 0x1, 0x5, 0x400, 0xaf4a, 0x6, 0x4, 0x5, 0x1, 0x97f7, 0x7ae4, 0x1, 0x5, 0xfff, 0x9, 0x200, 0x31, 0x2, 0x3, 0x81, 0x1, 0x5, 0x3147, 0x6, 0x7, 0xa291, 0x1, 0xf2ec, 0xffff, 0x3, 0x2e4f, 0x3ff, 0x8, 0x9, 0x101, 0x8, 0x7fff, 0xf993, 0x3, 0x2, 0x9, 0x612, 0x5], 0x8000}}) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000000)=0xc006) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) [ 370.750260][T17163] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 370.769882][T17163] RSP: 002b:00007efc17ea7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 370.778287][T17163] RAX: ffffffffffffffda RBX: 00007efc17ea7c90 RCX: 000000000045a639 [ 370.786255][T17163] RDX: 0000000001000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 370.794218][T17163] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 370.794227][T17163] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efc17ea86d4 12:21:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x1b, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1d, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 370.794235][T17163] R13: 00000000004c7158 R14: 00000000004e2ac0 R15: 0000000000000005 [ 370.858657][T17182] BPF:Unsupported flags [ 370.869253][T17183] BPF:Unsupported version [ 370.874372][T17182] BPF:Unsupported flags [ 370.879198][T17183] BPF:Unsupported version 12:21:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x2e, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 371.014215][T17191] BPF:Unsupported flags [ 371.028185][T17191] BPF:Unsupported flags 12:21:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x25, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xe}, 0x14}}, 0x0) 12:21:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:09 executing program 1: getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000040)=0x8) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 12:21:09 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f00000002c0)=""/250) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x1000, 0x7, 0x78af, 0x1}, 0x14) 12:21:09 executing program 5 (fault-call:4 fault-nth:1): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:21:09 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x84e01) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000000)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 12:21:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xf}, 0x14}}, 0x0) [ 371.325355][T17209] BPF:Unsupported version [ 371.331665][T17210] BPF:Unsupported flags [ 371.348127][T17210] BPF:Unsupported flags [ 371.349993][T17209] BPF:Unsupported version 12:21:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x28, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 371.516007][T17221] BPF:Unsupported flags [ 371.548719][T17221] BPF:Unsupported flags 12:21:09 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:21:09 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x141001, 0x0) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000040)) r2 = socket$bt_cmtp(0x1f, 0x3, 0x5) dup3(r2, r0, 0x81ee9c12abeeb82d) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23, @empty}}, 0xcae, 0x6, 0x2, 0xfffffff8, 0x2}, &(0x7f0000000180)=0x98) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r6) r7 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={r8, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000440)={r8, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000a80)=ANY=[@ANYRES32=r8, @ANYBLOB="630000005a4880de517842d213f542ba7a239e3c4bc193d9bc9a4e5b1a045f7b5e0d7e94deaec557d767a615d362be6e865725bcc71b86224548be734c5858c3464551d868f9edfda138a69b6571442dd87bdacf856acc433bd005137601e7695732d1cfa0e32efa0e2196d48face1f91d8f9ebe87ab02914123ee6375ae3ea4e5686686cb4035d629854cb6298e96c617f66873e76cdad2be7a733bc4d4bef7362580c811d62bf8e198d9e8da560079a8caf8238c374f74d813221815d54a7478774262710348cf810505a917630f6b770a8ac15c0a846589720374e76cdfa875601476668b5a6f7edd920b099aae144b6431cc8648bb367caf7c654506d1e4a4148e32cf856699a024f0f7b9a0626a2a1118bf93bd9ab18b7c6be896af7c9055ce7ca5f6"], &(0x7f0000000000)=0x6b) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f00000001c0)={r5, 0x0, 0x5c7, 0x7, 0x9, 0x1a23, 0x1, 0x94, {r8, @in6={{0xa, 0x4e23, 0x0, @remote, 0x800}}, 0x5, 0x0, 0x8, 0x1, 0x2}}, &(0x7f0000000280)=0xb0) [ 371.574435][T17229] BPF:Unsupported version 12:21:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x5f, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x60}, 0x14}}, 0x0) [ 371.627394][T17229] BPF:Unsupported version 12:21:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x2c, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 371.774575][T17243] BPF:Unsupported flags 12:21:09 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/252) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000040)='/dev/ppp\x00') r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r2, r0, 0x0) write(r2, 0x0, 0x0) [ 371.798558][T17243] BPF:Unsupported flags 12:21:09 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = socket$inet(0x2, 0x0, 0x7f) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r2) dup3(r1, r2, 0x80000) setsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, &(0x7f0000000000), 0x4) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x101080, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @ioapic={0x1000, 0x2, 0x40, 0x9, 0x0, [{0xdf, 0x70, 0x6, [], 0x4b}, {0x0, 0x4, 0xce, [], 0x8}, {0x0, 0x1f, 0x7, [], 0xfa}, {0x40, 0x40, 0x0, [], 0xf9}, {0xfd, 0x20, 0x40, [], 0x40}, {0x1, 0x63, 0x5, [], 0x7}, {0x62, 0xe1, 0x7}, {0x3, 0x0, 0x1, [], 0x2}, {0x8, 0x1, 0x2, [], 0x7f}, {0x4, 0x7f, 0x9}, {0x80, 0x7, 0x3, [], 0x74}, {0xe2, 0xfd, 0x0, [], 0x80}, {0x81, 0xbb, 0x5, [], 0x7}, {0x92, 0x40, 0x1f, [], 0x2}, {0x5, 0x3f, 0x4, [], 0x1}, {0x7f, 0x3f, 0x8d, [], 0x5}, {0xc7, 0x49, 0x6, [], 0x35}, {0x5, 0x7, 0x3, [], 0x80}, {0x80, 0x1, 0xc4, [], 0x3}, {0x8, 0x2, 0x1c, [], 0x5}, {0x6, 0x7, 0x9}, {0xff, 0xfc, 0x1f, [], 0x7f}, {0xe1, 0xa2, 0x1, [], 0x5}, {0x4, 0xfd, 0x1, [], 0x3}]}}) 12:21:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xf0}, 0x14}}, 0x0) [ 371.882382][T17247] BPF:Unsupported version 12:21:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 371.933415][T17247] BPF:Unsupported version 12:21:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x2f, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x2ea}, 0x14}}, 0x0) [ 372.038410][T17263] QAT: Invalid ioctl [ 372.044276][T17262] BPF:Unsupported flags 12:21:10 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1004000) [ 372.096129][T17267] BPF:Unsupported version [ 372.102235][T17267] BPF:Unsupported version [ 372.128978][T17263] QAT: Invalid ioctl 12:21:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x34, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xa00}, 0x14}}, 0x0) 12:21:10 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0xff4f) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r3}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x84340, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r3, 0x15, r4, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0xd, 0xfd20}, 0x10}, 0x70) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r5, r0, 0x0) [ 372.315621][T17282] BPF:Unsupported flags 12:21:10 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x111000, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f00000000c0)=""/258) r3 = socket$bt_hidp(0x1f, 0x3, 0x6) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) dup2(r3, r5) getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f0000000200)=0x4) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) [ 372.342010][T17284] BPF:Unsupported version [ 372.366652][T17284] BPF:Unsupported version [ 372.380132][T17282] BPF:Unsupported flags 12:21:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x63, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xe00}, 0x14}}, 0x0) 12:21:10 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) [ 372.608937][T17304] BPF:Unsupported flags 12:21:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x8d, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 372.643997][T17304] BPF:Unsupported flags [ 372.652082][T17306] BPF:Unsupported version [ 372.667864][T17306] BPF:Unsupported version 12:21:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xec0}, 0x14}}, 0x0) 12:21:10 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x40000000) 12:21:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:10 executing program 1: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x81, 0x2040) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) [ 372.831610][T17318] BPF:Unsupported version [ 372.867629][T17318] BPF:Unsupported version [ 372.899759][T17324] BPF:Unsupported flags 12:21:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xf00}, 0x14}}, 0x0) [ 372.929109][T17324] BPF:Unsupported flags 12:21:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 373.077693][T17335] BPF:[1] DATASEC (anon) [ 373.096793][T17335] BPF:size=3436 vlen=1 12:21:11 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x14000) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000040)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000640)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r2, r1, 0x0) write(r2, 0x0, 0x0) 12:21:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xbe, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:11 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$inet6_dccp_buf(r1, 0x21, 0x80, &(0x7f0000000940)=""/4096, &(0x7f0000000000)=0x1000) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/\x87kv/ppp\x00', 0x800, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r3, r2, 0x0) 12:21:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x3f00}, 0x14}}, 0x0) [ 373.136679][T17335] BPF: [ 373.139584][T17335] BPF:Invalid name [ 373.144997][T17335] BPF: [ 373.144997][T17335] [ 373.152109][T17335] BPF:[1] DATASEC (anon) [ 373.168094][T17335] BPF:size=3436 vlen=1 [ 373.179942][T17335] BPF: [ 373.190233][T17342] BPF:Unsupported flags [ 373.209191][T17342] BPF:Unsupported flags 12:21:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0xb, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 373.242506][T17335] BPF:Invalid name [ 373.262609][T17335] BPF: [ 373.262609][T17335] 12:21:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x4000}, 0x14}}, 0x0) 12:21:11 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='\x00\xd7\x00\xe8\xff\x00', 0xc0240, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) [ 373.411867][T17357] BPF:Unsupported section found [ 373.450975][T17357] BPF:Unsupported section found 12:21:11 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0xb4010000) 12:21:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:11 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x4c41) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f00000000c0)=0x2) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) chmod(&(0x7f0000000000)='./file0\x00', 0x2) dup3(r2, r0, 0x0) 12:21:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x6000}, 0x14}}, 0x0) 12:21:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x1b, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 373.595999][T17371] BPF:Unsupported flags [ 373.627039][T17371] BPF:Unsupported flags [ 373.706435][T17379] BPF:Unsupported btf_header [ 373.738644][T17379] BPF:Unsupported btf_header 12:21:11 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x12, 0x7, 0x0, &(0x7f0000000040)) r2 = accept$unix(r1, &(0x7f0000000000), &(0x7f00000000c0)=0x6e) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) dup3(r4, r2, 0x0) 12:21:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xc00e}, 0x14}}, 0x0) 12:21:11 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80100, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm\xb5S\x13,/\xa9\xe5\xf5\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000100)={0x81, 0x1, 0xfff, 'queue1\x00', 0xfffffffe}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x100, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000004c0)='/de\xfc\x00admm@\x00i#\x00', 0x87, 0x614900) ioctl$EVIOCGPROP(r5, 0x4004743d, &(0x7f00000003c0)=""/245) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:21:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 373.914173][T17390] BPF:Unsupported flags [ 373.932636][T17393] BPF:Unsupported btf_header [ 373.952298][T17393] BPF:Unsupported btf_header [ 373.957587][T17390] BPF:Unsupported flags 12:21:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xea02}, 0x14}}, 0x0) 12:21:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x33, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 374.100270][T17404] BPF:Unsupported btf_header [ 374.114662][T17404] BPF:Unsupported btf_header 12:21:12 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x7ffffffff000) 12:21:12 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) time(&(0x7f0000000000)) 12:21:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xf000}, 0x14}}, 0x0) [ 374.290122][T17418] BPF:Unsupported flags [ 374.303840][T17419] BPF:[1] DATASEC [ 374.317203][T17418] BPF:Unsupported flags [ 374.326369][T17419] BPF:size=3436 vlen=1 12:21:12 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x1, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x220182, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000140)={0x0, 0x10000, 0x2, &(0x7f00000000c0)=0x8}) mknod(&(0x7f0000000000)='.\x00', 0x800, 0x1) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) get_robust_list(r1, &(0x7f00000001c0)=&(0x7f0000000180), &(0x7f0000000200)=0x18) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000240)={r0, 0x38, 0xfffffffd, r6}) dup3(r2, r4, 0x80000) [ 374.344799][T17419] BPF: [ 374.350709][T17419] BPF:Invalid name [ 374.359346][T17419] BPF: [ 374.359346][T17419] 12:21:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 374.393298][T17419] BPF:[1] DATASEC 12:21:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x34000}, 0x14}}, 0x0) [ 374.416252][T17419] BPF:size=3436 vlen=1 [ 374.438600][T17419] BPF: [ 374.464528][T17419] BPF:Invalid name [ 374.477699][T17419] BPF: [ 374.477699][T17419] [ 374.518021][T17435] BPF:Unsupported flags [ 374.533120][T17435] BPF:Unsupported flags 12:21:12 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100000001, 0x800) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x300c}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f00000000c0)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f00000001c0)=""/250) dup3(r2, r1, 0x0) write(r2, 0x0, 0x0) 12:21:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x400300}, 0x14}}, 0x0) 12:21:12 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) r4 = clone3(&(0x7f0000000340)={0x40000000, &(0x7f00000000c0), &(0x7f0000000380), &(0x7f0000000140), 0x10, 0x0, &(0x7f0000000180)=""/73, 0x0, &(0x7f0000000200)=""/87}, 0xfffffd80) ioprio_set$pid(0x3, r4, 0x1) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={0x0, r3, 0x6eee354b1c067c28}, 0x10) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f00000002c0)=""/13) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0x10001, 0x0, &(0x7f00000001c0), 0x10, &(0x7f0000000300)='/dev/ppp\x00') [ 374.698098][T17447] BPF:Unsupported section found [ 374.721177][T17447] BPF:Unsupported section found [ 374.792576][T17451] ceph: device name is missing path (no : separator in /dev/loop1) 12:21:12 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$KDDELIO(r2, 0x4b35, 0x1f) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000080)={0x0, 0x0, 0xc00}, 0x18) r5 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$TIOCSPTLCK(r5, 0x40045431, &(0x7f0000000000)) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r6, 0x4004743d, &(0x7f0000000c00)=""/246) write(r6, 0x0, 0x1000000) 12:21:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xf0ffff}, 0x14}}, 0x0) 12:21:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 374.888626][T17459] ceph: device name is missing path (no : separator in /dev/loop1) [ 374.914490][T17465] BPF:Unsupported flags [ 374.921415][T17465] BPF:Unsupported flags 12:21:12 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xd396, 0xe0a95f9cc57e70bb) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = openat$cgroup_ro(r2, &(0x7f0000000240)='cgroup.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x7, 0x7, &(0x7f0000000280)=@raw=[@exit, @ldst={0x3, 0x0, 0x1, 0x2, 0xe, 0x0, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x8}, @map_val={0x18, 0x8ba2a6fd76011d91, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfffffffd}, @map_val={0x18, 0x5, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x4, [], 0x0, 0x62e092b52e9a52e4, r2, 0x8, &(0x7f0000000100)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x10, 0x7fffffff, 0x6}, 0xfdc1}, 0x70) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r4, r0, 0x0) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000200)={0x4, 0x1, 0xbbb, 0x3ff, 0x1}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) r7 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0xa2, 0xeffd9a5abf83fbbc) ioctl$KVM_GET_CLOCK(r7, 0x8030ae7c, &(0x7f0000000340)) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCBRADDBR(r6, 0x89a0, &(0x7f00000002c0)='erspan0\x00') [ 374.951028][T17467] BPF:Unsupported section found [ 374.956588][T17467] BPF:Unsupported section found 12:21:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x1000000}, 0x14}}, 0x0) [ 375.061505][T17473] BPF:Unsupported section found [ 375.061892][T17473] BPF:Unsupported section found [ 375.188377][T17486] BPF:Unsupported flags [ 375.206343][T17486] BPF:Unsupported flags 12:21:13 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f0000000000)=""/85) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:21:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x2000000}, 0x14}}, 0x0) [ 375.376742][T17495] BPF:Unsupported section found [ 375.386319][T17496] BPF:Unsupported flags [ 375.392464][T17495] BPF:Unsupported section found [ 375.404612][T17496] BPF:Unsupported flags 12:21:13 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f00000000c0)={0x8001, 0x1, 0x8, 0x4, 0x47, 0x88}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000005c0)={'vlan0\x00', 0xd803}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$TUNSETLINK(r5, 0x400454cd, 0x7) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r10 = dup(r9) getsockopt$bt_BT_DEFER_SETUP(r10, 0x12, 0x7, 0x0, &(0x7f0000000040)) dup3(r0, r10, 0x80000) dup3(r4, r5, 0x0) getpeername$llc(r3, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x10) 12:21:13 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'bcsh0\x00', 0x1}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000000)={0xb, 0x8, 0x6}) 12:21:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x4000000}, 0x14}}, 0x0) 12:21:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x18, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 375.611249][T17516] BPF:Unsupported section found 12:21:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xa000000}, 0x14}}, 0x0) 12:21:13 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000000)={0x6, 0x7, {0x0, 0x2, 0x8, 0x0, 0x80000001}}) [ 375.644405][T17516] BPF:Unsupported section found [ 375.652982][T17518] BPF:Unsupported flags [ 375.677858][T17518] BPF:Unsupported flags 12:21:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 375.833260][T17532] BPF:Unsupported section found [ 375.852190][T17532] BPF:Unsupported section found 12:21:13 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:21:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x1a, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xe000000}, 0x14}}, 0x0) 12:21:13 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) [ 376.105841][T17542] BPF:Unsupported flags [ 376.119540][T17542] BPF:Unsupported flags 12:21:14 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:21:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xf000000}, 0x14}}, 0x0) 12:21:14 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) fsync(0xffffffffffffffff) dup3(r1, r0, 0x0) [ 376.417112][T17557] BPF:Unsupported section found [ 376.429042][T17557] BPF:Unsupported section found [ 376.458561][T17563] BPF:Unsupported flags 12:21:14 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x89, 0x8000) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000040)={0x7fb, 0x9, 0x4, 0x89, 0x7, "3925181235e1e47f817f8dd5b232cc77bf4e0b", 0x5, 0x1}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r2, r0, 0x0) [ 376.478859][T17563] BPF:Unsupported flags 12:21:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x3f000000}, 0x14}}, 0x0) 12:21:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x18, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 376.634608][T17576] BPF:Unsupported section found [ 376.650230][T17576] BPF:Unsupported section found 12:21:14 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f00000000c0)=""/246) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r4, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r4, r0, 0x0) write(r4, 0x0, 0x0) 12:21:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:14 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x802, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000000c0)=""/75) 12:21:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x40000000}, 0x14}}, 0x0) [ 376.735132][T17581] BPF:Unsupported flags [ 376.768232][T17581] BPF:Unsupported flags 12:21:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x60, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1b, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x60000000}, 0x14}}, 0x0) 12:21:14 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r4 = accept(r3, &(0x7f0000000180)=@x25, &(0x7f0000000140)=0x80) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r4, 0x111, 0x2, 0x1, 0x4) r5 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$DRM_IOCTL_GET_MAGIC(r5, 0x80046402, &(0x7f0000000000)=0x40) dup3(r1, r0, 0x0) 12:21:14 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x30002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:21:14 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) fcntl$setownex(r4, 0xf, &(0x7f0000000040)={0x4, r5}) perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x9, 0x0, 0x33, 0x4, 0x0, 0x5, 0x404a2, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x3, 0x7fffffff}, 0x1000, 0x80000000, 0x0, 0x4, 0x3f5, 0x1, 0x9}, r5, 0x3, 0xffffffffffffffff, 0x1) r6 = dup(r0) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$VIDIOC_S_JPEGCOMP(r6, 0x408c563e, &(0x7f0000000240)={0x7, 0xe, 0x3b, "976945219367febac776841979575b920041428e5aeda00e27c1cb1be05a22a74ef51d36a9193c738795a117d3463e151af0167e187fcd1dd75e5a49", 0x10, "4df5be1eb53f81418733f742d81c5522ee850a796d9bdc49b36ec4a27659b8b0a5a85edb8eacbd699c2e7188755d81f0f3cb82c97934d16d05881043", 0x8}) r7 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r7, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r8, 0x9ea5, 0x0, 0x0, 0x0, @ib={0x1b, 0x7ff, 0x81, {"237d3ce66e8714dc0021f60d41447022"}, 0x0, 0x80000001, 0x9}, @in6={0xa, 0x4e21, 0x401, @remote, 0x7}}}, 0x118) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r10 = dup(r9) getsockopt$bt_BT_DEFER_SETUP(r10, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$XDP_UMEM_REG(r10, 0x11b, 0x4, &(0x7f00000003c0)={&(0x7f0000000380)=""/50, 0x40000, 0x0, 0x4}, 0x18) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) ioctl$VT_DISALLOCATE(r10, 0x5608) 12:21:15 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) pipe2(&(0x7f0000000600)={0xffffffffffffffff}, 0x800) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000740)=0x400, 0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r2, r0, 0x0) write(r2, 0x0, 0x0) [ 377.086592][T17610] BPF:Unsupported section found [ 377.101504][T17610] BPF:Unsupported section found [ 377.112479][T17607] BPF:Unsupported flags 12:21:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2e, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:15 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000)=0x7fff, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = dup(r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x101c80, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) fcntl$setownex(r3, 0xf, &(0x7f0000000040)={0x4, r4}) sendmsg$nl_netfilter(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1121}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x7c, 0xb, 0x2, 0xa00, 0x70bd2b, 0x25dfdbfd, {0x7, 0x0, 0x1}, [@nested={0x14, 0x3a, [@typed={0x8, 0x59, @fd}, @typed={0x8, 0x5e, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @nested={0x2c, 0x2e, [@typed={0x14, 0xb, @ipv6=@mcast1}, @typed={0xc, 0x15, @u64=0x8}, @typed={0x8, 0xf, @pid=r4}]}, @typed={0x8, 0x91, @u32=0x1e}, @generic="f1a0d82f312469b76ba54ffcdae55a30ccaefe8a67", @typed={0x8, 0x24, @str='\x00'}]}, 0x7c}, 0x1, 0x0, 0x0, 0x10}, 0x4000004) getsockopt$bt_BT_DEFER_SETUP(r1, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 12:21:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x9effffff}, 0x14}}, 0x0) [ 377.146559][T17607] BPF:Unsupported flags 12:21:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 377.304521][T17622] BPF:Unsupported section found [ 377.333484][T17622] BPF:Unsupported section found 12:21:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xc00e0000}, 0x14}}, 0x0) [ 377.374280][T17633] BPF:Unsupported flags [ 377.386940][T17633] BPF:Unsupported flags 12:21:15 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 12:21:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xea020000}, 0x14}}, 0x0) [ 377.555203][T17647] BPF:Unsupported section found [ 377.577521][T17647] BPF:Unsupported section found 12:21:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 377.677739][T17654] BPF:Unsupported flags [ 377.700213][T17654] BPF:Unsupported flags [ 377.729355][T17659] BPF:Unsupported section found [ 377.757951][T17659] BPF:Unsupported section found 12:21:15 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$SIOCX25GCALLUSERDATA(r3, 0x89e4, &(0x7f00000000c0)={0x5b, "4a95d2807657dfeb51c88a9da2c8651fad0a317da52855911be90fbe0f58747f7208b14efb4d2605fbe874dfba99cc937dc78352b98acf05e8133f1277331250d615a930de4e09bc64b625be7d1589595aeb563d11a7aa8143726ab2af186f981673d2ee810d65a292ddcd2915988e2d73517f679eba49aaa76daf19df901496"}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:21:15 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x82, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x200000, 0x0) dup3(r1, r0, 0x0) 12:21:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xf0ffffff}, 0x14}}, 0x0) 12:21:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:15 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7ff, 0x44c00) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r5, 0x80845663, &(0x7f0000000500)={0x0, @reserved}) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000300)=""/274) dup3(r1, r0, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r7, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10a00}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r8, 0x100, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x3, 0x800, 0x2, 0x2}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x4040101) write(r1, 0x0, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0xff4f) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x4}}}]}, 0x30}}, 0x4002081) r12 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/capi/capi20\x00', 0x400, 0x0) recvfrom$llc(r12, &(0x7f0000000740)=""/113, 0x71, 0x0, &(0x7f0000000600)={0x1a, 0x13, 0x1, 0x4, 0x0, 0x80, @random="e1448c2339eb"}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="2000000014000100000001124d27a467819500002973333ca268a8e054b7a3d05e5e41e920a9abd7abcc735fa1810a7be77009800eed7812093e4bf0de8cb10cd25e68b22d92fd4ee89f95c04364799f0d8f2dbe1420d8be675351f37c30ae531018d14e56c569937b31115450f54a859a6bdc3265d468", @ANYRES32=r11, @ANYBLOB="08000200e0000001"], 0x20}}, 0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x38, 0x3, 0x101, 0x8, 0x0, r7, 0xdc, [], r11, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) dup2(0xffffffffffffffff, r13) 12:21:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x5f, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 377.934142][T17674] BPF:Unsupported flags 12:21:15 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000040)={0x4, r3}) ptrace$setregset(0x4205, r3, 0x3, &(0x7f00000000c0)={&(0x7f0000000000)="8656237838359829dbd310c5203352dd2fea1df343950dd9e2282856558306cc2e07c2a9375159cad22885a440c33af4b3319ad5f277efae4c45356d24b8be32b4cf9488992e3190dc6d6d5cd28b5bb7e96b484b4d95b9b00dd8", 0x5a}) [ 377.961598][T17674] BPF:Unsupported flags 12:21:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xfffff000}, 0x14}}, 0x0) [ 377.997536][T17678] BPF:Unsupported section found [ 378.027898][T17678] BPF:Unsupported section found 12:21:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:16 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000040)={0x1}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000000)={0x1, 0x1f, "60c0a9e6723cae3e07477fa62cec4e1cd87d90a1f0f01ed00f41ecda4f5b18"}) dup3(r1, r0, 0x0) [ 378.156091][T17690] BPF:Unsupported flags [ 378.170188][T17690] BPF:Unsupported flags 12:21:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xffffff7f}, 0x14}}, 0x0) [ 378.217265][T17694] BPF:Unsupported section found [ 378.251030][T17694] BPF:Unsupported section found 12:21:16 executing program 5: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000000c0)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/`ev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) write(r0, 0x0, 0x1000000) 12:21:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xbe, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:16 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x200, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r3) r4 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000440)={r5, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000500)=ANY=[@ANYRES32=r5, @ANYBLOB="630000005a4880de517842d2cecd42ba7a239e3c4bc193d9bc9a4e5b1a045f7b5e0d7e94deaec557d767a615d362be6e865725bcc71b86224548be734c5858c3464551d868f9edfda138a69b6571442dd87bdacf856acc433bd005137601e7695732d1cfa0e32efa0e2196d48face1f91d8f9ebe87ab02914123ee6375ae3ea4e568660000000000000000b6298e96c617f66873fb6cdad2be7a733bc4d4bef7362580c811d62bf8e198d9e8da560079a8caf8238c374f74d813221815d54a7478774262710348cf810905a917630f6b770a8ac15c0a846589720374e76cdfa875601476668b5a6f7edd920b099aae144b6431cc8648bb367caf7c654506d1e4a4148e32cf856699cbef191c48978d5d2a1118bf93bd9ab18b7c6be896af7c9055ce7ca5f692da01e24960c5a36424345be18994b23e9fc5f2ae27e9a448664e41cab28a6335234bd990e07da782d3d959268cf8d886f34f92077e916e9f36cf85b16e93bd1d3c61139e"], &(0x7f0000000000)=0x6b) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000000c0)={r5, @in={{0x2, 0x4e21, @loopback}}, 0x7, 0x6}, &(0x7f0000000040)=0x90) dup3(r1, r0, 0x0) 12:21:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xffffff9e}, 0x14}}, 0x0) 12:21:16 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x200083, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) socket$l2tp(0x18, 0x1, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x6}) syz_open_procfs(r1, &(0x7f0000000000)='net/protocols\x00') r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000040)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r3, r0, 0x0) write(r3, 0x0, 0x0) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) fcntl$setownex(r4, 0xf, &(0x7f0000000040)={0x4, r5}) wait4(r5, &(0x7f0000000100), 0x40000000, &(0x7f0000000140)) 12:21:16 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x1) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) [ 378.610210][T17719] BPF:Unsupported section found [ 378.629520][T17719] BPF:Unsupported section found [ 378.638984][T17723] BPF:Unsupported flags 12:21:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xfffffff0}, 0x14}}, 0x0) [ 378.670025][T17723] BPF:Unsupported flags 12:21:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:16 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) lseek(0xffffffffffffffff, 0x0, 0x2) 12:21:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0xb, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:16 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x40000) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000040)=0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000000c0)) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/246) prctl$PR_SET_UNALIGN(0x6, 0x2) dup3(r2, r0, 0x0) write(r2, 0x0, 0x0) [ 378.894524][T17743] BPF:Unsupported section found 12:21:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0xffffffff}, 0x14}}, 0x0) 12:21:16 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$NBD_CLEAR_QUE(r3, 0xab05) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x5, 0x200000) ioctl$SCSI_IOCTL_SYNC(r5, 0x4) r6 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) getsockopt$bt_BT_DEFER_SETUP(r8, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_GETFSMAP(r8, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000002000000020000000000000000000000e3ffffff00000000000000000000000006000000fb529b5bbb6e6c0000000020000000000000000000000000000000000000000000000005000000f00a993500000000200000000000000006000000000000009e270000000000000000000000000000007dfe0000000000000000000000000002000000010000800900000000000000010001000000000000040000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dbb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000065448783c622573392d87a3f9b193b60b32366aaa16c4b12b55d4d49389946fee7285ed71e83cc8a9a92a5bbf47c70e2ebc938efc42b927c95943861dc8875a3a6310f17ede18909fdcfb5db7dd0c5ed17e66ebb27aa28142d92aacdfad8b65e0a18f09a7ee42ff6c7a0c238352c706b72f2a82f8444b9d7673e72b511f33bda786db53647c892c8ec956cf9a2102059d9bbb829636a180defe085812b205955441526f4abbd64f14fea14a3b59230524bfef345245080cfb4e057dabd31cb4014cd5a0735b798ee6bcf5f1f78416893528aa9ffa5ee648a365c6a6846385d2603b5c358d29bc6984235a37c37197343e2e97bb5f2d01b28d9bdebf97e2c6bb539455f6ee3f66579c3f681d7f2b4eff4443b004c"]) 12:21:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 378.916711][T17743] BPF:Unsupported section found [ 378.936521][T17745] BPF:Unsupported section found [ 378.956844][T17745] BPF:Unsupported section found 12:21:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x1a, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) [ 379.099405][T17756] BPF:Unsupported section found [ 379.134087][T17756] BPF:Unsupported section found [ 379.156029][T17763] BPF:Total section length too long [ 379.174493][T17763] BPF:Total section length too long 12:21:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xbe, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:17 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='2L\x0f\xf4(\xaeG)\xb1', 0x4180c0, 0x0) dup3(r1, r0, 0x0) 12:21:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x1d, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x2}, 0x14}}, 0x0) [ 379.334643][T17778] BPF:Unsupported btf_header [ 379.339931][T17778] BPF:Unsupported btf_header [ 379.378938][T17779] BPF:Unsupported section found 12:21:17 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) inotify_init1(0xea914edb308b541b) write(r1, 0x0, 0x1000000) ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, &(0x7f0000000000)=0x4) 12:21:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x28, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 379.441972][T17779] BPF:Unsupported section found [ 379.473641][T17786] BPF:Unsupported btf_header [ 379.508173][T17786] BPF:Unsupported btf_header 12:21:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x4}, 0x14}}, 0x0) 12:21:17 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x12, 0x7, 0x0, &(0x7f0000000040)) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$TIOCLINUX2(r3, 0x541c, &(0x7f0000000000)={0x2, 0x8, 0xffff, 0x814f, 0x6, 0xa64}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f00000000c0)={{0x9, 0x2, 0x81, 0x9, 0x7f, 0x4}, 0x9d9, 0xfff, 0x3, 0xffe0, 0x5, "ff8b3c1b895fe539773d7c46fa05625961d04954e4f0833c0b1747257928c3fe600618a538ab6d406aa2ef6c8befdd92ad700dd66b711780b2cf815d16cf99dac3720aa17b56d33b52fcac4bd4c5bb6f7d0604fd2c37e7b1326b49d5c9b638112aee1483cc4dde3e46226d9142220e6664836e72713dfb8d4569e22b8ba9f77f"}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r4) dup3(r0, r4, 0x0) 12:21:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x2c, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:17 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r4) r5 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={r6, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000440)={r6, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000a80)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], &(0x7f0000000000)=0x6b) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f00000000c0)={r6, 0xd1, "605c5b332aabc63648618ea1f98eecf78420b17c1c606d575a773db62e73e0f22f1a7ec167c3ea4bd7f1f74eb2831712efe19683b54291a302514945bbd0ca13727a7f25a9c3fa0b90c95ac5b86b097d66c948069c46814d542a8d9ca8e1e23d2d1dd6f0806d8be4a2c2138a9fca59dd31cf0d391af838cdcff41be1705ecf6db649e7a03e0239523521f3b8e02e7411de0d2b69c899840622026739ea1d38913f7ba8535c8e754673374ccdf7cdc468cf4dc7c515507d284e54553c155247d21cd1c41b695b5f11067dae32ef934d6ebd"}, &(0x7f0000000000)=0xd9) write(r1, 0x0, 0x0) [ 379.681287][T17798] BPF:Unsupported btf_header [ 379.691450][T17798] BPF:Unsupported btf_header [ 379.719680][T17799] BPF:Unsupported section found 12:21:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xa}, 0x14}}, 0x0) [ 379.740921][T17799] BPF:Unsupported section found 12:21:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:17 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x105e00, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000040)=0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) [ 379.829644][T17810] BPF:Unsupported btf_header [ 379.853288][T17810] BPF:Unsupported btf_header 12:21:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x32, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 379.948053][T17820] BPF:Unsupported section found [ 379.968623][T17820] BPF:Unsupported section found [ 380.050031][T17826] BPF:Unsupported btf_header [ 380.089792][T17826] BPF:Unsupported btf_header 12:21:18 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) ustat(0x80000000, &(0x7f00000000c0)) ioctl$SIOCX25GCAUSEDIAG(r2, 0x89e6, &(0x7f0000000000)={0x1f, 0xff}) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) write(r3, 0x0, 0x1000000) 12:21:18 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r4) r5 = socket$inet(0x2, 0x80001, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r7, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0xc7f77133a6e3a4ae}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x40, r8, 0x400, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xbb}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8001}]}, 0x40}, 0x1, 0x0, 0x0, 0x4004800}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={r9, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000440)={r9, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000a80)=ANY=[@ANYRES32=r9, @ANYBLOB="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"], &(0x7f0000000000)=0x6b) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={r9, 0x9c, "64dd46a7aea8d1f8834516374c39859bb6fe55da33dab44bfce3d5e4071d1f4f537eb0f4f38ebf05eb5d114af0e1c2ccc57300b853e121704ddfc4bf65c2d5a11124f4009dd231a0922cdef711f6205b24f019ac6ace232ebce9b72abd522982e9a337f8e367ab78506185df51410066b307b66fa7ad6436589469723868e000ab2264dbd72bc40cecf0734efe3c3accc8410b2d050ca753121abb69"}, &(0x7f00000001c0)=0xa4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000300)={r10, 0x8000}, 0x8) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2404000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="0000e822", @ANYRES16=r3, @ANYBLOB="00042abd7000fcdbdf250200000058000200fbcda01460ef39c846976cb0552a08000400060000000800030000000000080002004e210000080009000400000008000d00004e22000014000100ac141423000000000000000000000000080003000000000008000600000000000800060004000000400001000800000c000700220000001a00000008000b0073697000080002002e0000000c000700040000000000000000000b00736970000000000000"], 0xb4}, 0x1, 0x0, 0x0, 0x20048090}, 0x48080) 12:21:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xe}, 0x14}}, 0x0) 12:21:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x34, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 380.229945][T17840] BPF:Unsupported section found [ 380.246709][T17836] BPF:btf_header not found [ 380.254205][T17840] BPF:Unsupported section found [ 380.265686][T17836] BPF:btf_header not found 12:21:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x8d, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:18 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = dup3(r1, r0, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000000c0)={0x1}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x151000, 0x0) ioctl$BLKROSET(r3, 0x125d, &(0x7f0000000140)=0x423bc8e9) write(r1, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth0_to_bridge\x00', &(0x7f0000000000)=@ethtool_regs={0x4, 0x8, 0x2a, "a03321dcb4ef6444180ad47e0f8454ec2671c14395a864a2220c9fbd617d83f0330423e6ea2b253ad613"}}) 12:21:18 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) splice(0xffffffffffffffff, &(0x7f0000000180)=0xfffffffffffff043, r3, &(0x7f00000001c0)=0x3, 0x70d, 0x2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$inet_opts(r3, 0x0, 0xd, &(0x7f00000000c0)=""/138, &(0x7f0000000000)=0x8a) dup3(r1, r0, 0x0) 12:21:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xf}, 0x14}}, 0x0) 12:21:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 380.399201][T17849] BPF:btf_header not found [ 380.448036][T17849] BPF:btf_header not found [ 380.498697][T17859] BPF:Unsupported section found 12:21:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x3e4, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x60}, 0x14}}, 0x0) [ 380.548724][T17859] BPF:Unsupported section found [ 380.641766][T17868] BPF:btf_header not found [ 380.650414][T17868] BPF:btf_header not found 12:21:18 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) write(r0, 0x0, 0x1000000) 12:21:18 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f00000001c0)) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) dup3(r1, r0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$bt_BT_VOICE(r6, 0x112, 0xb, &(0x7f0000000100)=0x7ff, &(0x7f0000000140)=0x2) r7 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$PPPIOCATTCHAN(r7, 0x40047438, &(0x7f0000000040)=0x1) 12:21:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1800, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xf0}, 0x14}}, 0x0) [ 380.889141][T17886] BPF:[1] DATASEC (anon) [ 380.894507][T17887] BPF:Unsupported section found [ 380.903712][T17886] BPF:size=3436 vlen=1 [ 380.916841][T17886] BPF: [ 380.921903][T17887] BPF:Unsupported section found [ 380.926125][T17886] BPF:Invalid name 12:21:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x2ea}, 0x14}}, 0x0) [ 380.946894][T17886] BPF: [ 380.946894][T17886] [ 380.963128][T17886] BPF:[1] DATASEC (anon) 12:21:18 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 12:21:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1b00, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:18 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x12, 0x7, 0x0, &(0x7f0000000040)) recvfrom$llc(r1, &(0x7f00000000c0)=""/222, 0xde, 0x40002100, &(0x7f0000000000)={0x1a, 0x300, 0x5, 0x4, 0x6f, 0x8e, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(blake2s-256-generic,cbc-camellia-aesni)\x00'}, 0x58) r6 = accept4$alg(r5, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000300)=ANY=[@ANYRES16], 0x2) splice(r3, 0x0, r6, 0x0, 0xec6, 0x0) write$P9_ROPEN(r4, &(0x7f0000000280)={0x18, 0x71, 0x1, {{0x55, 0x3, 0x8}, 0xb296}}, 0xffffffffffffff9f) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f00000002c0)=0x4, 0x4) ioctl$PPPIOCSCOMPRESS(r4, 0x4010744d) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) getsockopt$bt_BT_DEFER_SETUP(r8, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$GIO_UNIMAP(r8, 0x4b66, &(0x7f0000000380)={0x8, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}]}) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r9, r2, 0x0) [ 380.998898][T17886] BPF:size=3436 vlen=1 [ 381.011287][T17886] BPF: 12:21:18 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x41000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) socket$tipc(0x1e, 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sched_setattr(0x0, &(0x7f0000000040)={0x83}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r5 = accept$alg(r4, 0x0, 0x0) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r5, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) bind$x25(r3, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) [ 381.069241][T17886] BPF:Invalid name [ 381.085939][T17886] BPF: [ 381.085939][T17886] 12:21:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xa00}, 0x14}}, 0x0) [ 381.116712][T17902] BPF:Unsupported section found [ 381.169826][T17902] BPF:Unsupported section found 12:21:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 381.353598][T17928] BPF:Unsupported section found 12:21:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xe00}, 0x14}}, 0x0) [ 381.378519][T17928] BPF:Unsupported section found 12:21:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 381.404343][T17930] BPF:Unsupported section found [ 381.417068][T17930] BPF:Unsupported section found 12:21:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2e00, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xec0}, 0x14}}, 0x0) [ 381.536065][T17938] BPF:Unsupported section found [ 381.541813][T17938] BPF:Unsupported section found 12:21:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 381.609397][T17943] BPF:Unsupported section found [ 381.624250][T17943] BPF:Unsupported section found 12:21:19 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000c00)=""/246) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000300)={0x0, {0x2, 0x4e20, @empty}, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e24, @remote}, 0x228, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x7, 0x7ff, 0x101}) r2 = dup3(0xffffffffffffffff, r0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r3) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000080)={'team_slave_1\x00', {0x2, 0x4e24, @multicast2}}) sendmsg$IPVS_CMD_SET_SERVICE(r5, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="200029bd7000fedbdf250200000054000300140006000000000000000000000000000000000008000800090000000800030001000000080005007f00000114000600fe880000000000000000000000000001080003000400000008000500ac14141b0800060002000000080005000100008008000400030000000800050001000080700001000800090013000000080005000100000014000300e000000200000000000000000000000008000600736564000c000700360000000200000008000b00736970000800bdf008b1b44381f60b00736970001400030000000000000000000000000000000000080004004e240000"], 0xf8}, 0x1, 0x0, 0x0, 0x8000}, 0x2000000) openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x280800, 0x0) socket$isdn(0x22, 0x3, 0x0) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f00000000c0), 0x0) fstat(r4, &(0x7f0000000500)) write(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, &(0x7f0000000000)) getresuid(&(0x7f0000000380), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r5, r7, r8) 12:21:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x3f00, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 381.741823][T17949] BPF:Unsupported section found [ 381.785893][T17949] BPF:Unsupported section found [ 381.823623][T17955] BPF:Unsupported section found [ 381.841668][T17955] BPF:Unsupported section found 12:21:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xf00}, 0x14}}, 0x0) 12:21:19 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000040)='TRUE', 0x4, 0x2) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0x3a5) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000010009000000000002000100", @ANYRES32=r2, @ANYBLOB="02000c00754ef63e2c39e83f76c35571087cfb997d06350c04fb55a93d0350e5dda882b0b5fed4d93a", @ANYRES32=0xee00, @ANYBLOB="02000100", @ANYRES32=r5, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000400", @ANYRES32=r6, @ANYBLOB="040002000000000008000100", @ANYRES32=r7, @ANYBLOB="10000100000000002000040000000000"], 0x54, 0x1) 12:21:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:19 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x1, {0x0, 0x58ff, 0xbd33, 0x1, 0x1, 0x8}}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x5, &(0x7f00000000c0)=0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x8, 0x18000) dup(r4) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) r7 = openat(r6, &(0x7f00000001c0)='./file0\x00', 0xd0c44, 0x40) io_submit(r3, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x8, r4, &(0x7f0000000100)="f010fe06c1bf0e47bb185ba6f937cb99039b98ad414d79c1276fbe29d8ad73d127abceab90c40878d53b514444535ae8ae93ce3aad3cecc87ae0639fa0bb01f7db8c96a9cdf5a3f46447e9f083cf08256a39c71021162b0c1c2cfe950a6a728a3d4fc81f712e271547ac98a6b6f5fcb04edcb76c1b59574cc4268f73b5d0970e00028b2c915420434cd75b4983303998f37722f9ffe97558d11abcd5", 0x9c, 0x7, 0x0, 0x1, r7}]) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f0000000280)) socket$tipc(0x1e, 0x2, 0x0) dup3(r2, r1, 0x0) 12:21:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x3f00}, 0x14}}, 0x0) [ 382.095700][T17974] BPF:Unsupported section found [ 382.106630][T17976] BPF:Unsupported section found [ 382.117517][T17974] BPF:Unsupported section found [ 382.130193][T17976] BPF:Unsupported section found 12:21:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:20 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6c9d, 0x25babd2bb186f4c7) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r2, r1, 0x0) 12:21:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x4000}, 0x14}}, 0x0) [ 382.303618][T17990] BPF:Unsupported section found [ 382.309231][T17990] BPF:Unsupported section found [ 382.313376][T17991] BPF:Unsupported section found [ 382.330094][T17991] BPF:Unsupported section found 12:21:20 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) 12:21:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x6000}, 0x14}}, 0x0) [ 382.536033][T18006] BPF:Unsupported section found [ 382.570371][T18006] BPF:Unsupported section found [ 382.605200][T18011] BPF:Unsupported section found [ 382.623742][T18011] BPF:Unsupported section found 12:21:20 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)={0xddfe8441, 0x20100800, 0x7fffffffffffefff, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) write$binfmt_misc(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xab) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f00000000c0)={0x0, @reserved}) write(r1, 0x0, 0x1000000) 12:21:20 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='\x05\x00', 0x128942, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r4) r5 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={r6, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000440)={r6, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000a80)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], &(0x7f0000000000)=0x6b) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000040)={r6, 0x1, 0x10, 0x3, 0x5}, &(0x7f00000000c0)=0x18) dup3(r1, r0, 0x0) 12:21:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x5f00, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xc00e}, 0x14}}, 0x0) [ 382.804571][T18024] BPF:Unsupported section found [ 382.840302][T18024] BPF:Unsupported section found 12:21:20 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = socket$caif_seqpacket(0x25, 0x5, 0x3) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r4) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000001c0)={0xffff, 0x0, 0x5, 0x0, 0x0, [{r0, 0x0, 0x7}, {r3, 0x0, 0x3}, {r0, 0x0, 0x8}, {r4, 0x0, 0xcb}, {r0, 0x0, 0x2}]}) r5 = gettid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r5, 0xfffffffffffffff7, &(0x7f00000000c0)=""/207) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) getsockopt$bt_BT_DEFER_SETUP(r8, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$inet6_tcp_TCP_MD5SIG(r8, 0x6, 0xe, &(0x7f0000000340)={@in={{0x2, 0x4e22, @broadcast}}, 0x0, 0xff, 0x0, "126e43ca5ce9437b0dfe1376737905cffac4b20f7c742d745ceed884e5af2b2b37f953ab0a4edb893e7180bba27c057239d20c5d9372dd0c9254b1cd627c3c7cb511feee6cc4f4e2e9c131bf58bf854b"}, 0xd8) dup3(r6, r0, 0x0) read(0xffffffffffffffff, &(0x7f0000000280)=""/182, 0xb6) [ 382.880104][T18032] BPF:Unsupported section found [ 382.897061][T18032] BPF:Unsupported section found 12:21:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xea02}, 0x14}}, 0x0) [ 383.085636][T18047] BPF:Unsupported section found [ 383.103210][T18047] BPF:Unsupported section found 12:21:21 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x80, 0x0) write$FUSE_INTERRUPT(r2, &(0x7f00000001c0)={0x10, 0xffffffffffffffda, 0x8}, 0x10) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r3 = dup3(r1, r0, 0x0) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r4) r5 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={r6, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000440)={r6, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000a80)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], &(0x7f0000000000)=0x6b) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000d00)={r6, 0x1000, "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"}, &(0x7f0000000000)=0x1008) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000040)={r7, 0x90df}, 0x8) write(r1, 0x0, 0x0) 12:21:21 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x420101, 0x0) dup3(r1, r0, 0x0) 12:21:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x18, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xf000}, 0x14}}, 0x0) [ 383.278987][T18059] BPF:Unsupported section found [ 383.324191][T18059] BPF:Unsupported section found 12:21:21 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x240340) getsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) getpid() ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/246) write(r2, 0x0, 0x0) 12:21:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x34000}, 0x14}}, 0x0) 12:21:21 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @reserved="a65475ccc823ba150eac831bc79bde47feea9fa1f13ccef5f8e909936bdc52e5"}}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r6, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r6, 0xd}}, 0x10) [ 383.399265][T18066] BPF:Unsupported section found 12:21:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 383.469170][T18066] BPF:Unsupported section found 12:21:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x400300}, 0x14}}, 0x0) 12:21:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 383.593451][T18083] BPF:Unsupported section found [ 383.634494][T18083] BPF:Unsupported section found 12:21:21 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000040)={'\x88yz', 0x0}, &(0x7f0000000380)="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", 0x4c3, r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xaf2a504626ad6282, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x500, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) r4 = dup3(0xffffffffffffffff, r3, 0x80000) getpeername$unix(r4, &(0x7f0000000280), &(0x7f0000000300)=0x6e) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r5) dup3(r5, r1, 0x80000) prctl$PR_SET_FP_MODE(0x2d, 0x0) [ 383.679414][T18090] BPF:Unsupported section found [ 383.695691][T18090] BPF:Unsupported section found 12:21:21 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$ASHMEM_GET_PIN_STATUS(r3, 0x7709, 0x0) 12:21:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xf0ffff}, 0x14}}, 0x0) 12:21:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 383.931550][T18108] BPF:Unsupported section found [ 383.939282][T18106] BPF:Unsupported section found [ 383.946625][T18108] BPF:Unsupported section found [ 383.968628][T18106] BPF:Unsupported section found 12:21:21 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) connect$ax25(r0, &(0x7f0000000000)={{0x3, @null, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @bcast, @bcast, @bcast]}, 0x48) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:21:21 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x80, 0x4, 0x4, 0x1000, 0x80}, &(0x7f0000000040)=0x98) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$KVM_ASSIGN_SET_MSIX_NR(r7, 0x4008ae73, &(0x7f0000000240)={0x9, 0x1ff}) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000180)={r5, @in6={{0xa, 0x4e23, 0x4, @rand_addr="aa76c5e30ebe1eb1bd6987fc892b838b", 0xfffffff8}}}, 0x84) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000000)) 12:21:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x1000000}, 0x14}}, 0x0) 12:21:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xbe00, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x2000000}, 0x14}}, 0x0) [ 384.151876][T18122] BPF:Unsupported section found [ 384.157699][T18123] BPF:Unsupported section found [ 384.174975][T18123] BPF:Unsupported section found [ 384.179068][T18122] BPF:Unsupported section found 12:21:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x60, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:22 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = clone3(&(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setpgid(r1, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 12:21:22 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @multicast2}, &(0x7f0000000180)=0x10) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e21, @remote}, 0x10) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x3f, 0x4c, 0x2, 0x1, 0x0, 0x7fff, 0x800, 0x6b4cd76fa994b3b2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1000, 0x4, @perf_config_ext={0x112, 0x3}, 0xe9c9855e0a1654bb, 0x5, 0x7, 0x0, 0x6, 0x100, 0xffff}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000d00)="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", 0x1000, r3}, 0x68) 12:21:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 384.365230][T18139] BPF:Unsupported section found [ 384.371774][T18139] BPF:Unsupported section found 12:21:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x4000000}, 0x14}}, 0x0) [ 384.498305][T18151] BPF:Unsupported section found [ 384.518819][T18151] BPF:Unsupported section found [ 384.523035][T18153] BPF:Unsupported section found [ 384.543591][T18153] BPF:Unsupported section found 12:21:22 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/\xe4ev/ppp\x00', 0x9e080, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000000040)=0x1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$BLKRESETZONE(r4, 0x40101283, &(0x7f00000000c0)={0x4}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000740)=""/254) write(r1, 0x0, 0x1000000) 12:21:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:22 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$PPPIOCSNPMODE(r3, 0x4008744b, &(0x7f0000000000)={0x8029, 0x3}) 12:21:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xa000000}, 0x14}}, 0x0) [ 384.760904][T18167] BPF:Unsupported section found [ 384.785566][T18169] BPF:Unsupported section found [ 384.797518][T18167] BPF:Unsupported section found 12:21:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xe000000}, 0x14}}, 0x0) [ 384.835079][T18169] BPF:Unsupported section found 12:21:22 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x1890c0, 0x0) dup3(r1, r0, 0x0) 12:21:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:22 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/devN\xc0\xec\xf7\x00', 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) write$rfkill(0xffffffffffffffff, &(0x7f0000000000)={0x7fff, 0x2, 0x3, 0x0, 0x1}, 0x8) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) r4 = socket(0x8, 0xa, 0x6) setsockopt$XDP_RX_RING(r4, 0x11b, 0x2, &(0x7f00000000c0)=0x104, 0x4) socket$key(0xf, 0x3, 0x2) write(r1, 0x0, 0x0) 12:21:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:22 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x60b7cdf29add3eae, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f00000000c0)=""/253) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) accept4$packet(r0, &(0x7f0000003380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000033c0)=0x14, 0x800) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000003400)={@rand_addr="7a0663d616dff5fd64dc75f8a3da8752", 0x43, r3}) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000640)=""/246) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r4, 0x4004743d, &(0x7f00000003c0)=""/235) write(r4, 0x0, 0x1000000) 12:21:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xf000000}, 0x14}}, 0x0) [ 385.083390][T18190] BPF:Unsupported section found 12:21:23 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='\x01\x06\x00', 0x0, 0x0) vmsplice(r0, &(0x7f0000000400)=[{&(0x7f00000000c0)="df4d169b8b76ccfea45c1c7f4ed951bdbe0f77c58d7693df241b3cceb495121b283a55d1b725e9caac01d3fad6807cc366f039be8652d41001a2a3d734e9dd6babdba1f2c67f740b2d2fcbc6e3afa2a42b8b2eed26884fd265face9154bf70250a3e4fa5031111c3674a888fe6183834441819a8356023292f500845aaa5f7c1acda260172436fba047074435fbac54b5201d3a5e82bcd5b13130a1c5957353f", 0xa0}, {&(0x7f0000000000)="9c8e2a1195675c005d7c251ea899da8055f04a32642d0a6d737e98", 0x1b}, {&(0x7f0000000180)="106ad7faf77530f3ab406ed85165bd1fad9ebd14c2b21cbd10cfd60719cd0fab9b201651ddffadc5e1c6f2b11786d661cb5e7da1980cdcb6e8b6369f3a8e71e9212114e840f3445162fb5b204734a593fdbfee1fe0a2144fc9e1875c6a791d42fbeb3abec33bd2dfdb70e153a36b2b750a3c5502e411e8801a85cf65a62a3004173f1227fb532aeba0683ce5d2533795b17fb4bfdecd499f25c63924510f33c07a9e134976288dcf4c603c4b7452443b6bd938f414bdb46709b0cac40b2a952953", 0xc1}, {&(0x7f0000000040)="8cd37acfde34fe948f945018425a930241ee297aee8cc824096514755e8e61744679c6b8d494a101661be53b436a107dc0be4a0eca333526c3", 0x39}, {&(0x7f0000000280)="3b65c6a5352ef9236dbd733ca27ec8fb08693ec22ac62b7fcfcb8050893c1e91aade5a42d0e255449e23954d64091d879ef6a27459e9e940658fee368dc2708ce9e0137b094a08b705b314e3a37fadec7a1c589f74a159cb8ebf39d1e0f9ca609fb4d6631ac23a664e9c1cde9f586f9d0d648c615a2697bcb1f11be9b1fbe93e61af7d729fda1d8a5c854e9fc6889c18b053e2d6e3bbc80c0ee76ff3fc733384ab4d0b2a8bdd72", 0xa7}, {&(0x7f0000000340)="1513760fce43373f2c89dc564da90c1a15d25d907a7f913d915edede6ab63a04874a41ce91856312de0b0e9cd51c73b668e772fb402cba352013764d1b5946b47078c7ae90a0a44bb5eac418dec08766e961728c26248be86d218f8426949659194e5ff8a93cc1e39a27c95f5e4a2cb2671833632ba3220adb8132e5ca9bf3132a3b16d48e20644fc786102bf5684fba7cec82a458c1a23b85cd85ee514640c20c1354365c", 0xa5}], 0x6, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) [ 385.142252][T18194] BPF:Unsupported section found [ 385.143417][T18190] BPF:Unsupported section found [ 385.159818][T18194] BPF:Unsupported section found 12:21:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x3f000000}, 0x14}}, 0x0) 12:21:23 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000000)={0x1, 0x1, {0x2, 0x0, 0x9, 0x2, 0x9}}) 12:21:23 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/225) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) [ 385.385521][T18216] BPF:Unsupported section found [ 385.385750][T18215] BPF:Unsupported section found [ 385.407259][T18216] BPF:Unsupported section found 12:21:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x40000000}, 0x14}}, 0x0) [ 385.450385][T18215] BPF:Unsupported section found 12:21:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xbe, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:23 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x2a1000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000940)=""/4096) [ 385.638053][T18234] BPF:Unsupported section found 12:21:23 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) recvfrom$unix(r3, &(0x7f0000000000)=""/110, 0x6e, 0xcbb4fc439331fdbc, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) write(r1, 0x0, 0x1000000) 12:21:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x60000000}, 0x14}}, 0x0) [ 385.665637][T18234] BPF:Unsupported section found [ 385.671170][T18237] BPF:Unsupported section found [ 385.691747][T18237] BPF:Unsupported section found 12:21:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:23 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x4, r1}) r2 = syz_open_procfs(r1, &(0x7f00000046c0)='schedstat\x00') setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000004700)=0x100000, 0x4) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$int_out(r5, 0xa8c0, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r6, 0x40a85323, &(0x7f0000000240)={{0xf9, 0x6}, 'port1\x00', 0x20, 0x180020, 0x0, 0xd5, 0x3f, 0x6, 0x6, 0x0, 0x8, 0x1}) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) getsockopt$bt_BT_DEFER_SETUP(r8, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$RTC_WKALM_SET(r8, 0x4028700f, &(0x7f0000000340)={0x1, 0x0, {0x20, 0x60dc, 0x4, 0x9, 0x3, 0x0, 0x4, 0x122}}) ioctl$PPPIOCDISCONN(r6, 0x7439) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) dup3(r4, r3, 0x0) [ 385.892266][T18253] BPF:Unsupported section found [ 385.920381][T18253] BPF:Unsupported section found [ 385.937526][T18254] BPF:Unsupported section found 12:21:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x9effffff}, 0x14}}, 0x0) [ 385.949920][T18254] BPF:Unsupported section found 12:21:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xc00e0000}, 0x14}}, 0x0) 12:21:24 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80, 0x0) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000040)) 12:21:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xea020000}, 0x14}}, 0x0) [ 386.206073][T18275] BPF:Unsupported section found [ 386.212144][T18276] BPF:Unsupported section found [ 386.223895][T18276] BPF:Unsupported section found 12:21:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xf0ffffff}, 0x14}}, 0x0) [ 386.252556][T18275] BPF:Unsupported section found 12:21:24 executing program 5: r0 = getpid() waitid(0x1, r0, &(0x7f00000000c0), 0x80000000, &(0x7f0000000140)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000640)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/246) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x101000, 0x0) ioctl$VIDIOC_STREAMON(r3, 0x40045612, &(0x7f0000000200)=0x400) write(r2, 0x0, 0x1000000) pipe2(&(0x7f0000000000), 0xc1800) 12:21:24 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x100000) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000000)) 12:21:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xfffff000}, 0x14}}, 0x0) 12:21:24 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f00000000c0)={0x0, {0x77359400}, 0x1, 0x3}) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14, 0x49, 0x1, {0x8, 0x4, 0x7}}, 0x14) 12:21:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xffffff7f}, 0x14}}, 0x0) [ 387.099415][T18303] BPF:Unsupported section found [ 387.101399][T18304] BPF:Unsupported section found [ 387.127036][T18304] BPF:Unsupported section found [ 387.128117][T18303] BPF:Unsupported section found 12:21:25 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10000, 0x0) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f0000000180)={0xa30000}) r2 = semget(0x3, 0x3, 0x200) semctl$IPC_RMID(r2, 0x0, 0x0) semctl$GETNCNT(r2, 0x7, 0xe, &(0x7f00000000c0)=""/132) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e23, @loopback}}, 0x0, 0x9}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000002c0)={r8, 0x7}, 0x8) dup3(r3, r0, 0x0) 12:21:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x18000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1800, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 387.323622][T18321] BPF:Unsupported section found [ 387.337574][T18321] BPF:Unsupported section found [ 387.343919][T18322] BPF:Unsupported section found [ 387.352678][T18322] BPF:Unsupported section found 12:21:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1b000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 387.512016][T18332] BPF:Unsupported section found [ 387.517577][T18332] BPF:Unsupported section found [ 387.536179][T18333] BPF:Unsupported section found [ 387.543844][T18333] BPF:Unsupported section found 12:21:25 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) fcntl$setstatus(r1, 0x4, 0x6400) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:21:25 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) write$ppp(r3, &(0x7f0000000000)="9c281cf1de50", 0x6) 12:21:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xffffff9e}, 0x14}}, 0x0) 12:21:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a00, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:25 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) fsconfig$FSCONFIG_SET_BINARY(r4, 0x2, &(0x7f0000000000)='\x00', &(0x7f00000000c0)="8061d34f1e7e98ffa8546ed4422bd96c9d939e2cd95b6563b4e7f7cfe7f63c4593f6f1e6ddbcbf8cd7441904190c7e1e91c5e2cd809b6a2746bead2e5388070a1498f08e321db364037c1410611d543e4c979273c193d6e6639870aa40880baf2acb2dae036b14c8ac80378c067d736115e6d2816cbe53d8533811d0ce5b26b87f7d1014768974b2938e7b95d41400afcd2f4ca45a01fdbc0a3dcc0036652663b84f0607225390f6b107cd6e0f15d811ae19f98f73b3f794430bd21a9973b83fe765b078b746bc2f3ea34605f5cda6b754bcc3e74591d05fc7c2e8be48ccef9b75cfa09bcd49d22b26a4e9b2342c3b", 0xef) r5 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$VHOST_RESET_OWNER(r5, 0xaf02, 0x0) 12:21:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x20000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:25 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000040)='/dev/ppp\x00') r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$sock_int(r5, 0x1, 0x2a, &(0x7f0000000100), &(0x7f0000000140)=0x4) setsockopt$CAN_RAW_LOOPBACK(r4, 0x65, 0x3, &(0x7f00000000c0)=0x1, 0x4) ioctl$CAPI_GET_SERIAL(r6, 0xc0044308, &(0x7f0000000180)=0x4) dup3(r2, r1, 0x0) [ 387.742504][T18347] BPF:Unsupported section found [ 387.746690][T18348] BPF:Unsupported section found [ 387.764673][T18347] BPF:Unsupported section found [ 387.780083][T18348] BPF:Unsupported section found 12:21:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xfffffff0}, 0x14}}, 0x0) 12:21:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2e000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:25 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xc0000, 0x0) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000040)={0xfb, 0x1}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x9) dup3(r2, r0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x208000, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, &(0x7f0000000100)={{0x81, 0x2, 0x54, 0x4f, 0x0, 0x50}, 0x9, 0x0, 0x2}) [ 387.971852][T18363] BPF:Unsupported section found [ 387.986850][T18366] BPF:Unsupported section found [ 388.002160][T18363] BPF:Unsupported section found 12:21:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0xffffffff}, 0x14}}, 0x0) [ 388.017930][T18366] BPF:Unsupported section found 12:21:26 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7ff, 0x8940) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f00000000c0)=""/257) write(r1, 0x0, 0x1000000) 12:21:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x3f000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:26 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x30, 0x40000000, r1, &(0x7f0000000040)='./file0\x00') dup3(r0, r1, 0x0) 12:21:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 12:21:26 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000001000)="1c989cc9f58ec796be4720e6160291a2fb7c6445e84b8e9e349ead029fe38d5810bf992b5d51f406a51cc339021268aed6f767582af42dbc8ea1110e4353fcf30b20f1f27ed3b44bef6444f8ca6a808e34ded636ef55e151c11b4ef7a5384f4a0ceb885759dfeeca5aaa540de461d2130755897533032f5639c4ba79988a49d63084f2cbed0a84e5e733146f15192fdabd0e3a", 0x93, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000002000)='logon\x00', &(0x7f0000001000), &(0x7f0000001000)="1c989cc9f5", 0x5, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, r1) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r2, r0, 0x0) write(r2, 0x0, 0x0) 12:21:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) 12:21:26 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x4, r2}) r3 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0x80) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000100)=0x1, 0x4) r4 = syz_open_procfs(r2, &(0x7f0000000000)='net/netlink\x00') ioctl$DRM_IOCTL_SET_CLIENT_CAP(r4, 0x4010640d, &(0x7f0000000040)={0x7, 0x2}) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r5, r0, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140)=r7, 0x1) [ 388.363359][T18394] BPF:Unsupported section found [ 388.370834][T18391] BPF:Unsupported section found [ 388.396229][T18391] BPF:Unsupported section found [ 388.401855][T18394] BPF:Unsupported section found 12:21:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x40000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 388.548976][T18408] BPF:Unsupported section found 12:21:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x2}}, 0x14}}, 0x0) [ 388.614797][T18408] BPF:Unsupported section found 12:21:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 388.726549][T18415] BPF:Unsupported section found [ 388.732192][T18415] BPF:Unsupported section found [ 388.829030][T18421] BPF:Unsupported section found [ 388.836003][T18421] BPF:Unsupported section found 12:21:26 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/\xc6\x0e\xc0\xf1\x80\xb2\xb2X', 0x101100, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000000)={{0x3f, 0x6}, 'port1\x00', 0x2e, 0x14, 0x1, 0x46, 0xffffb785, 0xffffffdf, 0x3, 0x0, 0x4, 0xff9}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:21:26 executing program 1: socketpair(0x0, 0x5, 0x4, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x60100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb4, r2, 0x2, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'batadv0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xd27}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x31}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xff}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}]}]}, 0xb4}}, 0x14) r3 = dup(0xffffffffffffffff) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) connect$inet6(r4, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, &(0x7f0000000240)=0x202, 0x4000000000dc) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="e5510142cf8b33ccbba137fc0737fd3954978027ecb82f91c50a000000000000002e8d010001000000000044093d08825f135d12f70300000000000000510011e6382d857b3f472fa6fb00"/86], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) r7 = epoll_create1(0x0) close(r7) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xf2ba825992b3006c}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="4466649c42f4ed537e5db8", @ANYRES16=r6, @ANYRES64=r7], 0x3}, 0x1, 0x0, 0x0, 0x40000}, 0x20004811) sendmsg$NBD_CMD_CONNECT(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, r6, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x10) r8 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r9 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r10 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x8400, 0x0) r11 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x204000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x58, r6, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r10}, {0x8, 0x1, r11}]}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x90403}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r6, 0x200, 0x70bd28, 0x25dfdbff, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x7}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x401}]}, 0x38}, 0x1, 0x0, 0x0, 0xb54f6edfa7546b3b}, 0x40000) r12 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r13 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r13, r12, 0x0) 12:21:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x4}}, 0x14}}, 0x0) 12:21:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:26 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000000)=""/53) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) [ 389.064560][T18431] BPF:Unsupported section found [ 389.075453][T18438] BPF:Unsupported section found [ 389.093995][T18431] BPF:Unsupported section found [ 389.099608][T18438] BPF:Unsupported section found 12:21:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0xa}}, 0x14}}, 0x0) 12:21:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:27 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000180)=@keyring={'key_or_keyring:'}) keyctl$instantiate(0xc, r3, &(0x7f0000000000)=@encrypted_load={'load ', 'default', 0x20, 'trusted:', '/dev/ppp\x00', 0x20, 0x8, 0x20, [0x2a44b6bbc4291f76, 0x47, 0x62, 0x1e]}, 0x39, 0xfffffffffffffff9) 12:21:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0xe}}, 0x14}}, 0x0) [ 389.317723][T18453] BPF:Unsupported section found [ 389.343363][T18456] BPF:Unsupported section found [ 389.355897][T18453] BPF:Unsupported section found 12:21:27 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, r2, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x800) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r3, r0, 0x0) [ 389.387768][T18456] BPF:Unsupported section found 12:21:27 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EVIOCGBITSND(r3, 0x80404532, &(0x7f00000000c0)=""/200) write(r1, 0x0, 0x1000000) 12:21:27 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r2) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) write(r4, 0x0, 0xffffffffffffffc9) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000000c0)=r6, 0x4) 12:21:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x5f000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0xf}}, 0x14}}, 0x0) 12:21:27 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f00000000c0)=""/242) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000340)) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3, 0x4}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) dup3(r0, r6, 0x0) r7 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x1, 0x80) waitid$P_PIDFD(0x3, r7, &(0x7f0000000200), 0xc0000009, &(0x7f0000000280)) 12:21:27 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x20, 0x1501) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f00000000c0)={0x4, 0x0, [{}, {}, {}, {}]}) dup3(r1, r0, 0x0) [ 389.771951][T18486] BPF:Unsupported section found [ 389.777521][T18486] BPF:Unsupported section found [ 389.783224][T18487] BPF:Unsupported section found [ 389.788804][T18487] BPF:Unsupported section found 12:21:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x60}}, 0x14}}, 0x0) [ 389.993958][T18502] BPF:Unsupported section found [ 389.999554][T18502] BPF:Unsupported section found 12:21:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:27 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x378240, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) [ 390.039165][T18503] BPF:Unsupported section found [ 390.071431][T18503] BPF:Unsupported section found [ 390.163805][T18512] BPF:Unsupported section found [ 390.174936][T18512] BPF:Unsupported section found 12:21:28 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4f, 0x4900) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f00000000c0)=0x5) 12:21:28 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x40900, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) semop(0x0, &(0x7f0000000000)=[{0x0, 0x2f, 0x800}, {0x4, 0xff7f, 0x800}], 0x2) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:21:28 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 12:21:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) 12:21:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xbe00, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 390.551355][T18527] BPF:Unsupported section found [ 390.559007][T18526] BPF:Unsupported section found [ 390.577454][T18527] BPF:Unsupported section found [ 390.584462][T18526] BPF:Unsupported section found 12:21:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x0, 0x2}}, 0x14}}, 0x0) 12:21:28 executing program 1: syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x181541) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 12:21:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x0, 0x4}}, 0x14}}, 0x0) 12:21:28 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000440)) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 390.805912][T18547] BPF:Unsupported section found [ 390.807361][T18548] BPF:Unsupported section found [ 390.825246][T18548] BPF:Unsupported section found [ 390.842619][T18547] BPF:Unsupported section found 12:21:29 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f00000001c0)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xa1, 0x0) recvfrom$inet(r1, &(0x7f00000000c0)=""/211, 0xd3, 0x1020, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/246) write(r2, 0x0, 0x1000000) 12:21:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x0, 0xa}}, 0x14}}, 0x0) 12:21:29 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000100)=""/257) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f00000000c0)=0x4) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000000)=0x4040) 12:21:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xbe000000, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 391.198988][T18570] BPF:Unsupported section found [ 391.217735][T18574] BPF:Unsupported section found [ 391.221212][T18570] BPF:Unsupported section found [ 391.243537][T18574] BPF:Unsupported section found 12:21:29 executing program 1: syz_open_procfs(0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000240)={'syz1\x00', {0x46, 0x0, 0x9}, 0x36, [0x3, 0x0, 0x6, 0x0, 0x0, 0xfff, 0x20000, 0x0, 0x0, 0x9b, 0xa6, 0x0, 0xfffffffa, 0x5, 0x3ff, 0x101, 0x0, 0x7, 0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0xfffffffd, 0x8, 0x0, 0x6, 0x8001, 0x0, 0x8, 0x7, 0x0, 0x0, 0x5, 0x0, 0x1, 0x3, 0xfffffff9, 0xfffffff8, 0x4, 0x100, 0xffffffff, 0x0, 0x80000001, 0x0, 0x3, 0xf3cb, 0x7, 0x10000, 0x7, 0x4, 0x0, 0xfffffffb, 0x0, 0x8, 0xfffffffd], [0x406a, 0x2, 0x401, 0x285, 0x1000, 0x3ff, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x54cd0000, 0x0, 0x2dd1, 0xffff, 0x0, 0x3, 0x0, 0x1, 0x3, 0x800, 0x80000001, 0x0, 0x0, 0x40, 0x0, 0x800, 0x3ff, 0x400, 0x0, 0x0, 0x4, 0x9, 0x1, 0x6, 0x7f, 0x0, 0xffe00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000001, 0x0, 0x1f, 0x5, 0x101, 0x0, 0x0, 0x0, 0x7fffffff, 0x3, 0x4, 0x0, 0x9, 0xffffffff, 0x0, 0x7, 0x9], [0x1d7f, 0x0, 0x1, 0x8000, 0x4, 0x3, 0x8001, 0x8001, 0xffff0001, 0x544b, 0x0, 0x4, 0x0, 0x10000, 0x1, 0x1c8, 0xc33, 0x0, 0x5, 0x6, 0x8000, 0x6bb6, 0x0, 0x8, 0x0, 0x401, 0x0, 0x9, 0x0, 0x401, 0x7fffffff, 0x31, 0x2, 0x0, 0x3, 0x1, 0xffffffff, 0x7fffffff, 0x4, 0x0, 0x5, 0xf3e, 0x0, 0x1edab421, 0x0, 0x40, 0xfffffff9, 0x1, 0x7fff, 0xfffffffb, 0x0, 0x8000, 0x0, 0x6, 0xf1, 0x8, 0x0, 0x4, 0x0, 0x401, 0x2, 0x9, 0x7fff, 0x3], [0xff, 0x3, 0x2, 0x1, 0x66b3, 0x6, 0x1, 0x2, 0x9, 0xfffffff9, 0xce9b, 0x0, 0x3, 0x3f, 0x0, 0x8, 0x1, 0x20000002, 0x0, 0x8, 0x7, 0x8, 0x8, 0x3, 0xd40, 0x5, 0x9, 0x7, 0x1a8f, 0x3, 0x0, 0x7fff, 0x49b, 0x40, 0x0, 0x1f, 0x4, 0x3, 0x7fffffff, 0x6, 0x9, 0x3, 0xffffffb9, 0x3eee, 0x45, 0x6, 0x3, 0x4, 0x4, 0x0, 0x2, 0x6, 0x0, 0x0, 0x0, 0x5, 0x8, 0x1, 0x0, 0xbf, 0x40000000, 0x14d, 0x3, 0x4]}, 0x45c) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080)=""/243, &(0x7f0000000000)=0xf3) syz_open_dev$sndtimer(&(0x7f0000001300)='/dev/snd/timer\x00', 0x0, 0x400000) r1 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x131054add6ee20c, r1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') getdents64(r3, &(0x7f0000000140)=""/4096, 0x1000) 12:21:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x0, 0xe}}, 0x14}}, 0x0) 12:21:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 391.398227][T18581] BPF:Invalid section offset [ 391.422000][T18581] BPF:Invalid section offset [ 391.455231][T18587] BPF:Unsupported section found [ 391.481809][T18587] BPF:Unsupported section found 12:21:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x0, 0xf}}, 0x14}}, 0x0) 12:21:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 391.582463][T18596] BPF:Unsupported section found [ 391.588053][T18596] BPF:Unsupported section found [ 391.746336][T18607] BPF:Unsupported section found 12:21:29 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0xd00, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/219) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/246) write(r2, 0x0, 0x1000000) 12:21:29 executing program 1: syz_open_procfs(0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000240)={'syz1\x00', {0x46, 0x0, 0x9}, 0x36, [0x3, 0x0, 0x6, 0x0, 0x0, 0xfff, 0x20000, 0x0, 0x0, 0x9b, 0xa6, 0x0, 0xfffffffa, 0x5, 0x3ff, 0x101, 0x0, 0x7, 0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0xfffffffd, 0x8, 0x0, 0x6, 0x8001, 0x0, 0x8, 0x7, 0x0, 0x0, 0x5, 0x0, 0x1, 0x3, 0xfffffff9, 0xfffffff8, 0x4, 0x100, 0xffffffff, 0x0, 0x80000001, 0x0, 0x3, 0xf3cb, 0x7, 0x10000, 0x7, 0x4, 0x0, 0xfffffffb, 0x0, 0x8, 0xfffffffd], [0x406a, 0x2, 0x401, 0x285, 0x1000, 0x3ff, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x54cd0000, 0x0, 0x2dd1, 0xffff, 0x0, 0x3, 0x0, 0x1, 0x3, 0x800, 0x80000001, 0x0, 0x0, 0x40, 0x0, 0x800, 0x3ff, 0x400, 0x0, 0x0, 0x4, 0x9, 0x1, 0x6, 0x7f, 0x0, 0xffe00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000001, 0x0, 0x1f, 0x5, 0x101, 0x0, 0x0, 0x0, 0x7fffffff, 0x3, 0x4, 0x0, 0x9, 0xffffffff, 0x0, 0x7, 0x9], [0x1d7f, 0x0, 0x1, 0x8000, 0x4, 0x3, 0x8001, 0x8001, 0xffff0001, 0x544b, 0x0, 0x4, 0x0, 0x10000, 0x1, 0x1c8, 0xc33, 0x0, 0x5, 0x6, 0x8000, 0x6bb6, 0x0, 0x8, 0x0, 0x401, 0x0, 0x9, 0x0, 0x401, 0x7fffffff, 0x31, 0x2, 0x0, 0x3, 0x1, 0xffffffff, 0x7fffffff, 0x4, 0x0, 0x5, 0xf3e, 0x0, 0x1edab421, 0x0, 0x40, 0xfffffff9, 0x1, 0x7fff, 0xfffffffb, 0x0, 0x8000, 0x0, 0x6, 0xf1, 0x8, 0x0, 0x4, 0x0, 0x401, 0x2, 0x9, 0x7fff, 0x3], [0xff, 0x3, 0x2, 0x1, 0x66b3, 0x6, 0x1, 0x2, 0x9, 0xfffffff9, 0xce9b, 0x0, 0x3, 0x3f, 0x0, 0x8, 0x1, 0x20000002, 0x0, 0x8, 0x7, 0x8, 0x8, 0x3, 0xd40, 0x5, 0x9, 0x7, 0x1a8f, 0x3, 0x0, 0x7fff, 0x49b, 0x40, 0x0, 0x1f, 0x4, 0x3, 0x7fffffff, 0x6, 0x9, 0x3, 0xffffffb9, 0x3eee, 0x45, 0x6, 0x3, 0x4, 0x4, 0x0, 0x2, 0x6, 0x0, 0x0, 0x0, 0x5, 0x8, 0x1, 0x0, 0xbf, 0x40000000, 0x14d, 0x3, 0x4]}, 0x45c) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080)=""/243, &(0x7f0000000000)=0xf3) syz_open_dev$sndtimer(&(0x7f0000001300)='/dev/snd/timer\x00', 0x0, 0x400000) r1 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x131054add6ee20c, r1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') getdents64(r3, &(0x7f0000000140)=""/4096, 0x1000) 12:21:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1b, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x0, 0x60}}, 0x14}}, 0x0) [ 391.776407][T18607] BPF:Unsupported section found 12:21:29 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$RTC_WKALM_RD(r3, 0x80287010, &(0x7f0000000000)) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:21:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 391.873176][T18616] BPF:Section overlap found [ 391.915765][T18616] BPF:Section overlap found 12:21:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x0, 0xf0}}, 0x14}}, 0x0) 12:21:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2f, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 392.091272][T18627] BPF:Unsupported section found 12:21:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x0, 0x2ea}}, 0x14}}, 0x0) 12:21:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 392.141356][T18627] BPF:Unsupported section found [ 392.174535][T18634] BPF:Total section length too long [ 392.239824][T18634] BPF:Total section length too long 12:21:30 executing program 1: syz_open_procfs(0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000240)={'syz1\x00', {0x46, 0x0, 0x9}, 0x36, [0x3, 0x0, 0x6, 0x0, 0x0, 0xfff, 0x20000, 0x0, 0x0, 0x9b, 0xa6, 0x0, 0xfffffffa, 0x5, 0x3ff, 0x101, 0x0, 0x7, 0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0xfffffffd, 0x8, 0x0, 0x6, 0x8001, 0x0, 0x8, 0x7, 0x0, 0x0, 0x5, 0x0, 0x1, 0x3, 0xfffffff9, 0xfffffff8, 0x4, 0x100, 0xffffffff, 0x0, 0x80000001, 0x0, 0x3, 0xf3cb, 0x7, 0x10000, 0x7, 0x4, 0x0, 0xfffffffb, 0x0, 0x8, 0xfffffffd], [0x406a, 0x2, 0x401, 0x285, 0x1000, 0x3ff, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x54cd0000, 0x0, 0x2dd1, 0xffff, 0x0, 0x3, 0x0, 0x1, 0x3, 0x800, 0x80000001, 0x0, 0x0, 0x40, 0x0, 0x800, 0x3ff, 0x400, 0x0, 0x0, 0x4, 0x9, 0x1, 0x6, 0x7f, 0x0, 0xffe00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000001, 0x0, 0x1f, 0x5, 0x101, 0x0, 0x0, 0x0, 0x7fffffff, 0x3, 0x4, 0x0, 0x9, 0xffffffff, 0x0, 0x7, 0x9], [0x1d7f, 0x0, 0x1, 0x8000, 0x4, 0x3, 0x8001, 0x8001, 0xffff0001, 0x544b, 0x0, 0x4, 0x0, 0x10000, 0x1, 0x1c8, 0xc33, 0x0, 0x5, 0x6, 0x8000, 0x6bb6, 0x0, 0x8, 0x0, 0x401, 0x0, 0x9, 0x0, 0x401, 0x7fffffff, 0x31, 0x2, 0x0, 0x3, 0x1, 0xffffffff, 0x7fffffff, 0x4, 0x0, 0x5, 0xf3e, 0x0, 0x1edab421, 0x0, 0x40, 0xfffffff9, 0x1, 0x7fff, 0xfffffffb, 0x0, 0x8000, 0x0, 0x6, 0xf1, 0x8, 0x0, 0x4, 0x0, 0x401, 0x2, 0x9, 0x7fff, 0x3], [0xff, 0x3, 0x2, 0x1, 0x66b3, 0x6, 0x1, 0x2, 0x9, 0xfffffff9, 0xce9b, 0x0, 0x3, 0x3f, 0x0, 0x8, 0x1, 0x20000002, 0x0, 0x8, 0x7, 0x8, 0x8, 0x3, 0xd40, 0x5, 0x9, 0x7, 0x1a8f, 0x3, 0x0, 0x7fff, 0x49b, 0x40, 0x0, 0x1f, 0x4, 0x3, 0x7fffffff, 0x6, 0x9, 0x3, 0xffffffb9, 0x3eee, 0x45, 0x6, 0x3, 0x4, 0x4, 0x0, 0x2, 0x6, 0x0, 0x0, 0x0, 0x5, 0x8, 0x1, 0x0, 0xbf, 0x40000000, 0x14d, 0x3, 0x4]}, 0x45c) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080)=""/243, &(0x7f0000000000)=0xf3) syz_open_dev$sndtimer(&(0x7f0000001300)='/dev/snd/timer\x00', 0x0, 0x400000) r1 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x131054add6ee20c, r1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') getdents64(r3, &(0x7f0000000140)=""/4096, 0x1000) [ 392.262296][T18642] BPF:Unsupported section found 12:21:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x0, 0xa00}}, 0x14}}, 0x0) [ 392.309696][T18642] BPF:Unsupported section found 12:21:30 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000000c0)="e564c469f9f1b20db6f2c4d2c707664528d7db2fc55cdfffc1863d4bc9425b73b3e88c343aa5704d1009f8d2bd94cf6173331242f55f65c95dfd89773c2958fcca824976ba25a8a176b607b12592a3effccc8aeb0ce6b0eef33db48b7da6e0ec33d1bc6c3f33f53eaae72d35467eb22ef9b260699848798cb96c7289e110d85d88ccedb9afc194c80bfc8e763b337eca59cfe4077c84e3af788876a944d719c4ce155d19b1826684a06b5c0de9f5d721e6d537aaf1c1746ef6ad626dbe8b1fcf81f6a5bba18427985041a014bd72e9f98177cacdb3", 0xd5, r0}, 0x68) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000640)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/246) 12:21:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x33, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:30 executing program 1: syz_open_procfs(0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000240)={'syz1\x00', {0x46, 0x0, 0x9}, 0x36, [0x3, 0x0, 0x6, 0x0, 0x0, 0xfff, 0x20000, 0x0, 0x0, 0x9b, 0xa6, 0x0, 0xfffffffa, 0x5, 0x3ff, 0x101, 0x0, 0x7, 0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0xfffffffd, 0x8, 0x0, 0x6, 0x8001, 0x0, 0x8, 0x7, 0x0, 0x0, 0x5, 0x0, 0x1, 0x3, 0xfffffff9, 0xfffffff8, 0x4, 0x100, 0xffffffff, 0x0, 0x80000001, 0x0, 0x3, 0xf3cb, 0x7, 0x10000, 0x7, 0x4, 0x0, 0xfffffffb, 0x0, 0x8, 0xfffffffd], [0x406a, 0x2, 0x401, 0x285, 0x1000, 0x3ff, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x54cd0000, 0x0, 0x2dd1, 0xffff, 0x0, 0x3, 0x0, 0x1, 0x3, 0x800, 0x80000001, 0x0, 0x0, 0x40, 0x0, 0x800, 0x3ff, 0x400, 0x0, 0x0, 0x4, 0x9, 0x1, 0x6, 0x7f, 0x0, 0xffe00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000001, 0x0, 0x1f, 0x5, 0x101, 0x0, 0x0, 0x0, 0x7fffffff, 0x3, 0x4, 0x0, 0x9, 0xffffffff, 0x0, 0x7, 0x9], [0x1d7f, 0x0, 0x1, 0x8000, 0x4, 0x3, 0x8001, 0x8001, 0xffff0001, 0x544b, 0x0, 0x4, 0x0, 0x10000, 0x1, 0x1c8, 0xc33, 0x0, 0x5, 0x6, 0x8000, 0x6bb6, 0x0, 0x8, 0x0, 0x401, 0x0, 0x9, 0x0, 0x401, 0x7fffffff, 0x31, 0x2, 0x0, 0x3, 0x1, 0xffffffff, 0x7fffffff, 0x4, 0x0, 0x5, 0xf3e, 0x0, 0x1edab421, 0x0, 0x40, 0xfffffff9, 0x1, 0x7fff, 0xfffffffb, 0x0, 0x8000, 0x0, 0x6, 0xf1, 0x8, 0x0, 0x4, 0x0, 0x401, 0x2, 0x9, 0x7fff, 0x3], [0xff, 0x3, 0x2, 0x1, 0x66b3, 0x6, 0x1, 0x2, 0x9, 0xfffffff9, 0xce9b, 0x0, 0x3, 0x3f, 0x0, 0x8, 0x1, 0x20000002, 0x0, 0x8, 0x7, 0x8, 0x8, 0x3, 0xd40, 0x5, 0x9, 0x7, 0x1a8f, 0x3, 0x0, 0x7fff, 0x49b, 0x40, 0x0, 0x1f, 0x4, 0x3, 0x7fffffff, 0x6, 0x9, 0x3, 0xffffffb9, 0x3eee, 0x45, 0x6, 0x3, 0x4, 0x4, 0x0, 0x2, 0x6, 0x0, 0x0, 0x0, 0x5, 0x8, 0x1, 0x0, 0xbf, 0x40000000, 0x14d, 0x3, 0x4]}, 0x45c) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080)=""/243, &(0x7f0000000000)=0xf3) syz_open_dev$sndtimer(&(0x7f0000001300)='/dev/snd/timer\x00', 0x0, 0x400000) r1 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x131054add6ee20c, r1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') getdents64(r3, &(0x7f0000000140)=""/4096, 0x1000) 12:21:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x0, 0xe00}}, 0x14}}, 0x0) 12:21:30 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) r4 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0xfffffffffffffff7, 0x300) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x20d5202, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@nodevmap='nodevmap'}, {@cache_none='cache=none'}, {@posixacl='posixacl'}, {@version_L='version=9p2000.L'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@seclabel='seclabel'}]}}) [ 392.593120][T18661] BPF:Unsupported section found [ 392.598969][T18662] BPF:Total section length too long [ 392.610157][T18661] BPF:Unsupported section found [ 392.616011][T18662] BPF:Total section length too long 12:21:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0xb, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x0, 0xec0}}, 0x14}}, 0x0) [ 392.765063][T18677] BPF:Unsupported section found [ 392.788338][T18679] BPF:Section overlap found [ 392.800414][T18677] BPF:Unsupported section found [ 392.813527][T18679] BPF:Section overlap found 12:21:30 executing program 1: creat(0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000240)={'syz1\x00', {0x0, 0x0, 0x9}, 0x36, [0x3, 0x0, 0x6, 0x0, 0x0, 0xfff, 0x20000, 0x0, 0x0, 0x9b, 0xa6, 0x0, 0xfffffffa, 0x5, 0x3ff, 0x101, 0x0, 0x7, 0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8001, 0x0, 0x8, 0x7, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0xfffffff9, 0xfffffff8, 0x0, 0x0, 0xffffffff, 0x0, 0x80000001, 0x0, 0x3, 0xf3cb, 0x7, 0x10000, 0x7, 0x4, 0x0, 0x0, 0x0, 0x8], [0x406a, 0x2, 0x401, 0x285, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54cd0000, 0x0, 0x2dd1, 0xffff, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x40, 0x0, 0x800, 0x3ff, 0x400, 0x0, 0x0, 0x4, 0x9, 0x1, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1f, 0x5, 0x101, 0x0, 0x0, 0x0, 0x7fffffff, 0x3, 0x4, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x9], [0x1d7f, 0x0, 0x1, 0x0, 0x0, 0x3, 0x8001, 0x0, 0xffff0001, 0x544b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0x0, 0x6bb6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x31, 0x0, 0x0, 0x3, 0x1, 0xffffffff, 0x7fffffff, 0x4, 0x0, 0x0, 0xf3e, 0x0, 0x0, 0x0, 0x40, 0xfffffff9, 0x1, 0x7fff, 0x0, 0x0, 0x8000, 0x0, 0x6, 0xf1, 0x0, 0x0, 0x4, 0x0, 0x401, 0x2, 0x9, 0x7fff, 0x3], [0xff, 0x3, 0x0, 0x1, 0x66b3, 0x6, 0x1, 0x2, 0x0, 0x0, 0xce9b, 0x0, 0x3, 0x3f, 0x0, 0x8, 0x1, 0x20000002, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3, 0x0, 0x5, 0x9, 0x7, 0x1a8f, 0x3, 0x0, 0x7fff, 0x49b, 0x40, 0x0, 0x0, 0x0, 0x3, 0x7fffffff, 0x6, 0x9, 0x3, 0xffffffb9, 0x3eee, 0x45, 0x6, 0x3, 0x0, 0x4, 0x0, 0x2, 0x6, 0x0, 0x0, 0x0, 0x5, 0x8, 0x1, 0x0, 0xbf, 0x40000000, 0x14d, 0x3, 0x4]}, 0x45c) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x131054add6ee20c, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') getdents64(r1, &(0x7f0000000140)=""/4096, 0x1000) 12:21:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x0, 0xf00}}, 0x14}}, 0x0) 12:21:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 393.033340][T18695] BPF:Unsupported section found [ 393.046772][T18695] BPF:Unsupported section found 12:21:31 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/220, 0xdc}, {&(0x7f00000001c0)=""/147, 0x93}, {&(0x7f0000000280)=""/255, 0xff}], 0x3}, 0xc7dfab10665feed8) bind$rxrpc(r2, &(0x7f0000000400)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e24, 0x4, @local}}, 0x24) 12:21:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x1b, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x0, 0x3f00}}, 0x14}}, 0x0) 12:21:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x18000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:31 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="39000000060000000001000000000100be0306000000000000ad"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) clock_getres(0x0, &(0x7f0000000000)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:21:31 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/232) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:21:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x0, 0x4000}}, 0x14}}, 0x0) [ 393.258264][T18707] BPF:Unsupported section found [ 393.271816][T18710] BPF:Unsupported section found [ 393.289707][T18710] BPF:Unsupported section found [ 393.295660][T18707] BPF:Unsupported section found 12:21:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x2f, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x0, 0x6000}}, 0x14}}, 0x0) 12:21:31 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x400448c9, &(0x7f0000000340)={'veth0\x00'}) [ 393.542493][T18728] BPF:Unsupported section found 12:21:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x20000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 393.569700][T18728] BPF:Unsupported section found [ 393.577369][T18732] BPF:Invalid section offset [ 393.608018][T18732] BPF:Invalid section offset [ 393.731195][T18742] BPF:Unsupported section found [ 393.757039][T18742] BPF:Unsupported section found 12:21:31 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r2) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000000)={'irlan0\x00', 0x6}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) write$binfmt_aout(r4, &(0x7f00000000c0)={{0x0, 0x5, 0x0, 0x132, 0x2f9, 0xc2, 0x371, 0x4}, "f404ad042b35e2c593cb8299f123cfa24b88652f5949029eadf826bce02fd77c6b3c8ab97534dedf884f53d434d2367b4bd41a8536bea622fbb4f8c3207b0a2a7cd8919b184579d715c99eeb455377efe44c71d33a57b579ce0757300710b5ba4be0e8fffc1f4b7aedf8f0ffd30c29d43e5c7660716c3713819702b0a0aae2432bf0cbb566464f9eaa416a130a90a7d4b5db952552000db4d1", [[], [], []]}, 0x3b9) 12:21:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x0, 0xc00e}}, 0x14}}, 0x0) 12:21:31 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x400448c9, &(0x7f0000000340)={'veth0\x00'}) 12:21:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x33, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x40000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 393.888025][T18756] BPF:Invalid section offset [ 393.905222][T18752] BPF:Unsupported section found [ 393.918068][T18756] BPF:Invalid section offset [ 393.931159][T18752] BPF:Unsupported section found 12:21:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x0, 0xea02}}, 0x14}}, 0x0) 12:21:31 executing program 1: socketpair$unix(0x1, 0x200400000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x924924924924c31, 0x0) write$UHID_SET_REPORT_REPLY(r0, 0x0, 0x0) close(r0) 12:21:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:31 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x19) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f00000002c0)=""/186) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r4, 0xc0845657, &(0x7f00000000c0)={0x0, @bt={0x100, 0x5, 0x1, 0x1, 0x4, 0xfffffeff, 0x2, 0x0, 0x7, 0x8, 0x5, 0x2, 0x1, 0x99, 0x2, 0x8}}) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:21:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 394.101919][T18772] BPF:Unsupported section found [ 394.128793][T18772] BPF:Unsupported section found [ 394.151738][T18774] BPF:Unsupported section found 12:21:32 executing program 1: socketpair$unix(0x1, 0x200400000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x924924924924c31, 0x0) write$UHID_SET_REPORT_REPLY(r0, 0x0, 0x0) close(r0) 12:21:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x0, 0xf000}}, 0x14}}, 0x0) [ 394.176045][T18774] BPF:Unsupported section found 12:21:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301, 0x0, 0x0, {0x2, 0x0, 0xffff}}, 0x14}}, 0x0) 12:21:32 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) fcntl$setstatus(r1, 0x4, 0x6400) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:21:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0xf}}, 0x0) [ 394.555186][T18799] BPF:Total section length too long [ 394.561810][T18800] BPF:Unsupported section found [ 394.584008][T18799] BPF:Total section length too long [ 394.584031][T18800] BPF:Unsupported section found 12:21:32 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f00000000c0)=""/262) r2 = dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000000)=[0x1ff, 0x1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x208100, 0x0) ioctl$PIO_FONTX(r4, 0x4b6c, &(0x7f0000000200)="a525ec5a14889dfae1bd31b9b4a146dc050a79faaa652a6a4abd7bd4776fe68065caa9c5916ee664b8d2e60ccfe9f01c7fad8f3513cb0091f018fdad7cf69ee78270a3671d391a9eca30eb22d59c32") 12:21:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:32 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='\a\x00\x00\x19\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) fchmodat(r3, &(0x7f0000000040)='./file0\x00', 0x1) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) write(r4, 0x0, 0x1000000) r5 = fsopen(&(0x7f0000000100)='configfs\x00', 0x1) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000280)=0xe8) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r12) r13 = getegid() r14 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0x310) setfsgid(r15) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) r17 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0x310) setfsgid(r18) r19 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r20 = dup(r19) getsockopt$bt_BT_DEFER_SETUP(r20, 0x12, 0x7, 0x0, &(0x7f0000000040)) r21 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r21) r22 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r22, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={r23, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r21, 0x84, 0x6, &(0x7f0000000440)={r23, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000a80)=ANY=[@ANYRES32=r23, @ANYBLOB="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"], &(0x7f0000000000)=0x6b) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r17, 0x84, 0x6c, &(0x7f00000003c0)={r23, 0xc0, "eae0d4475cbe1303f1fc148981bc12afdb2d55f7d5a692a61f500a4dd6bf1f807d0291327f7697bd4196f05640fed30053feaec3b92922811771b5ccf234dd71bbfa03d1029261f9a058715cc6af8c356691386b9491b7c55aa1e9edad95f8b3c58716df26299c28a60f8bc8dbc1d51154010ae25d8e9d968a57506afafa4f91a378f88745e353de799bc670a121dd801fb0add8662e7d59f247644c6937ef3d9cc7f5b4dececbaefe57cef5cdedfa26c2074159d1aa972fa2ba2ade48d1c476"}, &(0x7f00000004c0)=0xc8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r20, 0x84, 0xa, &(0x7f0000000500)={0x3, 0x9, 0x4, 0x3, 0x0, 0x3f000000, 0x2, 0x3, r24}, 0x20) fsetxattr$system_posix_acl(r5, &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000340)={{}, {0x1, 0x1}, [{0x2, 0x6}, {0x2, 0x4, r7}, {0x2, 0x8, r9}, {0x2, 0x6dbdbb95a133b4d0, r10}, {0x2, 0x0, r12}], {0x4, 0x5}, [{0x8, 0x1, r13}, {0x8, 0xba5a6adda0dfc236, r15}, {0x8, 0x96a8cdb55870360, r16}, {0x8, 0x2, r18}], {0x10, 0x1}, {0x20, 0x4}}, 0x6c, 0x1) 12:21:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x60000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0xc0}}, 0x0) [ 394.803431][T18813] BPF:Total section length too long [ 394.835011][T18816] BPF:Unsupported section found [ 394.846272][T18816] BPF:Unsupported section found 12:21:32 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000000)=0x62, &(0x7f0000000040)=0x1) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$bt_BT_POWER(r5, 0x112, 0x9, &(0x7f00000000c0)=0x23, &(0x7f0000000100)=0x1) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) [ 394.881312][T18813] BPF:Total section length too long 12:21:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:32 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @reserved="a65475ccc823ba150eac831bc79bde47feea9fa1f13ccef5f8e909936bdc52e5"}}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r6, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r6, 0xd}}, 0x10) 12:21:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0xec0}}, 0x0) [ 395.068941][T18831] BPF:Unsupported section found [ 395.088290][T18834] BPF:Total section length too long [ 395.099685][T18831] BPF:Unsupported section found [ 395.108888][T18834] BPF:Total section length too long 12:21:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x7, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:33 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @reserved="a65475ccc823ba150eac831bc79bde47feea9fa1f13ccef5f8e909936bdc52e5"}}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r6, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r6, 0xd}}, 0x10) [ 395.278477][T18844] BPF:Unsupported section found 12:21:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x33fe0}}, 0x0) 12:21:33 executing program 0: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='bridge_slave_0\x00', 0x10) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r4) getsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) dup3(r3, r0, 0x0) write(r3, 0x0, 0x0) [ 395.339167][T18844] BPF:Unsupported section found [ 395.342462][T18849] BPF:Total section length too long [ 395.372077][T18849] BPF:Total section length too long 12:21:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x9, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 395.535569][T18862] BPF:Total section length too long [ 395.541567][T18862] BPF:Total section length too long [ 395.572506][T18865] BPF:Unsupported section found 12:21:33 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xc2a06, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$KVM_SET_CLOCK(r3, 0x4030ae7b, &(0x7f0000000000)={0x7, 0x81}) 12:21:33 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @reserved="a65475ccc823ba150eac831bc79bde47feea9fa1f13ccef5f8e909936bdc52e5"}}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r6, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r6, 0xd}}, 0x10) 12:21:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x7ffff}}, 0x0) 12:21:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x29, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 395.591310][T18865] BPF:Unsupported section found [ 395.683622][T18877] BPF:Total section length too long 12:21:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x20000194}}, 0x0) [ 395.723784][T18877] BPF:Total section length too long 12:21:33 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @reserved="a65475ccc823ba150eac831bc79bde47feea9fa1f13ccef5f8e909936bdc52e5"}}) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r5, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r5, 0x2}}, 0x18) [ 395.744545][T18880] BPF:Unsupported section found [ 395.755721][T18880] BPF:Unsupported section found 12:21:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x63, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xbe000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 395.897880][T18889] BPF:Total section length too long 12:21:33 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x201, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = dup3(r1, r0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x7ff, 0x7, &(0x7f0000000540)=[{&(0x7f0000000140)="6ce158b2205af6ea811f14c37af48584289de5d323f45a5ee543949d9308f3be9846975b335ec79716cb10157465fd51a2568dd8d8c731c5d0240c1c736706408c9ba40510e92df1f8f081ff07caa77f6e1781d794c7200f76c1175f3b5168f327", 0x61, 0x100000001}, {&(0x7f00000001c0)="63777a11c2b09caa9b4f68f5650b1517447edfee5a90a496654df12604368a410ef00c7f703d8586c4f271a48493f997cb656ceec1b8c62e03077e5f8ab914b8b8438421ddc4b2b342640c4889d0a98a27062d7230fdbc82b72463e95647c38fadfcbf82c52d2b03672c3eb991c4ec886e40016287afd669a66212fd72d0485b6a969eb15e1d10bfb680f2d59d5b07e790763dcecf532c8c547358fd", 0x9c, 0x7}, {&(0x7f0000000280)="8bee45452c351f1437edf90a00718424b1e850f4ad8a8120672ba0c8327238aa7fd0b59a8a73393e3ee80621446dcf1798b8b38d762e88f8dca73aa888ba7e3d11eadb604492dc7a83a0344c14f014a7664d1b10fc7072d5987f84cf59807489e4731d9a607bde580d0248941a3cf70739384285919594b1d65bc3ae7b97b42dac90581aad688612169874057a96df", 0x8f}, {&(0x7f0000000340)="f218b3220053f568cfb0e9f5a45753ce18fcb82e1a138e", 0x17, 0x8}, {&(0x7f0000000380)="5325b4346539d4f23007d8604310fb8bc751d189ef184c5276643da73cd4c6acf4e34595913929d0a0562110f5c6070ac0d9f75a2556f41235013493d2733f53e5cc4ce569f90453428ba874e1e5db312054180eedc965682adb1659bc3fe2c7529e3235fa8fc2eeee7cfd44244d1ae2480d46fd8bcbc908200ee41c30d663370532a32b2e6c7eda6cf80aa4dd09eb29a98049c902be", 0x96, 0x4}, {&(0x7f0000000440)="56bdb8f6b236706d225460d86a092cea75b9f6d093672ff665c864f7147c7ca20c6331bcaf3c1fa51914a52fb15d048ada9813696e5be39b2be7bb970b1c33ed1cf4beb3786f3f079165867a9eaa9c31cdaea8ea9cde132829e318b231b938a41060a74146f24d65b0ca7e8b09bb7447c6f5", 0x72}, {&(0x7f00000004c0)="5019700ff532f0e7a661d8b977d6c079595a4283e4aee4c15b8a9f6687ca298ad0f4360c45e3c9bcf40a113e388114390ead56b9231158852781b8f115d5b513832c596ffdd8729e689255833d6f56b1591265ea5ddc86e7424af49058c3f9e717312eefde84f4fbb7c0445b0ab9cdd427339ebfc0423a409519", 0x7a, 0x6}], 0x4802, 0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000080)) shmget$private(0x0, 0x1000, 0x80, &(0x7f0000ffe000/0x1000)=nil) write(r1, 0x0, 0x0) 12:21:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x7ffff000}}, 0x0) 12:21:33 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @reserved="a65475ccc823ba150eac831bc79bde47feea9fa1f13ccef5f8e909936bdc52e5"}}) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r5, 0x2}}, 0x18) [ 395.967635][T18889] BPF:Total section length too long [ 395.971777][T18895] BPF:Invalid section offset [ 396.001151][T18895] BPF:Invalid section offset 12:21:34 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x12, 0x7, 0x0, &(0x7f0000000040)) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20010, r1, 0x10000000) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000640)=""/246) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$UFFDIO_WAKE(r6, 0x8010aa02, &(0x7f00000000c0)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) r7 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$RTC_PLL_SET(r7, 0x40207012, &(0x7f0000000000)={0x4, 0x7fffffff, 0x1c0000, 0x6, 0x7, 0x7f, 0x4}) write(r3, 0x0, 0x1000000) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r9 = dup(r8) getsockopt$bt_BT_DEFER_SETUP(r9, 0x12, 0x7, 0x0, &(0x7f0000000040)) fallocate(r9, 0x8, 0x4, 0x656c6e34) r10 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x420800, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r10, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'netdevsim0\x00', 0x2}, 0x18) 12:21:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x3, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0xfffffdef}}, 0x0) 12:21:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff00, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:34 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @reserved="a65475ccc823ba150eac831bc79bde47feea9fa1f13ccef5f8e909936bdc52e5"}}) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r5, 0x2}}, 0x18) 12:21:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x2}, 0x0) [ 396.377580][T18917] BPF:[1] Invalid name_offset:3 [ 396.395183][T18922] BPF:Invalid section offset [ 396.409813][T18917] BPF:[1] Invalid name_offset:3 [ 396.419087][T18922] BPF:Invalid section offset 12:21:34 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @reserved="a65475ccc823ba150eac831bc79bde47feea9fa1f13ccef5f8e909936bdc52e5"}}) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r5, 0x2}}, 0x18) 12:21:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x29, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 396.573097][T18934] BPF:[1] Invalid name_offset:41 [ 396.598240][T18934] BPF:[1] Invalid name_offset:41 12:21:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x3fe, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x4}, 0x0) 12:21:34 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/oev/ppp\x00', 0x100, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f00000002c0)=0x80) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000500)=""/256) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) syz_open_dev$video4linux(&(0x7f00000003c0)='/dev/v4l-subdev#\x00', 0x400, 0xd00) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$VIDIOC_DECODER_CMD(r6, 0xc0485660, &(0x7f0000000340)={0xb7f07912e839cbee, 0x1, @stop_pts=0x2}) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000000)=0x1, 0x4) r7 = dup3(r1, r0, 0x0) r8 = syz_open_dev$dspn(&(0x7f00000000c0)='/d\x84S/dsp7\x00', 0xfd, 0x84800) write$USERIO_CMD_SET_PORT_TYPE(r8, &(0x7f0000000300)={0x1, 0x1f}, 0x2) ioctl$KVM_IOEVENTFD(r8, 0x4040ae79, &(0x7f0000000240)={0x1000, &(0x7f0000000200), 0x0, r7}) write(r1, 0x0, 0x0) [ 396.694605][T18940] BPF:Unsupported section found [ 396.737596][T18940] BPF:Unsupported section found [ 396.758521][T18946] BPF:[1] Invalid name_offset:1022 [ 396.789130][T18946] BPF:[1] Invalid name_offset:1022 12:21:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EVIOCGABS0(r3, 0x80184540, &(0x7f00000000c0)=""/151) 12:21:34 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @reserved="a65475ccc823ba150eac831bc79bde47feea9fa1f13ccef5f8e909936bdc52e5"}}) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 12:21:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x8}, 0x0) 12:21:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0xffffff, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:34 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) write(r3, &(0x7f00000000c0)="daaa1fed391e7eb1febe4a4e1fc7073d9cadbfaa975a19ccd3ca70f7984205df199c2338430bb5e0f85ce05c55007db6dcc1577231880d7194e6f65162c428c6f95e17817e62e0a1ae79a8116a639df60b53dbcbc75eb46d2c668dd1b51166b85b1fe4b7ad76ba5f02e2a94fd451a931929c49c434809d2880a3ed91e1d62ea88693d317ef", 0x85) [ 397.024404][T18961] BPF:Section overlap found [ 397.046758][T18961] BPF:Section overlap found [ 397.049640][T18966] BPF:[1] Invalid name_offset:16777215 [ 397.061489][T18966] BPF:[1] Invalid name_offset:16777215 12:21:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x300}, 0x0) 12:21:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x2, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1d, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:35 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @reserved="a65475ccc823ba150eac831bc79bde47feea9fa1f13ccef5f8e909936bdc52e5"}}) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 12:21:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0xffffff1f}, 0x0) [ 397.235135][T18979] BPF:[1] DATASEC [ 397.247048][T18979] BPF: [ 397.250406][T18979] BPF:meta_left:12 meta_needed:24 [ 397.261403][T18980] BPF:Total section length too long [ 397.277701][T18979] BPF: [ 397.277701][T18979] [ 397.297592][T18979] BPF:[1] DATASEC [ 397.301630][T18980] BPF:Total section length too long [ 397.331837][T18979] BPF: [ 397.348689][T18979] BPF:meta_left:12 meta_needed:24 12:21:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 397.374967][T18979] BPF: [ 397.374967][T18979] [ 397.496364][T18996] BPF:Total section length too long [ 397.510333][T18996] BPF:Total section length too long 12:21:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x9, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:35 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @reserved="a65475ccc823ba150eac831bc79bde47feea9fa1f13ccef5f8e909936bdc52e5"}}) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 12:21:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x2}, 0x0) 12:21:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:35 executing program 0: setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x4a0200, 0x0) listxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/84, 0x54) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000004c0)=0xfffffffd, 0x4) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=""/134, 0x86) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$MON_IOCX_GETX(r4, 0x4018920a, &(0x7f00000001c0)={&(0x7f0000000040), &(0x7f0000000200)=""/213, 0x307}) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000180)={0xfff}, 0x4) 12:21:35 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x8000}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000000c0)={r3, @in={{0x2, 0x4e22, @remote}}}, 0x84) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r4, 0x4004743d, &(0x7f0000000c00)=""/246) write(r4, 0x0, 0x1000000) [ 397.682550][T19007] BPF:Total section length too long [ 397.698629][T19011] BPF:[1] DATASEC [ 397.704595][T19007] BPF:Total section length too long [ 397.722228][T19011] BPF: [ 397.730884][T19011] BPF:meta_left:12 meta_needed:108 12:21:35 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @reserved="a65475ccc823ba150eac831bc79bde47feea9fa1f13ccef5f8e909936bdc52e5"}}) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r4, 0x2}}, 0x18) 12:21:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x4}, 0x0) [ 397.755714][T19011] BPF: [ 397.755714][T19011] 12:21:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2f, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:35 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$MON_IOCQ_RING_SIZE(r3, 0x9205) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) [ 397.809453][T19011] BPF:[1] DATASEC [ 397.826281][T19011] BPF: [ 397.846268][T19011] BPF:meta_left:12 meta_needed:108 [ 397.887428][T19011] BPF: [ 397.887428][T19011] [ 397.918922][T19025] BPF:Total section length too long 12:21:35 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @reserved="a65475ccc823ba150eac831bc79bde47feea9fa1f13ccef5f8e909936bdc52e5"}}) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r4, 0x2}}, 0x18) 12:21:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0xa, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xa}, 0x0) [ 397.945068][T19025] BPF:Total section length too long 12:21:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x32, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 398.075830][T19036] BPF:[1] DATASEC 12:21:36 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @reserved="a65475ccc823ba150eac831bc79bde47feea9fa1f13ccef5f8e909936bdc52e5"}}) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r4, 0x2}}, 0x18) [ 398.104853][T19036] BPF: [ 398.116511][T19036] BPF:meta_left:12 meta_needed:120 [ 398.135073][T19036] BPF: [ 398.135073][T19036] [ 398.147917][T19042] BPF:Total section length too long 12:21:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xe}, 0x0) [ 398.161838][T19042] BPF:Total section length too long [ 398.186667][T19036] BPF:[1] DATASEC [ 398.202488][T19036] BPF: [ 398.205400][T19036] BPF:meta_left:12 meta_needed:120 12:21:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 398.259983][T19036] BPF: [ 398.259983][T19036] 12:21:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x111803, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/de\x01\x00\xd9\x00\x00\x10\x00', 0x1a865d79ad64c22a, 0x0) r5 = socket$l2tp(0x18, 0x1, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) getsockopt$bt_BT_DEFER_SETUP(r8, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$DRM_IOCTL_SET_VERSION(r8, 0xc0106407, &(0x7f0000000500)={0xffffffff, 0x7, 0x2, 0xbcb}) fcntl$setownex(r5, 0xf, &(0x7f0000000540)={0x4, r6}) mq_notify(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x6, 0x1, @tid=r6}) setsockopt$CAN_RAW_LOOPBACK(r4, 0x65, 0x3, &(0x7f0000000240), 0x4) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r3) r9 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={r10, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000440)={r10, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000a80)=ANY=[@ANYRES32=r10, @ANYBLOB="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"], &(0x7f0000000000)=0x6b) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)={r10, 0xb1, "0c90d28022b812711c1ae4e1c40d1cb80822efd3e05e7c9ece6d1547de2ff952f156e7c03c58464a0e22faf16df71621e4c3cfaa5f1213ad61eba89810790384db8a70a3f848e6fc81604563c3d7398cb355758dc3eb1cd24fe6322bf11beb0549c5bc7663bd0616183e97336852109a1c0482bdfe20c20cb0c212f5d5b64b8c10c8e4f28662b0c1a4e68d352e148a1bdc5709f68984913fff565864161df1c78dcc42a168245c428a4853f0c0277e3fe3"}, &(0x7f0000000000)=0xb9) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={r11, 0x7}, 0x8) dup(r2) write(r1, 0x0, 0x1d9b81d6f736d2f3) r12 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r13 = dup(r12) getsockopt$bt_BT_DEFER_SETUP(r13, 0x12, 0x7, 0x0, &(0x7f0000000040)) r14 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r15 = dup(r14) getsockopt$bt_BT_DEFER_SETUP(r15, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$RDS_RECVERR(r15, 0x114, 0x5, &(0x7f0000000400)=0x5, 0x4) r16 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0x80000001, 0x210002) ioctl$ASHMEM_GET_PROT_MASK(r16, 0x7706, &(0x7f0000000380)) 12:21:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xf}, 0x0) 12:21:36 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @reserved="a65475ccc823ba150eac831bc79bde47feea9fa1f13ccef5f8e909936bdc52e5"}}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r5, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r5, 0x2}}, 0x18) [ 398.363142][T19055] BPF:Total section length too long 12:21:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x25, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 398.403765][T19055] BPF:Total section length too long [ 398.527852][T19068] BPF:[1] DATASEC 12:21:36 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) ioctl$PPPIOCSNPMODE(0xffffffffffffffff, 0x4008744b, &(0x7f0000000000)={0x2f, 0x1}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r2) r3 = dup3(r2, 0xffffffffffffffff, 0x0) dup3(r3, r0, 0x0) write(r1, 0x0, 0x0) 12:21:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8d, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) write$eventfd(r3, &(0x7f0000000000)=0xff, 0x8) write(r1, 0x0, 0x1000000) 12:21:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x60}, 0x0) 12:21:36 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r5, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r5, 0x2}}, 0x18) [ 398.580800][T19068] BPF: [ 398.584107][T19068] BPF:meta_left:12 meta_needed:444 [ 398.640718][T19068] BPF: [ 398.640718][T19068] [ 398.676753][T19068] BPF:[1] DATASEC [ 398.688372][T19078] BPF:Total section length too long [ 398.714171][T19068] BPF: 12:21:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xf0}, 0x0) 12:21:36 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r4, 0x2}}, 0x18) [ 398.724111][T19078] BPF:Total section length too long [ 398.726539][T19068] BPF:meta_left:12 meta_needed:444 [ 398.743035][T19068] BPF: [ 398.743035][T19068] 12:21:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x29, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3e4, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x2ea}, 0x0) [ 398.917123][T19095] BPF:Total section length too long 12:21:36 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r3, 0x2}}, 0x18) [ 398.959558][T19099] BPF:[1] DATASEC [ 398.966400][T19095] BPF:Total section length too long [ 399.012672][T19099] BPF: 12:21:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xa00}, 0x0) [ 399.037785][T19099] BPF:meta_left:12 meta_needed:492 [ 399.063375][T19099] BPF: [ 399.063375][T19099] [ 399.106217][T19099] BPF:[1] DATASEC [ 399.114532][T19099] BPF: [ 399.128909][T19099] BPF:meta_left:12 meta_needed:492 [ 399.150338][T19099] BPF: [ 399.150338][T19099] 12:21:37 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = dup3(r1, r0, 0x0) write$P9_RLINK(r2, &(0x7f0000000040)={0x7, 0x47, 0x2}, 0x7) open(&(0x7f0000000000)='./file0\x00', 0x142, 0x4) write(r1, 0x0, 0x0) 12:21:37 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0xb, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:37 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r3, 0x2}}, 0x18) 12:21:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xe00}, 0x0) 12:21:37 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x100015e) 12:21:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x63, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 399.328525][T19121] BPF:[1] DATASEC [ 399.340130][T19128] BPF:Section overlap found [ 399.350174][T19121] BPF: [ 399.363424][T19121] BPF:meta_left:12 meta_needed:1188 12:21:37 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 12:21:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xec0}, 0x0) [ 399.377324][T19128] BPF:Section overlap found [ 399.381823][T19121] BPF: [ 399.381823][T19121] [ 399.401915][T19121] BPF:[1] DATASEC [ 399.409878][T19121] BPF: [ 399.428329][T19121] BPF:meta_left:12 meta_needed:1188 12:21:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) preadv(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/89, 0x59}], 0x1, 0x8000) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5a, 0x60000) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) write(r3, 0x0, 0x1000000) [ 399.469924][T19121] BPF: [ 399.469924][T19121] 12:21:37 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x1a, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x3bd, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:37 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) [ 399.594798][T19145] BPF:Unsupported section found [ 399.626414][T19145] BPF:Unsupported section found [ 399.649092][T19149] BPF:[1] DATASEC [ 399.654832][T19149] BPF: [ 399.657744][T19149] BPF:meta_left:12 meta_needed:11484 [ 399.669802][T19149] BPF: [ 399.669802][T19149] [ 399.716788][T19149] BPF:[1] DATASEC [ 399.741262][T19149] BPF: [ 399.747620][T19149] BPF:meta_left:12 meta_needed:11484 [ 399.759692][T19149] BPF: [ 399.759692][T19149] 12:21:37 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000840)='/dev/dmmidi#\x00', 0x794b56d9, 0x0) write$P9_RCREATE(r2, &(0x7f0000000880)={0x18, 0x73, 0x1, {{0xe4, 0x1, 0x4}, 0x8}}, 0x18) sendmmsg$alg(r0, &(0x7f0000006740)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)="837e0a47d89979e37a791d9c39331f50bb1474525fe4f0ffe05c13703ff300cf2d38c0cc9385e47b4570073412a69317190f556cf9af5e9d7360ff51ca20f7833e032816b88a77538de6d9c1738ed06fecb213eadc6c496557a3cbc03f3ab2593c8328d5422e20b18b9c97e07d7b90f3461f256084a35d5f6bd51bbef6c3", 0x7e}, {&(0x7f00000000c0)="9e7669485bc3720d6eea4ff46818c4ec1426203b1b54faa1a2a44a4ee6f9b1f276d93f0ed9cb5ff955444c37a146a4b162118c1ace1c53554259", 0x3a}, {&(0x7f0000000100)="1a73d51a0f16222e1b8d064e939d658a6e3801c80bda5037db0954160f19a512ba0aae737dd76530e25e2e8b5a250aa47a299ea7c8617d35a20a49c7546bdb7bec1a09d4c2fcd4c804b9f5d840772cafde3dbba8cc8e9665a207724dc3dbbbb89b68ac41da0d089b5d98fb1ff265993c999607520ad8e53f163adcea1d3e52fb94181d5aae3a9a013b38cc676cadb97972f13232a18bd68c41147bb777c5674b", 0xa0}, {&(0x7f00000001c0)="199a86f31473fccb6dfeb14d7d99866bd08931c43297ffb98028d96c65b8b9583cf1475513cf2d1dcb908f32fe5bcfd76b93d6c672ba7e6512b06d9caaaf4dad11e9ec40365527d5ee4c18b6629158add931385965ec6db06eb0133207e40a12b52279ef0b248fab92781eb5b6a6aa4c97d3cc1df060a5d59715baae05ff53dfd2e4fd36613c5a140325daf6359a588d06ddfb0a25f5bb4670ab39b7bbce797816bcce794775fd1bbe5c78b3", 0xac}, {&(0x7f0000000280)="8ed5a4604bcb73bfa662475347fb9a2e5d0f0df83c44be929672d5f177870f8c25739e769166a3a95d7293543a9f24f1b7da8eb5937b7a4b2160c5e0084ef26b42c09925fc72e5b3561deaf228ddf7f56f3d797a255070bc8e9853b1f9879cb1f4216cf96be4135359dedd3ea44d4dc7be2b9d1cb7a8aedc70c0b53b80007dd2c8aea9eaf6b3b1438e1c1c5baf29819ad300824b613dc547653ed324fb6d199c00c0fbc5598a9badcba1ae8b5368bccedbd5ae74677a17770a474f2d8ec3", 0xbe}, {&(0x7f0000000340)="3716a71d4c6a8f65c7516fe2291ce049c3011b28e1626e13c0e60922c7caeb6705f320188a5cddfcb9", 0x29}, {&(0x7f0000000d00)="f0e78cce6746ebd4d685ef118bbde2dbfd607fdc89a3d79c959aca3f74c48618cddd9fd89eecc68f6759790d3affaddeb5339bf769e95d30174e12a9a58b7a043291bd00a24b04a674c5d134b7989ef9b4c8c2987f3b0beb3586c31275cca05cf569fc3f05bc6eed012cdb8b969516a1061bb29e3ccc10e0c757e20a51740e6994ef49f3cf2e7495c87c0e734c44777b3de45419c904825ccde28ac78dfe073715189a2d77e943ec31ec7daafac9d5d4221ab4cc758b58d7a35240fedc033b70f24dc5b59a47eed9cc86671aca52fb09edee279e650773a7fe79d0f83321bc93477c54671a7f6bbbec7a875af556846d3ef9f44cdc9ac78de260c780c42e83b3d21478fd50f233566eb232cc49d203d652489466ff9f9f51c143355dc19eefeac0087235ff0392e2c124455db8937a3dbf782a36ac6a09b6f00c2f1023f4aeb3dd09136edb6620bf6c716315ce7f82b09e8a1ec4dd9d562a9c2f0b42e0f14f59c72e41d8554eb4526033a1826fee7f0926b3f8d1e466073961c0d33dd3eadd123c3578c2ac3509559e5aee54df43ec96782114bc9245c0da3871d98106a07e169f2f9b2ea87f97fed61904eb8c6e07562a805b5ac69ce5b6d2e5429b95edf2b3cb188af246efb0a94860e0d9528dfcc20ca341e62294b2d3ed20e045f809f74957b4ad533c82be1b55dbea90ad6ea2bd101944031004761f6c3008a4775006adefd9ccf4ce27fb055329c50653e82af1cd6e1439f8164bbef21b7dd37ad5256c9221246a1573071968384d7dadef2db2e5eb31aa4ba720df4c50890caf2775a45aa0c1ed38c792eb195e1feff72c17757ec9711861fb7faa1b4a6e1c63424172972b58860ac8722caf8b4097ffc3cd4cba470bcb7c2cea49ec2a721547f6074ce7c58c96bdaaf66f93dace0e3d80c89245d82ce1ac0a6520a3b10394e05a471e273622b70796ec349f0aa69119a59932df61c71b6ab36acd849a2c7ab72ccafcc026c06117348ae6e3ad70d931ab8ff9ce7eb7c6bf56cf78002a6a324d61f791b15597111596297b4ffb932c896f84352dabce7758bede8cfee0a2778eb5a5b7d5aa46bcec54f1a80ceada026d4d2528c8a3a6418027ff9f579428a10a8e581c3e9224af81e6f018445936472676de125abac08a71881a05933831819e6982742e3a534b29b7630d59d4ab7f633395b49d4eec9e870055754be1dee41e7be0ea89f6c6c20a9552ed5c4d16b7ee661893bb2c925725aa1a346fe5e90235eead8d542c7c0acf0e0fac6e32872ba8c233c7c511fc3801c761e67bc2ebf102eb33a69c58460748ccc9d19206c6d114630ae6a846faff555ec08863ab4c878368ff6161203a1d691e06cb01261d9b693736f1b0b8f7a4c71f6eeba7b7ea44c40ebdcb2e474163fbc8ac6dd2ef7e4a753af770b3c6122956d57161ed297c9acc07852364c8da76f7efbdb5a503cb2fe5960ccf3731050d58d10ac38d4f8570f05f00f0415395ec3130d047ff386d7b2f075065c08079464334bade38259f2e501dbf35c6080dfc0d30a470e17dc8deef4026938e733d64509fd7cf3d617823d069e1848d6943bbc68305a89e10e732cc486cae599e30bed956534409da21918c13d2abb5e096a7cb2cc4826cbd6297f163a1937986d7c8b2efed5cfdf83f37521e678e6786ff350094b27b449bb2e31e1a60b1700d71a803c777e41c01222a1455d6a21100cc05c8c78a7014a4424b4a50b5b9a86cecb64a5468f3f5733b659170831db63d4eb44fbe8e01c675c528c58da003a45a28ed6e61e84f1fd6835fa4bd581ea6d57d1abf4309116b94bb963f663a65852ce4442a61bd4150d17d835bb092ccf5f7921c41e3b8ee70fe29b61b7f59cf6ff81a544300a9d171696abbdc279902ba57918fdd6cb009d9cb51289ed552ede1948066bbecbda35083f5579395f8fc3dd53029b84147e4b91864e670f592a92733abc3e3c6225d3cc7b2f2c02565aa417e4eb1a5c96f989d3f2247076b252d65756b0830e63257ba9d3e010074d8d0cdccd2008015fd4730a877a26ae7d304dc542587355609fd5c237fd05efe05eaa836cf7c3e55b5d43232b811902de992cea358f2afe2fcfa55fea77839f7de0ae52577bbc55900d7267d9fe427c537482eb276507bb1a409c4b266c713f9333d5cea6270ba37337b55e5a897c2afa30065a1d5d2787fcc6dbcb71b3efe3ec89b85bf494d63302cbe676e6de6ba91a14384ed9c5a3bb0cf60a55b42edc4d94b8716b05c161def6e7bc1f0b4e0f5d3974cc8cd80e8644ece9d3356651e3024f8b7b6bb0a775578a163a61cb3dbeda0642f2d42e288fbc305d4333f88544671e6d3fdbd20dcf4b40d2295aa42e1f9118a252bbac491e65fa7a8bd3d6e7364c7a1ec3673717839d45713d5837c2e42270766430a3122a057e53ba9a8cb480c4b6c606e200feb0a3bfea80e44554b19caad5e89d8f5a8d3919abeaf53c3452463d89e72654b241e736468b8b89699dcdb8a5790bced29abb3b5fdcf65b4f1038e539fcf2de776e42e2ce9a4769584e273aba34acd936538321c4f7c7810bced9851b50131a69d9a02efe012ff03668fb3f77008727594a1cc242232a3d3ff573eaf5880d3a1eb18c9b295d56a83087b65ddefe13f9dca77053f8d51444f599d4df23e2245e73f2b6e5f3931eeeca5846b897de39aff35d913baf23523a00e8c806c5a27c05f246cb3b175d35cf5a4d49f4055cc171264dd9d867f8bff651f099213457dbc49a1fe966981740f660d48b7b48281b6d92d64f677a797cadb10c33a24453c7333ea64e83b9e530d8f3c3d9ef5939419e3f2b12d983b70c03615717f75eedcd78a9b72422a38fdd19acbb14a913e13de6d7b0b51cb1f06f7b9960db4ab572462bd6e3fa9fae6a647081fd9d69330f3f5b41dccee2b890c2447f383e85d53da1a49d1bbed064f823589a0e9d62a20585a23568096fd45dfba783d5d6dbddd967f2d3aeea2a34aa0d188fbc58f87dd0af6231d9cbdd376473c329701aea239d943b05802aa819473f9dc1108404e58e0f8185fbff7db1cf14d2debe34c070f3d2de7636505d12260a20a5ba02dc3f047c41b9ad53b1457d1154aba7e1f265705282d2f544c18477040df5bf3a0dfdc12fda4aef0cc349cd8da2d9631406e6a3e8c2d2fa506591dc44ba6c9b0286a52871ffc2ead69bd6fdedc62d5ad2472f251b5f6d8a7bf4f2ee5b3a23027fba5a0a9a16971fa1aebe8756c44ff925237c7b28556a64f6265a1a38325fcbe141aef6156855dc524e4a38f718f146a4537015102e0bf58cb9639cd617061be3146e72ccfc21c6255abb6a2467bae04c2749d85a47f42cae5ffb5fd75535418e8c54e9984a9d9eea49f73b055c38c8a192e570bf26d074bc8a678ecddc1150aac52ed076da9e88a1ef9fe0d83b6caaa59f550898796b262afd8ee1cf4b3bd9fdabd0f81b2c2892f8a2803c633a261994f8644c3e9af346487d1eac1551ec6205c0e0896a3f3a53593da6a8cbf997da9e6df0122fa3dd01c4f06668bc57fb202babe52043dc1064260f88e41655932491d829212e74469e25fdf90cbd3813674ee793f096319d4752d3fdb2e4ad2abc33a41225cf3436707649c5ff7db798db746d5b87d8cb2bb9dc70afd6b7e93e937e25957639540e94501c338b11eaecdb25fd9cc1b35f592edf10607fa0477e1e0331f23beb76a355f8d8da9873d112cf89501887bf31f8a93950406acb70c6008c340eab057f2e882e88a45bab8749d631d4a214cc0103af67751b29c34d045fd68002c07513e65d5916e7c349624a0a0d4794eabaddd16485ff5b8a89431112a5db7548fafedb02bd2d5c8d44f2f67f0202d903ae7064cf138fd1926f3ec1f74c296e84b46fcf54fb6284d6469d1a2bdf83ebffa3a59fcc7f86cf7b3b8b163fe09cafb80eca1270c138359304cc0fa600d0dca562e8119a4f6b6b0a5168eff559a457f6837926e208e74af1c0ea6c54ca217541f01a133333b0074392472aace26b11344abbb58c1f6e5cf4811474411a134e1765fc3ee520270a11414f35bf125522a81120d9c523c1febba9c359edd85d3c8c42728654f4a750215cc3da37f305db30ed2996fedf936a889d2b4cb7523b3a24035b4b70d668c19b74accdee29b1f9b242d8068058db11f140c958f7643502dfcca6ea1ba814710c2b04529621572fff22aefa8fb4714f22efbe94afaf0ab51d83889db54ca46851d98dbb9801e773883a7ef521498b0eaf6e808f7ccc7b09d55f52f861449b536d11a337cfcb348c84690edbbaca0e788ec6776503ebc184cae4275d0b13417498cd3ad594ae651d1b30662e6a075e07806c3dcae5c64a3dc235bdcc702faf8006fb58b4fac2ba4394e5dd2be8339a28c3ab9d774658c78b55105b2feb9ba842734a2449161943447c8bac8a54d32933b75964b67496b645c8d9be682c991184e368c47f8d91ea830bc088f30c9ebaa6dde8f5af4ea55e8db3fc18d3736f7f6a2261cbbebaecf7b1637801efab9d09e3e3865177f3ebc673ad019c06d5a0c94ab238ced76c296670ee567ffcd2e482bcf4ed3dd3dbf649deef212b4833d004dc0aa3a5cf20e3bda5ba8cb210bc4df10003e91353ed6cb40c4f993e1e5c9664b4c1ec72d0560cdf4b7ef935a051882c5e9cdf6bad3507602f47524a6351aa1588f1c1e79a1adf511a8fb9cf2a1a386fdec99bc3a9e7a78778cb8b952541e9d8f076bf3e35170f24cef231f502c7e2b485d6a41574947eaeb9e74a75999b6ef315545eb1cd67d3088f9a2f22cbe123d13b573f49ca49e6f5e8b754ad36d9b04e338520396a0028feacc93200a07103e41345cdc52939af072c8315d3bc36cca60e4925039281a9b682c86fb1a4e2d1bc73eb46e61cc8de3b1f176fb6e71fd2972b3522bc009a590e7e94ddeb612aa7af74e47582acafc955f2c360ecc4f18a44b409c8b775c6d1c17acc08c81a27c74a8d7925e06d216c1de1b915d832f7251f9c84a0b7018daf66664f179fce7727a856059b456a449b0faf0825d3415866093879912201de8c375f51e64cca27d2e94868b066874915847e9e08578476ce90c1a847475bbbdf2b0fa33a80b67ecce8785ef74eab0192190a1e452a6647634611a779dbd54fd90b2312e6162063a9d781ebdbb3b5a92967c363b18c3def32986a088204ee78af0401192d83174e37c7ce9fc2fb1f204a56c0d2870e80c01093fb1eae82cffbf3f2ac025041cbffd0e579a9d69c49fb59351ba3239f9d308b242fbe0f8ffc260c12a7aac3fa0bca39064e7499d930a750aec7485336080a4c2c82edb8f5103e9a4c51b34c53e963bc31229cff68062b156f7576d4dc3b7997217cff44e4ab4a291d7169cb0583c00118f312d628bafd44231377eb1e657f30625a9ec462a183ab0bfe058812b635eb130e15b774fdf8186b16707d3e80aa3cbef3ec1e8f876af6cb4f0b502913c277cea4bacb9b34c87fdb7aa8e158dd4cd381ba64d1d7a4b7d0dd87f353f58bee63b1d2e1132710ecaff842756d5977da7932d953c375ce950a33e78d22eb96665f116205cc3bfc95f017cf9cae42c4f117283e8dce08022e45194902d799c66374a66a9f3423173e9aadd9f687f9ed2af2e649c86ba3f41cf3d8cf4ac5ff80c101b67b6f07d9c9d31bf4da0c580ac3cc087c9b7ebe03e969a5fd78095903a71bee6f7250b2d23ebf45b6df7797088ab619ca7a479091f9afd1a837e53879bf0d360b1cc3d551bd79753834e110a21556572c5e25dee6c3140bb2c7e", 0x1000}, {&(0x7f0000000380)="91d1eb556c02161127ae99ddf5ee25d14307a9f2cd6dd3d3bdfc993271f48875647f4ca2829dc7bb0e388d88464d3831038d204435561dd28e42ee61a8238bfcff4f5398745aa4c1c4fb78fe5adc6a55de1f7ac3b740314f59d13ff4a28c237715ac3c19b99ba4abee42988d1ffd4a752550710c9b94d17f7cbc10fbb0a1d64b191e99f8725dc7909a4375f379e3d3de129a9964dd46b0962e039cdc0c01cb85d870274c2258c114d2d84c73c70c703dec3697bcf0d63e64278e72d0df79f6f490b83d70", 0xc4}, {&(0x7f0000001d00)="d2433c076dfff07d9d3c7afd97e10d372ce22b1f1c92fb952f85bab836450e3da9d42d4fd4b5b74d5ba4a2165c91c53c177b99c2ce2f8db2c7c5e6ca5a0f80f0f9e13b2d30b1b176b568549a1930fc531afacb74b511bb2dbb0c0719d2c2c4ed358514f3f1a0beb7400ed7961b96d0e77c5d9f10a324f6a57431151d527297e2cca6d07325e05a0ae2f00674fd84bb85bcfc75bb5856dc08cdb3904f5b1f2f9011d1e083a7fc75742d1ae19c7bdba2931b5a5af68842218e879da23abdb854481d067a73ba8ac52fab19513a3f4590d7120da71cf428b93b92c54eb8c77610b7be602e87c432e199482d6b9ebc8959b4aa657616c446f6c6d7a2dd4cb718b39608c3280a6c9bc4a54606023c264da667bfb794d0979a788de4d586e1a68a233faa168c08bf84129968deb41f55bcff4d7f7811ba438115b0596cc00acc4c0e61da493ae66293af39ee884daf8145efbf86934112adc542ece7734e4bbf255e1f3f0f56396c2e8244d81da8aebe4ccbe38833a0977244275aa8136f886358ececbf13b1225eb52e18fbd9a4da00af6004130c62fcf23b141e9bb4db5be1009accac6b9652b0467bae4bd55c821dc8f2024e0d6a13f49b84ead9ac67831e18a35da254e8e23cd67a539215bde77014d627d660f4dc1bde15c22ffa6de9af9ae9519b0e86a577d1920e19b13f127007a75f1190a0232a505559aef4698558572e04a2edfd0436c2916cec2714e9e74cea3313c4d424ba0e7110bf659ffaae84143701022c874a7a6e57a07f6eebbfed3bba6eaeb26815c04f9872d8050141ad7e142058c4858250f1529c8f047cfaa38b738968bb0bc6db89a4c9a7c5bd7568e1c202c39aaf129e43df286271e62dcd5c8b016a2f73cb68c3b2ca93d6dff3cc8a74b8b582744d2a9183fe4b2acc1a2895036758d67f52eb67f5dee2a3feea809f5ae54f3a93aea3b2c987ef4ef48cdd54b5c778e04b646c7337ba53ef2f44e1b6278862015bb3b353c5f9b043821aef0020ba42648c06337cef85a7320f5907f6a2cea6d41abc76e8f8b2366f6b6d6a1fa64d10c9defb53d95fc1aa019a329f98b930f213471fa0c583748f90e461faeb4a5ffde38646585018098e62d1a23c9508398d378eae7f3d1d2a109fdf403e5c2744a91f20b003b5001cef383561cfa4fa1a9c36769bf75998c5dd77c28a9a61297a966f89cc7816c9f579dcbb95ae399337b17327a68b81cfaacce3ec0b1cd0a0799794324a8b2b27b4af431771510c07a18e73eef7de022b907eb22b9cf31a09edc970c6f662daebefbf56f618288a704da23f38130225557d2b912543d93f26ed2762e759f090993dd53b0e19eafc93c51eb14c79e6b04c546301ad7c10c43e5a28f973a0db0efbd96939a6db06dbbf336c65c341354b78c92a8232beba0c0aaf30a3c655d09584ac8d91506b0837cc12e3637a24770125351e2d1e6324a2e6c69b0508e3a48b9f30db13affd04578e9e47df205cc1ace22dc676d2e578636c682d69536dc4426c1797fa4e7a2a90f736cb4e96f24211cfb25b01a83d092eb58ababf61c7f150088c2f63cf1ab89f0416779aa54b5de403f00962c3087fe14c570bd52d35189b413549c792702053d2a3a51fdeacb8e2cba6229a0204ac0b7bb554f788ae477674049680f4d81b073a62b24ff217e8b5767bf33b519aa49c13d908ae06149ca6effd43e9078e259b42e988d674859ccfb8fbaebc68db7675fefef4917db53d987adf2a43f57a06857cf4dd9d479d325e0d47033653ce710a43180aecb7aea82b295a6c286cb35e14f259e9c4516a079a1c74fa821d2ebfbeff44f22fc7e698aebc78244d72ff194c2b49c7f6b8bc36698550735d2e9ffe2412d003d3e654d9b1318a5fd6d0dadc1b31133d4725c956bdf4a2860268b99ad0de08ffa94aeacba2d37ab3f53348d5c25fa79e02df018d74c4981d14c4c90602fe01fafee1fd9b75ed9153db04009e871ada8f9a84ad7335c552d42907d1cc47987bc3c6cfe162b8febade58fcd1a9a62617eccb927f08df3b527c590a8e3a4481d0d13b1b6a2db1abf057afd1ffd337d3c44c305491966c50bce030f4245ec615da7dba2000b1c384683fc62db9e87d178c71e2895bb76929f99156e0e89410724664a494aa781d4dcc9df94f7c58e157e65842ffb9d4fea954eb926b46f2850219bbd11d41faa1d8f2b0089c082b52831df53fa9ae97e4032079d2c982c458a653433b9794ca3242ee891a39347abe587e35c6141c9f517a5b0c92958ae6e6ca62b6039df65edb698234d76e71f066e3c26c7acec2ebf0d7f1a7d25958ebbc89faada7e5838c2ca49fabcd11c82194a145e11b5ba3a97ea3b40826c07c630af04843e20749efdf4c5d4c23a33262c47d63ca59b812f3316b59bc879506ff5f31e0d74d9384d0106c6bb64c73c32e3f5bf96b7686794e31a2b4521ab850e1208fde9a79656c2cd7a19a8373a01477316abbf95c67d9e37d69a70341cbdac563336b83fa91d0d12c6dc079852ffbefcf72259656bb7c5fef984008ee94f3186cbb60945e579c60c4fbec3df32091e1356f8bf03057b911b39d86ae18e4127d295078af72f4e64712c42e646f4dd008414c84f18ad9c9f2d7794525dde9aa3fbed6626aed75bc47c8abe6847945f39fd83fb427076ea5917b4f640552052d2ff0aad5f133616770a869fc3f19d273a4160551f166631bed117c18fdd96c0fed3364a419c86f3454db09028ad8009c98951e2d9069ac5d06e482d35fb5dc3d0340cd7d0d154384b4c6ab1e4ff0d06bc95e07d0e2b74e20f994a8897f7a1679c62c4055f74c7322ee3cc3f590571a56d8fcfa1e781e27d8a2f22976c48b456d5c10ac2d81c93ec992e23748ffff127481eb7b1f37167a99af0d7fea1984146a3f719f4360b2c0e92e0adfefefd9ee682beb300790e9efed08b080dc1d32177f57f70fed461031097d961bdc4ddcd2cc9094b5c25a39ceac4f700b56844457e1e07a87b028853451e73fa3173f7459428c96a42ea56aa749baf01d9779f0bf3879a2f2fa8644496847696d006da15a3080b30ea0159ae2f84b74c9e2cf099b96cb4b6a488c88fa2d4d2f000533360ee7cd46b29a6a2de40f85ce3715951f63e78362f8d4312d5f0a386f66b7abcd26cda4e60339f8dbd72f758cb853f1a849bb285258b477c83adb4d9e3454579043370d6772227152ef1da191f0cb1b50d47e61c8453e007f6716b8ef4f769967bda731da7377863adb32fbfd3cf4cf950612d3b2cc536cca9b4aa91b7835368c4843a99a6b0bb9e72b0f1ad0bf310aa729cf88bbcaca81f6561cc5aa4b034fbd478fb0c1b20849adea1486e63d1f1e18b79830c30039bceb099fd9bd3185dcb33f47b052a01e07e40294408080ac05d36772ae47f6398dfd06070db6dd5b8b9a81a06ee82ee22bdefd5b1ce4f01c1851b4d85ad12bbd130a81290a10a22e511cd9a4d818d05bd26552ec05c77525e31ce04da5a4a81d88dfea2bd731b5bb8edb1303c0c2171fdc9fd3f18688d36c09b1fb56bd4ebcf56d594248d8de89f76cc31ceed22da44a1adae327ecc9b7322ec3a0316b720b8beae08743f9aa947ba41ced6c147ff6d5a7acdd6efb3bc3af2b76a5c0e8ff58808dcabf90f8a71c8be59f01cf71da82af0abbeb94df52a5f7af4c060e6feaf062572d0a1a4cddc64f8925fe01cc83d942e9a9cff80eee200f8e942ba39f5dee33d188777cf6be2f3c1e318d3883ace337503785b9ad58a74a0af11d7fb8509600d0c8cd309e20707085f33b925edf4f87237cea0eb88d92fa8da219d8987dd674f35ce77bf138c13df9eb1e456c109386f7e1b7d09a16662672a9fdba1e5fc8f8e107b73a2ca9deb5993c5e6ce44ad34e872f29a51cf5c92eab4e138da5b2bd9e6326081a5af388400d64e27b0acbeed18f50528ebda1c15800085ae7393c7630d214083157edcfea683caa6e771d0d76b9cfef0d1130c02a9b070370cf0d54270207b716dd62f26e7d514449a7eb39505c64f9341db1fa0d342e5b2922ca8ff9774596383313a7fc88f3841375e10c61b5474bacac3da8e2a05da45fca11c2dac251bf87e75d65ba774c3c5d7e13d5746eadba727a33b2fed2254361eb4f004f02eb812ed5258eded75234c71a235b50e8fcd7e7005e527b18afc3c44d28aad17d7998b0b90391e2b8d432ca994a862022dd706d612e57e056b0834f086d4950720081908ecb9c42dab2f0ae0dbf7dd0dce39bf8baac55e48801af0db4da84604b8d36365bf95054c82def8175d395e87c618125ff4b10a192c23c3c4c368902dc11795d9e5fcf1375daac32ff0a98499625010df9cc13b206498a5013203b9555a3fac73ec7ec4f05ae0ac433e72c31c6d6f83e9eb1cefc2078a8029863e0a7aa9fadd212a6a866d1501c2d57c614a9d45a6d8301ea45d5c02824ef86806df7423d8b445641b84cfe8dcab9dfc0e66987a0bfbac3aa0c90311d0d245cd694623f2d3db21a96bf979ed3f5b53c6dfe0b0bed8060817a1d3d2add60a3b10a86b37df21623c5c7addba016b08f48276b937a4c72a79fda132077e378d127887d58a89a5a672b916b7611e4e807fbeca49a87f7ba2ee93516a633f832a9ffa3bf4e98aa133a182a1cdad8c4940dec0361a7dd369cefc4eef3def7e20587ff4c48884463dc735dc088098db007a84ce0bc80e393e21473058642bc7394cb92c80279504d5f2db6d781adef65b66e9be66ec2c47f4916bd08f5989d193cb077f0859057cff0523126f2dc6002f4b2ce873570f7fc2e6a74d3ffa96e2b38566acdf7e7bedd8cc471d1d4ae126b979b0d93f626c6314a9d74176b545402fe99c633e8e9713fb69d1cb51989e27666b40f9527f0c738625a6314a3f3c6fafd187fcb677550a126b3742877a531aef1d585be6c3cfbc99ec3616ea94e3945767ba10a022ee53ad45a0404948a6cb341f6e5fcfcec05620dd49bde903d9b5445d456fc3ba78508268f537713edf868bf4ccd5bf3a74a6f9214986aa534899b89e23596d4df2176e656f255d1acb329ac9fd1856c6b66b5d03ea1b5a0dfb911ff101696312f81642370df0f4860f5ac21a18a1098df5cec4519da0cbc0aaf9e726a491f47ba50fbb6a5100d5cbec58c9bb1840cd901f2d9f4ef9d41c8849e9c3f40e8588911817159cdca43e674831a5e386002168d0cbfea85908483dbf79cbcaabb48294ccac1f98964616771035fc63180f264afbf697d544febb139028a78ff17ef3dd18f740a74010c7b7544e22754df94743cd0bd25279eb9fe38ce559e7756f2b5ae79860df50519baa8db03fe553c877489cea5f597041195c6a779d89dcd795f3c1a4315276a5a762e11910a8141550747950669a80a70b53eca580b7057540e719a619357db4645464b3a2bd10aa12a4f2b941d8630067548902bfbd3274fde1405c01dfcd00d2cb1c3a218fbfcba30b8263c920ca6f6b57c5827562144495e318a6f265e44f6e694cf43ab5f6eabc724f0edeb7a9304ec53a0ca139afecd941d64cf4c51b0264b5535a6458b21a5d86ca46385cdd25086a3e717e5f100637b67db6beca15d12327240ae0a57912a0beecb13d8b69159f9058a3f0f3d220683bc7eafbcaf7b41c7123bf63d46864d6034cdbddf7e4800b5e9a17c389221d67b32195c8196f9726810a365f0ab0b4d197ce0c423820d706d0faada9cc4892571e6c98443124d1e9b773c0e2ee733f46926747c9e793c0e4d3c280ea9894ca9cb57e8bbbaddd08216e6edbb2e912ec390", 0x1000}, {&(0x7f0000000480)="25f4c584947e8cc2b6cddc0ccf108900ee228ac590e2fcd122e0d0243be4761294b8db604ac80608766ff73862b6c14dcbe683bae3aee41773", 0x39}], 0xa, 0x0, 0x0, 0x10}, {0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000740)="2b70305826e1f5438ae99ad743ded064b09f7c4c6ae4206a38fad3350eee075106046635b75b2252d45ad1c8d365dc1ab07b4f09b870019943d8532085c6ad191de111b3185377d8e45bea81b8e8c4ed17be9225f0934afb077596739f5af144c665af7a37259e0f5ee1a5268aa9c22e743804ffb49894386487f204e2121a7c4d5fac5f10acf3349ae33ed94d87e374e2706e710c1db7eed4304f46d992fdff579e02b40d45d770c5f99b7ff19f85b783921f5062881dc1e69c150de35897cfbae43b8b338584e4720a90482e2a0e802c70828b17f25451969eb57e97f3341f8b385bd46eef59306055", 0xea}, {&(0x7f0000000580)="fe12518e5c59118ab8c4fe7ff7bc2af5d65739f8ae07ef88ca778baa8c0b35735f050e3177aa5c2a30822092b67db85d73e446ad40cb77209134", 0x3a}, {&(0x7f00000005c0)="baf032defb3303c9a77f30b316530bfb9664d57a5b929709a2a62afdba60cacd48797ecabd94adec24bc1287fe3ffcd448d5fc4cedb041b889a5c0ee60", 0x3d}, {&(0x7f0000006880)="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", 0x117}], 0x4, &(0x7f0000000940)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x9}, @op={0x18}], 0x48, 0x4000}, {0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000002d00)="a2e4c256d5d2c505760d608eb76a029ad662905668b37608c6586d1fe5693681b78e0895e5c5302938e49a8cbd396029063c52301bb66cdae7397428aa11ed58f1b66fe3f5504fa90d3e46fb09d21eee28ec7909cd48624a58343e417b2116caa635ab096be9cc3847b5e904dd444a9e08ca882897ab8cb3ccb09d50bd04f38ae15999d9eca253d1cca087410031c35029ab9fd24dcb1990d178aac52165085af24f3fe9f35f79a65458422e0042270a2e79bb5a0de7afff53ccf99b0c93a011f9292bb141c67f67e7999a2ac00dcc6499a3f1194aba4224c1681473a525c4f077bdc321e604dba9be59185e8bbd5ad92a736d819f2b1b3cafb17dedfd49573c0790ecf687a6fd8b8de4686e997d54cf9413aabcf155c3648a2d91f2ad07cd8ab897482c6b7696cf9f9512525b709dbc059b0012252ef45a38b9110a0e4851537d58d2f1e5994d5f0e07c5ad847e80ddb12116c50b818a4ebb5fcda2551b5cd6b3276c70c6f83d38a2922cec486baae14131df3814a05c2b3e55e660af3a6e7b21285c3fa64f080097125ede1b352485bee0d7d794ddd431cd00a351e87f6177677cb79a68b1a093eb630fb467c88f0514521a0c316cde4463e8052e53bd54ae096d7690a3e2e4fbec040eb125b2538f72d84298f6248bcee824339636b514252f111ff45f75ae9f1e0b3a71c3901679ec885d0214c5aa1acf0b48a76d4274fcb02996d478b6bbfa1d8c2bea9d7bf88560433b40d6949c525f52f5fb03d878e862ccb83e736b53fc04c6ceb60105ea52e9518b4825021972999e746f9d87a7dc8fa3fd53e1d9f930f5b548e9552d98f26b43903214de2a3270de9e8df30e3b23c17477eb98d086005b1ced840d57b53339437dd4233d00039010b112567eec61704ac6c5fd45ca950fd8e2a49a0f6375b7735977f5122af0390c3b08f0088d153b2ec3cc27e386e17013fbad24076e8963e08684e2cbfcf9c72aa58ad67e92363bc05c85f5fda525f94dede3729e5b5d7891960e3c2f95b1ac8a54cbb5193c35e80bb12e3a4af6576f706534c7fa053dd1cee36cc078057f18c8d05bd6cceb08c92c7150618e6cfe72113a49e9944ca2756c83a3bb27b60fc71728377d3d8df2af8cf47c0655fb84ecfa7cb609cf3d128b54e602f8b6901564193974dbc6f5620fac72724c00acd8ccb2fd002cf761d14ffd249d7efd15a9e172a24632ac6aa082583917d81169b717d84d370b47ded0366c3068415b35112dec0e9b8cdae26ecb8170e94aba0c9f99a3630c82f43af2fd705decf3f29f034e21e3f0edeb63e1cd8a653e11437138f7ffb9bf8771e63f3752f4cf4eb13142413db651c881dd21b1cf504d7c20049f8bf417edf5805fd4681bf971265228e47ae0ae9c1de1197d85d4d13c5e452f2cc40b687001da9efb15c0e3450c0e7bc35812c24eb429716cb988694c1e600cf1e3277d382466d2005ae338a2bc40d2d0e778408d063e425510ecfc2685a023a213d5c94de9d1cdffcaf124eaa19224e4a81f90b36b1df46c24aa494677a755ae209e8afd04f140e2ea6cae8738f61b7be414596a42a0f311fae6d19c533af833360c5d3fc12b32cbe3be980fac7563c80a0dd350108330419deeaaa4d494583ad7fca310a0772cccbf57c995ec642da63e0d1200942ad0ca95fac33ec5ed2295b8970a391e86dece245ebc791d3b76e217968caccec394a8b3ae3e8c9fd4b28c5e2ec2c3a87eb416652ea4748a7d2494af3c076e6be2e1cf1e2ee0f7b6f1e838bd5c8448ac8156d1f1de4cc64f88356938ff1359798ff0da2ad98d0a2992f0ecd754c0e75522b3d54c400d4c171b5ad41c88b153b6b69d0dc0b7692e9f6266cb1dd55cb22b629bbae7a6fb38561b51cf2d68a17f662606b60b7c205e3497ea93550d5358ae715bc63b071709bf7d276d77f1fa61caeff9090e5bbc1015a4f58e8d1e5e43fe8f43697d7d8a8dc40949bf4b5f43db7d4e1de158d83b9f65a8f94fc386c3dd1f4d96bb9584f1a35a64aabd5311707ed696d93b7932c91596983cf9583b0e3ff7f5fb20c7b997423bdb9603085add3ce5892661275e75958a87f38dba64cd97f4ac93cb14e4177fe7d5e5e0796dca4e9d8bec7f98d518ee2e971cbd3712498962a6d4de407c1ad3e956f5365aa04d71340f62245b561d5d09c1c12d68f1bf9bca5fcf272c1ea8dbbc5ad431298ea58868334464a59d8d8a6c1bbae6c93376a7d3168a0528ba289080c847e1abcc717a9445df218fb8e3597e864815da96d9a35905221c77eec22c6db05b42a6185c08821fdd144fa554366acb6f0a95f4291ec89cef54ec47fd7951e874dd06cdac658140e553567aa4102de7ac5d9514ac2dac4b4ee8d37cc3dc31898ca26f533a2ffa14baba66deca694ab013cb5cde0f746f1779c3a828b9010cb114210eb2a550e0eb06f5079956eb7c340fcd10659a9e6818550a1fbf6d220bee50fd9a8eb5dd1b24ee31babe88ec144010bddc1c7d6ac5ca57acd6616a04535b3e5acb4a12ddb4337069d904bae0c00bebadce64d96cf812de868218cf3b997fa3d8c3f59e8d5e5f0782d66aaa48b06ee73260eb514d071c49a9934912180791b06a23d0a2e189b5e6a93309b1de816901043e30141efbeb16d000db7f33e1b3ef8014eeef52334adf4cf504f9ecbf5e9d339666ffb12a36f52a555cf16b51c49f8b934648e0d565a9b00b56759ddcb7b492b26380d8c71dfbcdfa51b3fb2b7fb6d9c637931353b3015965f3dbf8741b1ce2afc3ace8a055daf6c17ee889e7711d8abc563fd9646920871f6438cfa6013fa23f6cf5a3e02455847391271af5c5f45b2c544117ec85f9ade35a5ed2ca053e13845e6bd42bb2e083b5ac62e251befd63ce4c9b54019f06d0de9f77019d90549796d98a0ad2af5338237046f6bc570ff308aba1bff61f7305e4f8ae5ac28d0c5e3d918d933af22a1b66ede9921e964f619f2b3aefd9f39ce27eab3840af244ee87c6c5a04885e9326254edc9a35769f5ba48ca2492e5d1072261e3988f4a2e15872d489bab102720c6b9ee0b5479390c6c13bef67e46e9a9ac8e2e65e870cab68be09ee1bf75f6ad26a33e6f6662398605e24dd151da73f8a86ddaa3181739491709fdbed1975d07948282049a8d05dc2fb0bcb2f087e6a2a9b16b45255567cb27ee675077553be0dcf1cdd8ab71bde4670ecd177e4c677abfe18a25401a123896fd981ee633a6ecc29a636905c57a7ad67bf8d66e9e56c46627f15ac92648a5942dec10b6b7a62aef897a183b3b2b162493b2a6af6d9a55ad17a5cc32acc252059a34909d74b2a92c5521bba48128ba7edf36fa9b82823e4daefdafdd22e532b7e1d9500b9309f7244e9b08b9cee7f1a338f490e38f9c86d2be02f9da620246ec07ef89a5b0ce4928af659d308987ba54d1162e819b985487715e690242ec6f0b21289f6842e182ee3dafaeeef3876ce3860eb78d1dd089edb1b12685f6727d7907342d90033773f6605108ce571f4a9805ff10e37f9c2c57e4114dfa74503f429fabdf665fda9bf868d810617f4e10ff9c6c74a6d1e03c96344baba426cad91a9f0c49895df9371fdb113cdd4b87be9c103edd5a26594d4c0059eabab783a577113a72dbcc4dc2ec54a09fc1db0ee47b082b725758c01811231674885f254f1cf3fdf0b8e4b5d19ecf89451891e2752749bbb368fd0f80ded2325e5bf87250f0559c79a5b98acd8903cd22bbcd09222781972969fbf017d12bbea4d1bf18515f3bd9a1cbd8b31ecde72d7ecf5b5142d19613defb9cf12c98b39501c6015f6b937dba59cda43d5ec3660a804277390651ced0262ea201096da1c1aaa123e21f33a936573d665042eedb8b647dfffc3cc6333bc703710a69e5e9f8e052ec6c9677d0a19a311aa052d645ef75b73370cc5301962a165009871a16dec0912c25da019e8e2beaad7f16efd493b20dddacc0bb58705e140d46a1a4fa7e29541684aeb889cf0064a72dedcfce04e477b093b35633d43b0ac26ee7744799d5e5399636d2d26892c783399d19ef0bb1f636439c4dda0b6c4d106f75b328e4d96f3aca8972bf6891e71fe9d22b324b4813d67348ccf92bfb180c7df0f58a6e964904629d4003925dd10026ef915b43f9d00cc54ce511e2891f563e603663a3501b81bd56ed0626b153ae361d71ca6f3982febbce4aca6845dc5fe28afdb105e7b327a9f0e83b1edbb93899354808aa7b7989159548384a19d6c9ed22f0e1c565c68036d834a5bcd177d1ca33194b873969daa6c1779e0f2325c96f27c424aef1b8a3928bfd7b90fe6d07d2e7c4b9c5bdc41899096010460b39bb376cd8a10b29a8804b25d7ff7610615b814d01f6033c7063612ca4b7aab28ff0c375c1e10c0f68d7ffe652f2033a8ad55e67505c680b45334a95d33f571f74b7cfdfc1558aafd8b11f5e3b5a2394ca46578f40d455c214e6e966a9b19cb2b8305d25d2852cf5ffa77bea6a077c07b755cf6a45962a306157e8dda56b75f9a6a1283802b7dfdc49054be230e3129b6dc527cd3fbfb8bbf20e06d4a098b99fae633f14ffb418cb31f54fbc23d7441dff672d7b9ecad3c1a4bc49c1828f5488d7b9407a5106ad8c3a81da64c111da05e299e8bb0a1e5084c117c3186e5884b87e78fe62f6ae5d4d3ab9463a3f21e7dcd76318329ddeb4f178f1a9e44adda1cf907e014089866466e1a627ccb2966783718a0e163854057919a4bd115903b689816bc567270ae65628ecf9d90d4651dbdd305399bbb156b332d99442e7e92c299a945c787e2f1cf9277b1d4c24516b31bce3debfa46517988d8581daa6bbb8479200e7fc79cf0da9e8a985a1e078c1f159d61e2ce3e77994b6935ac22e3e4276da264d43a1ef6c0f6a079ebbb00e0e4d8cd03e32271e69c6028c9199bc3c5f5fbbdd4aeae6249917e6cc978994093a90af88356a473afc3c91a54e1ca54fc25c2a7d6813060d612cc6175999d524dd3598fe98d1d5a4f08d88ffcecf86b39ae96c210a1f1ead7e7c167e7eb01e9509d856b496602d65e7d03bf68790f4a767c42cc9fe15f3a3b6782912f2922f69a96af839a3594933f1edeff73b7ff4fcb04e5d5eacfef7fdb9cbf9508cf1b715e53e5b5b9edeb2ae344030cfae71770c6987a54c5817ce6ab31f66c55591ce88d789216d8c113233ecd111b0748d5c6a6c94fce440a750af9ec018d8ab59ca2ccc1993135de9f28d0b7e1d49c63a698b2b51f22d5be01dfff6d26cb679bdc42178dd5c388d9da019eab132b49d61fb171d72f55ca00f97a1ce428711eadcf3dfd11996035c8bcf4bf6be0ed023313b20bbe2d10cbe17ef6420fbd40d8fb824115789b1f9d7bda9203dc284bef4fef54b1e73d6c136ab89b5713982d4e20fb2994f08be93ee39dec769608a2d431f48d824b83b95c98624462119d58ba2ab6848c5673b5a359ce0d7656b3472e4752173e2811438b4045ff6b03c6fca6c0c91df0292d83609b71d58827ad3cc68eb4a4bce53a749be857d0ffb7f098709ed935ed940facd7ef5f6835c2c1100b9a06f6048780732be05a7a6aace87498d3713c3edde2efb0a88fb5628a864c5ea045d70a65d85688a74f4d8d3246b1722d370bb67088245c717a164b329ac00f96196e05b0361a8a10bccbd13122c5ff0c1c35658ca66c40c5474bf4a5bd808fc9188bc27631a8dffd64accf5df57948203ba0d2215b8ef39a20f5908e78f3edfade6668831afff4d89ad153fa7da137ab4fd0388ab5415035dc9f37b73c6247eae4c01f8fae6097ed45", 0x1000}], 0x1, &(0x7f00000009c0)=[@assoc={0x18, 0x117, 0x4, 0xffff}], 0x18, 0x10}, {0x0, 0x0, &(0x7f0000005f40)=[{&(0x7f0000003d00)="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", 0x1000}, {&(0x7f0000000a00)="e35ac047e0a4ae0e72e5d85d5968fb09d28156e6e96452803dfa31ed48c5494f73e5f4161b8b1b02f8d5da999bbc69f549523649c013dacec7f9b49b65f4d6", 0x3f}, {&(0x7f0000000a40)="437dac00940bb3c315", 0x9}, {&(0x7f0000000a80)="a194774be9f86f3f5ddfbd82d41a9e367ec7ea61c75174617228bd117289ad712b2f0ca13c1a93f2ad566f6f75292eae92122fd490fccbb9889ef1be2b6ff1af0c09843ab4cbbd9872461b5d2ae9b13c2dc21979ac569914e20d276cb88324c9b5446c3590c77353b877c08d1041a923a06aaaa898fccff5c4ee212733b6ac784fca5782ba259f24ab9ffa392aea4eed99442757195cf16bcf490bf42a88eef7bccda08522b55c567446ac5624136a95ccb265b7784350dccbbbf8f07d9aa51583b18da08079e2d00e2372afd8d1818346b4e15e77176d2309facb6adac9e19ca22065cc8f2032cf22942aba810d3ca4ec21acfb3798fc94", 0xf8}, {&(0x7f0000004d00)="8a572bb814f03133b0ccfa0198794bfca1d6716fba48a52fc821021928950e1170538e0866e1c3922c341742dfac49fe678b10f64136be391b51b12cc62888df90ed30263ef26caa3413473182071e8e4f1da4547441235a924a34cd3082a11b5e71bd16892b193a6f00865a9d89bdcf6f8620c54e9820443d18b78d5754a423da3b2c073b7cb5b91042cc4292a73c6860a3ea4087e341ded4256860c019249f63079535f50991b21d0f3eda1549237455a4853795fd57125b510deb490b952e8c01b67da5859b44f18b11c03526e9fdca8534d6c0506925169f3c5f5f78e49f6a01056510a9ac21", 0xe8}, {&(0x7f0000000b80)="9ba7c774a41312b0f3fdf4a0899289a1cb9761824786e209d296591919ef4c736e575fd0c0b546adc2b153d48bf3f7ac9fafa6ec31d5ff30d96ac31a2686af0a666ba8d208435e9c5451b554a9874350a35de1a41fd90126cd5f3680116f6511c50794f08193", 0x66}, {&(0x7f0000004e00)="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", 0x1000}, {&(0x7f0000005e00)="280b432e214dbdb5419b64a8aea6736c22e285ae06e6357db2001f8f5bccbd935c70b397858dc03febb3995e0d6f6bef909bf04e4fde83f717f28df347eed3670fec8dddae328946053acdcd8bf0dc2800d618ddc3138270b791c6856369878065caeb3dbf5e0081a8ab89e578b3fb5d541ae95724970c98310dbe9b28224b23a3e2b63b4bf14d05def5928505ebcc25ed416760a77e735a6202ce6713740e50e3d49f0c7af9e6ca51f2", 0xaa}, {&(0x7f0000005ec0)="fdcec70207567583bb50d04c9914fed8bf8ca5633e9b5f6157953e1c", 0x1c}, {&(0x7f0000005f00)="e5e195bdd4db3a640570c5b394807163cd51", 0x12}], 0xa, 0x0, 0x0, 0x40000a1}, {0x0, 0x0, &(0x7f00000065c0)=[{&(0x7f0000006000)="ccf347e0d9351c85db022b04c579144f54de37a5c05ee293fe794f4cf214891aa8a6b0cbf4f355280e94ac4236f7b7f33db7c6d0bfb378ef76a4202ce23f9baa3f93691652a28fecb17762a2b9992c836dbffa3a0343c68549236a1a6b8c1a478f8a219d57ebedd68322cff365bfb53605e92ba38ab003f1e80d2246a59b86aa55adebc551fdab0d92b22a98aa63a83e49502b9f46220186db901b3e62f99da0394203874947838919af17", 0xab}, {&(0x7f00000060c0)="bcf0a04b4f31974bd1e1025ef4607cec38f9df8c8d92a82f95ee0ff5b50f806cc1f7f1c44f1b4912170f1b00265c9dffafcc5dee34228bdda2c9ada145a6b802e1f279151674d3970ff82f479932484c48cb9e12f9e2d2c6c257e51e9e430a2f1ac953e91a07", 0x66}, {&(0x7f0000006140)="c64ed1a3b8", 0x5}, {&(0x7f0000006180)="4d987484204a39d6999064b7016c0f8b38cbe0076bf6f8ba157a0dfe87ed51a1ce7479d41a47b51f81316110ec93b1539dd248286953798ec765437585964aa222b52027e67dbb48aeab1cc7154376cf4868dd47d6dff34f958429963b15484563", 0x61}, {&(0x7f0000006200)="a9558bd0924cb4cbb6a2154e1e2fe36e2bb10597091b021e1a284654f68e27", 0x1f}, {&(0x7f0000006240)="38aff4cdc963824e4f867a4e6ccc498c841550150a8c3f9b677f9ab3b4cebfe9281256446be574c546d775b93d8c0e3b53b97a66c3f012649b56181c89d0e74d57d0b2383e4b490080b5ea174e3b3a00816f27cf996e6a93fa6a4299f88871d7d665770ba356ea161ceb544697f9c434c5273d73e2ec66461185904d0e3aea545fe1049f0e5d481bff1bc0aef00ac33ca87ae97f71fa75d6484af03e3ba6ba00766a1de2cbc3c45622d3e6b92950827bc0d137389ee5", 0xb6}, {&(0x7f0000006300)="5c1f911a29019f6fff69c991473affab9af701ecc6e8455f4f4628fa69b92acc9077ee19a93cca341c5e2a316ccc32cd3c821b03bcde5dcd7b46376ce1adf63ec08db298f9c0ce40f249817da4d8b355cac1b68862d7657dbdf91838e4ce0e6896160470092435795b9973e4fdf1ff509d8583de575970ec1afa6467b18b0f4cf12d23a503de0ce6614c2d915b9b760dd99f69472817094eddab42537dae429d20ef2d1ad68582830a89d7e633fed150ea0a8de92920bda8b768d5ff04d3d64e16cbe0d42aa2f4c9b3373229f26dd2070877549c2983fc6b6ffd04c56afb47cbcb79aee31296a0de71288b", 0xeb}, {&(0x7f0000006400)="78b83ac40555b07a520f6e99647cfe0b119eee71f8b30c22483d17b655d7e2f0ac46b4af09ac22efcfa4354d3b6c4908ba60f8326c850d11221cf9e0abe0fcd5c9b5055c58f5859f34844a966b29b8591dd49cb0fcef1d03947c4eaca84858755e49dc93d6da014c3a5c07588cf6033a2256777fe1dd6edf93ae2b6815e04d2744deb0fff34c47e917850fe0c2091f133a44b4d970a288ace4407f66af2f1e54a15e6a201091d0b5e3a3f07c4e4bab84e2ca", 0xb2}, {&(0x7f00000064c0)="3e6ade4fb943aa75a5d6cbfdc8186f5bf964630997d420936326ce6551eb9dbf5ca81248cffffcd4bb74c91aaec4d0096de365f5ad441afa233c5708291f2400258377dacd1da73b500e6b7bfdb5e3c8ea1d1217100641c1f92facace2fad4bc8ec68750b886793cbb661428fcf23508f27740e76f7b8b99413d280132d602be4396764eb0a9d55b99b56508d621a72276494ab99c057852a655d21e13a54397feb085169ea22c622fed0f7cf0ba55da4c7198c466b4874b8ec58460bb696dadffdca1bb39c6d1", 0xc7}], 0x9, &(0x7f0000006680)=[@assoc={0x18, 0x117, 0x4, 0x7f}, @iv={0x58, 0x117, 0x2, 0x3e, "e3f554637e9a77f3d5559e199d88111d33e33a112fd552e076c7cfdc2c81e57a5f87b7d290dc149361eb1cb90a519ef5d5ec71faf2235edaac8bbaf02915"}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x9959}], 0xa0, 0x800}], 0x5, 0x0) write(r1, 0x0, 0x0) 12:21:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x3f5, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xf00}, 0x0) 12:21:37 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x1d, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:37 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) [ 400.006715][T19164] BPF:Invalid section offset [ 400.012900][T19166] BPF:[1] DATASEC [ 400.021773][T19166] BPF: [ 400.027331][T19164] BPF:Invalid section offset [ 400.035777][T19166] BPF:meta_left:12 meta_needed:12156 [ 400.049431][T19166] BPF: [ 400.049431][T19166] 12:21:37 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 12:21:37 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x28, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x3f00}, 0x0) [ 400.069402][T19166] BPF:[1] DATASEC [ 400.080636][T19166] BPF: [ 400.083495][T19166] BPF:meta_left:12 meta_needed:12156 [ 400.104737][T19166] BPF: [ 400.104737][T19166] [ 400.146085][T19177] BPF:Invalid section offset [ 400.158768][T19177] BPF:Invalid section offset 12:21:38 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r5) r6 = dup(r2) r7 = getegid() ioctl$TUNSETGROUP(r6, 0x400454ce, r7) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$PPPIOCSFLAGS1(r6, 0x40047459, &(0x7f0000000000)=0x48101) write(r1, 0x0, 0x1000457) 12:21:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x2c, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) [ 400.346548][T19191] BPF:Invalid section offset [ 400.379818][T19193] BPF:[1] DATASEC [ 400.384808][T19191] BPF:Invalid section offset [ 400.401440][T19193] BPF:size=3436 vlen=1 [ 400.405554][T19193] BPF: [ 400.431450][T19193] BPF:Invalid name [ 400.442080][T19193] BPF: [ 400.442080][T19193] [ 400.464832][T19193] BPF:[1] DATASEC [ 400.468791][T19193] BPF:size=3436 vlen=1 [ 400.476886][T19193] BPF: [ 400.479692][T19193] BPF:Invalid name [ 400.485020][T19193] BPF: [ 400.485020][T19193] 12:21:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 12:21:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x4000}, 0x0) 12:21:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x2f, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x2, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:38 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000002c0)=0x2) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/246) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) write$evdev(r4, &(0x7f0000000000)=[{{0x77359400}, 0x17, 0xfffe, 0xce}, {{}, 0x15, 0x9, 0x48000}], 0x30) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x7, 0x0, &(0x7f0000000140)) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000240)='security.evm\x00', &(0x7f0000000280)=@sha1={0x1, "918038d6f2014dff1b01f25a523989cbcc592a10"}, 0x15, 0x2) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000200)=0x20) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r9 = dup(r8) getsockopt$bt_BT_DEFER_SETUP(r9, 0x12, 0x7, 0x0, &(0x7f0000000040)) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1f, r11, 0x20b, 0x0, 0x0, {{}, 0x0, 0x410c, 0x0, {0x342, 0x14, 'syz0\x00\x12\xc0;\xf3\x18\x1cy~T9\xaf\xd8\xda\'\xe68\xe3\x15\xd3c\xc4\xb5Q\xf9\xa5eX\x96\xc7\x06\xa8&\x18\x10i\xe9\x8ax2\xe7\xf5\x9bA\x17\xa1@\xf0\x05\xdd\xfb{\xc5\xa9/\xd5\xf7c\n\x95\x00\x8ft!\xa2\xfec\x92\xd2\x80\x99\xc5\x98\xd3q\xf0\xbb8\x16\x9f}\aq\xcd\xbb9O@n\x90%\x9e\xbe\x03\x92\x06\x82\xcc)\xe1W\x84[y\x16\x92B\x13k~\xdb\xb7\t\x89$.\xc2RZ\xdcy5\x93\xc3\\!\x8bUe\xe8\xb9\xe7\x01\xb9!\xcd&\x82FI\xc2y\xf1\x91*\x0e\xa2\x82C@\x06*\x17+%\xe7\xf0G\x03.lO2\xef\x03\xdcTd.w\xc9\xcd\xb4\xaf)\xb9\x10\b\xf4\xd0\x96\xce\x94\xb1v\xa7\xdb?1j\xcd\xc5}\x1btWmf\xa1\xe7C\x96\xed0\xbd\xe2\xba(sjH}\xb4OE\xca'}}}, 0xfc}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(r9, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r11, 0x0, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4000015) r12 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r13 = dup(r12) getsockopt$bt_BT_DEFER_SETUP(r13, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r13, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e24, @empty}}, 0x86c, 0x20, 0x4, 0x0, 0x2}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f00000001c0)={r14, 0x4}, 0x8) write(r2, 0x0, 0x0) 12:21:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) [ 400.699144][T19206] BPF:[1] Invalid btf_info:f020001 [ 400.707091][T19206] BPF:[1] Invalid btf_info:f020001 [ 400.723257][T19209] BPF:Invalid section offset [ 400.737728][T19209] BPF:Invalid section offset 12:21:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x6000}, 0x0) 12:21:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x3, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 400.908655][T19225] BPF:[1] Invalid btf_info:f030001 [ 400.915684][T19225] BPF:[1] Invalid btf_info:f030001 12:21:38 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) prctl$PR_SET_TSC(0x1a, 0x2) 12:21:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x32, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x4, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 12:21:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xc00e}, 0x0) 12:21:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x34, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 401.059972][T19235] BPF:Invalid section offset [ 401.065238][T19235] BPF:Invalid section offset [ 401.093434][T19239] BPF:[1] Invalid btf_info:f040001 [ 401.140393][T19246] BPF:Invalid section offset [ 401.152731][T19246] BPF:Invalid section offset [ 401.157506][T19239] BPF:[1] Invalid btf_info:f040001 12:21:39 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 12:21:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x5, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:39 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) bind$rds(r2, &(0x7f0000000000)={0x2, 0x4e24, @empty}, 0x10) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000000c0)=""/82) 12:21:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x8d, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xea02}, 0x0) [ 401.349194][T19257] BPF:[1] Invalid btf_info:f050001 12:21:39 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) [ 401.382123][T19257] BPF:[1] Invalid btf_info:f050001 [ 401.399905][T19263] BPF:Invalid section offset [ 401.428438][T19263] BPF:Invalid section offset 12:21:39 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r2) write(r2, 0x0, 0x0) 12:21:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x6, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xf000}, 0x0) 12:21:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x3e4, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:39 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) [ 401.719223][T19279] BPF:Invalid section offset [ 401.752477][T19285] BPF:[1] Invalid btf_info:f060001 [ 401.758307][T19279] BPF:Invalid section offset [ 401.766985][T19285] BPF:[1] Invalid btf_info:f060001 12:21:39 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 12:21:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x34000}, 0x0) 12:21:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 401.931401][T19299] BPF:Total section length too long [ 401.947229][T19299] BPF:Total section length too long 12:21:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x7, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x400300}, 0x0) 12:21:39 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 12:21:39 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x8905, &(0x7f0000000100)) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000040)=0x1ff, &(0x7f00000000c0)=0x4) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r1) r6 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x7, 0x385a462b35b3f26e) write(r6, 0x0, 0x0) [ 402.035784][T19303] BPF:[1] Invalid btf_info:f070001 [ 402.081298][T19303] BPF:[1] Invalid btf_info:f070001 12:21:40 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f00000001c0)=""/249) write(r1, 0x0, 0x1000000) 12:21:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x1d, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 12:21:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xf0ffff}, 0x0) 12:21:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x8, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 402.409657][T19328] BPF:Total section length too long [ 402.425073][T19329] BPF:[1] Invalid btf_info:f080001 [ 402.447553][T19329] BPF:[1] Invalid btf_info:f080001 [ 402.449450][T19328] BPF:Total section length too long 12:21:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 12:21:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x1000000}, 0x0) 12:21:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x28, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x18, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x2000000}, 0x0) [ 402.648906][T19349] BPF:[1] Invalid btf_info:f180001 12:21:40 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x60000, 0x0) getsockopt$inet_int(r0, 0x0, 0xb33025d877510737, &(0x7f00000000c0), &(0x7f0000000140)=0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000640)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EVIOCRMFF(r3, 0x40044581, &(0x7f0000000000)=0x80) r4 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) poll(&(0x7f00000001c0)=[{r2, 0xc000}, {r4, 0x2418}, {0xffffffffffffffff, 0x4090}], 0x3, 0x3ff) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x42aa03, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) r8 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x2, 0x40100) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x5, 0x15fb2a1a, 0x8, 0xffff, 0x40, r7, 0x7, [], 0x0, r8, 0x2, 0x2}, 0x3c) ioctl$EVIOCGPROP(r5, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r5, r1, 0x0) 12:21:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x1b, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 402.683377][T19349] BPF:[1] Invalid btf_info:f180001 [ 402.691499][T19351] BPF:Total section length too long [ 402.701859][T19351] BPF:Total section length too long [ 402.869325][T19361] BPF:[1] Invalid btf_info:f1b0001 [ 402.885220][T19361] BPF:[1] Invalid btf_info:f1b0001 12:21:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2c, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 12:21:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x4000000}, 0x0) 12:21:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x2e, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:41 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0xc9, &(0x7f0000000440)=0x7, 0x4) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) r5 = accept4$unix(r4, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e, 0x80400) ioctl$FS_IOC_FSGETXATTR(r5, 0x801c581f, &(0x7f0000000100)={0x2, 0x0, 0x4, 0xfffffffe, 0x4}) write(r1, 0x0, 0x1000000) 12:21:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xa000000}, 0x0) 12:21:41 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) [ 403.138398][T19376] BPF:[1] Invalid btf_info:f2e0001 [ 403.145568][T19377] BPF:Total section length too long [ 403.163597][T19376] BPF:[1] Invalid btf_info:f2e0001 [ 403.164806][T19377] BPF:Total section length too long 12:21:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2f, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x48, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:41 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) [ 403.346782][T19391] BPF:Total section length too long [ 403.364958][T19391] BPF:Total section length too long [ 403.404036][T19392] BPF:[1] Invalid btf_info:f480001 [ 403.415510][T19392] BPF:[1] Invalid btf_info:f480001 12:21:41 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) socket$packet(0x11, 0x1, 0x300) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x1000) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0xb) 12:21:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xe000000}, 0x0) 12:21:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x34, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x4c, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:41 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 12:21:41 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x28240, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x100, 0x1000) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000200)={'mangle\x00'}, &(0x7f0000000280)=0x54) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f00000000c0)=""/236) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_aout(r5, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x9a6) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) write(r6, 0x0, 0xffffffef) [ 404.053868][T19406] BPF:Total section length too long [ 404.073950][T19406] BPF:Total section length too long [ 404.099283][T19415] BPF:[1] Invalid btf_info:f4c0001 12:21:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x8d, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xf000000}, 0x0) [ 404.121210][T19415] BPF:[1] Invalid btf_info:f4c0001 12:21:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 12:21:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x5f, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 404.225114][T19424] BPF:Total section length too long 12:21:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x3f000000}, 0x0) 12:21:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3fe, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 404.326333][T19433] BPF:[1] Invalid btf_info:f5f0001 [ 404.340404][T19433] BPF:[1] Invalid btf_info:f5f0001 [ 404.472493][T19443] BPF:Total section length too long [ 404.485931][T19443] BPF:Total section length too long 12:21:42 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) clock_getres(0xb07d4c46edee5a8c, &(0x7f0000000000)) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:21:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x68, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 12:21:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x40000000}, 0x0) 12:21:42 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r5) r6 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={r7, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000440)={r7, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000a80)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000000)=0x6b) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f00000000c0)={r7, 0x53, "f755c401c6c26b8ddf99f2099456aa900e8aed55d2eeb6ef4e15b768efee156b1306b377b6f3ba4939e81160724b3f9aa3109f015442e5bea68cad8b65c57cb81288d3ec5d14dfffed7fe23c208cfafa3958e7"}, &(0x7f0000000040)=0x5b) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000140)={r8, 0x7fffffff}, &(0x7f0000000180)=0x8) [ 404.747253][T19455] BPF:[1] Invalid btf_info:f680001 [ 404.762454][T19458] BPF:[1] DATASEC (anon) [ 404.767547][T19455] BPF:[1] Invalid btf_info:f680001 [ 404.779117][T19458] BPF:size=3436 vlen=1 [ 404.784474][T19458] BPF: [ 404.789596][T19458] BPF:Invalid name 12:21:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 12:21:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x60000000}, 0x0) [ 404.803339][T19458] BPF: [ 404.803339][T19458] 12:21:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x6c, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 404.846876][T19458] BPF:[1] DATASEC (anon) [ 404.870782][T19458] BPF:size=3436 vlen=1 [ 404.893414][T19458] BPF: [ 404.904079][T19458] BPF:Invalid name [ 404.919464][T19458] BPF: [ 404.919464][T19458] [ 404.947854][T19470] BPF:[1] Invalid btf_info:f6c0001 12:21:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) [ 404.969476][T19470] BPF:[1] Invalid btf_info:f6c0001 12:21:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x9effffff}, 0x0) [ 405.096040][T19486] BPF:[1] Invalid name_offset:2 [ 405.111891][T19486] BPF:[1] Invalid name_offset:2 12:21:43 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000000)='veth1_to_hsr\x00') ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:21:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x74, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x3, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 12:21:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xc00e0000}, 0x0) [ 405.305049][T19497] BPF:[1] Invalid name_offset:3 [ 405.326425][T19497] BPF:[1] Invalid name_offset:3 [ 405.343958][T19501] BPF:[1] Invalid btf_info:f740001 [ 405.354849][T19501] BPF:[1] Invalid btf_info:f740001 12:21:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x4, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xea020000}, 0x0) 12:21:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x7a, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:43 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/\xeb\xef\xdca\xef\xe1\xab\x81', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) fcntl$notify(r5, 0x402, 0x80000024) ioctl$PPPIOCATTACH(r3, 0x4004743d, &(0x7f0000000000)=0x1) 12:21:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 12:21:43 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:21:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) [ 405.569235][T19518] BPF:[1] Invalid btf_info:f7a0001 [ 405.582308][T19523] BPF:[1] Invalid name_offset:4 [ 405.597799][T19518] BPF:[1] Invalid btf_info:f7a0001 [ 405.603749][T19523] BPF:[1] Invalid name_offset:4 12:21:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x5, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xf0ffffff}, 0x0) 12:21:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0xbe, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 12:21:43 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000000)=0x2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)=0x3c1) connect$bt_l2cap(r4, &(0x7f00000001c0)={0x1f, 0x3, {0x6, 0x7f, 0x40, 0x20, 0x7, 0xb0}, 0x3f, 0x5}, 0xe) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_buf(r5, 0x29, 0x8000000039, &(0x7f0000000180)="d1020400005800200007000613f32e1c00ce5fe1b471985e", 0x18) sendto$inet6(r5, &(0x7f0000000100)="aa", 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r5, 0xb) socket$inet6(0xa, 0x80003, 0xff) accept(r5, 0x0, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x200, 0x0) ioctl$EVIOCGPROP(r6, 0x4004743d, &(0x7f00000000c0)=""/252) dup3(r6, r0, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r7) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, 0xfffffffffffffffe) write(r6, 0x0, 0x0) 12:21:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x0, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) [ 405.956963][T19542] BPF:[1] Invalid name_offset:5 [ 405.964613][T19544] BPF:[1] Invalid btf_info:fbe0001 [ 405.976931][T19542] BPF:[1] Invalid name_offset:5 [ 405.996264][T19544] BPF:[1] Invalid btf_info:fbe0001 12:21:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xfffff000}, 0x0) 12:21:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x6, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x2, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 406.148417][T19562] BPF:[1] Invalid name_offset:6 [ 406.179200][T19562] BPF:[1] Invalid name_offset:6 12:21:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x0, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 12:21:44 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0xa40, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:21:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x7, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xffffff7f}, 0x0) [ 406.271989][T19573] BPF:[1] PTR [ 406.310739][T19573] BPF:type_id=3436 12:21:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x0, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) [ 406.335128][T19573] BPF: [ 406.348089][T19573] BPF:vlen != 0 [ 406.368659][T19573] BPF: [ 406.368659][T19573] [ 406.405929][T19573] BPF:[1] PTR [ 406.412751][T19586] BPF:[1] Invalid name_offset:7 [ 406.429852][T19573] BPF:type_id=3436 [ 406.429862][T19573] BPF: [ 406.437734][T19586] BPF:[1] Invalid name_offset:7 12:21:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xffffff9e}, 0x0) [ 406.456860][T19573] BPF:vlen != 0 [ 406.474926][T19573] BPF: [ 406.474926][T19573] 12:21:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x8, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 406.603699][T19598] BPF:[1] Invalid name_offset:8 [ 406.616599][T19598] BPF:[1] Invalid name_offset:8 12:21:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 12:21:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x3, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xfffffff0}, 0x0) 12:21:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x18, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:45 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmdt(r1) shmdt(r1) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/246) write(r2, 0x0, 0x1000000) 12:21:45 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000200)={0xf, 0x8, 0xfa00, {r4, 0x8}}, 0x10) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000000)=0x4) getrusage(0x0, &(0x7f00000000c0)) 12:21:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x40030000000000}, 0x0) [ 407.373312][T19613] BPF:[1] Invalid name_offset:24 [ 407.377899][T19616] BPF:[1] ARRAY [ 407.386569][T19616] BPF:type_id=0 index_type_id=0 nr_elems=0 [ 407.392600][T19613] BPF:[1] Invalid name_offset:24 [ 407.395490][T19616] BPF: [ 407.413308][T19616] BPF:Invalid name [ 407.420625][T19616] BPF: 12:21:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 12:21:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x1a, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 407.420625][T19616] [ 407.441954][T19616] BPF:[1] ARRAY [ 407.455844][T19616] BPF:type_id=0 index_type_id=0 nr_elems=0 [ 407.495260][T19616] BPF: [ 407.508411][T19616] BPF:Invalid name [ 407.537790][T19616] BPF: [ 407.537790][T19616] 12:21:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xf0ffffffffffff}, 0x0) 12:21:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x4, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 407.594232][T19629] BPF:[1] Invalid name_offset:26 [ 407.600195][T19629] BPF:[1] Invalid name_offset:26 12:21:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x48, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) [ 407.767466][T19641] BPF:[1] STRUCT [ 407.783400][T19641] BPF:size=3436 vlen=1 [ 407.801774][T19641] BPF: 12:21:45 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) prctl$PR_SET_PDEATHSIG(0x1, 0x20) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000040)={0x4, r3}) r4 = pidfd_open(r3, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000000c0)="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") dup3(r1, r0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) write(r5, 0x0, 0x0) 12:21:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x100000000000000}, 0x0) [ 407.817377][T19641] BPF:Invalid name [ 407.822566][T19641] BPF: [ 407.822566][T19641] [ 407.834130][T19641] BPF:[1] STRUCT [ 407.840034][T19641] BPF:size=3436 vlen=1 [ 407.853331][T19641] BPF: [ 407.856440][T19645] BPF:[1] Invalid name_offset:72 [ 407.859654][T19641] BPF:Invalid name 12:21:45 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x9, 0x8000) write$P9_RLINK(r1, &(0x7f00000001c0)={0x7, 0x47, 0x1}, 0x7) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000140)=0x2) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0xc26e6df247c3d5bf, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) setfsgid(r9) getsockopt$bt_BT_DEFER_SETUP(r8, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EVIOCGPROP(r8, 0x4004743d, &(0x7f00000002c0)=""/248) write(r2, 0x0, 0x1000000) [ 407.882680][T19645] BPF:[1] Invalid name_offset:72 [ 407.887219][T19641] BPF: [ 407.887219][T19641] 12:21:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) 12:21:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x4c, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x5, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x200000000000000}, 0x0) [ 408.129641][T19664] BPF:[1] UNION [ 408.144579][T19667] BPF:[1] Invalid name_offset:76 [ 408.151599][T19664] BPF:size=3436 vlen=1 [ 408.161421][T19664] BPF: [ 408.167757][T19664] BPF:Invalid name 12:21:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) [ 408.179808][T19667] BPF:[1] Invalid name_offset:76 [ 408.182586][T19664] BPF: [ 408.182586][T19664] [ 408.203267][T19664] BPF:[1] UNION [ 408.216420][T19664] BPF:size=3436 vlen=1 12:21:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x60, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x400000000000000}, 0x0) [ 408.244398][T19664] BPF: [ 408.247856][T19664] BPF:Invalid name [ 408.254889][T19664] BPF: [ 408.254889][T19664] 12:21:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x6, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) [ 408.443090][T19684] BPF:[1] Invalid name_offset:96 [ 408.448809][T19684] BPF:[1] Invalid name_offset:96 [ 408.469239][T19685] BPF:[1] ENUM [ 408.490315][T19685] BPF:size=3436 vlen=1 [ 408.499781][T19685] BPF: [ 408.508286][T19685] BPF:Unexpected size [ 408.520277][T19685] BPF: [ 408.520277][T19685] 12:21:46 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000180)=@keyring={'key_or_keyring:'}) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000200)={r2, 0xb2, 0x2b}, &(0x7f0000000240)={'enc=', 'pkcs1', ' hash=', {'sm3-generic\x00'}}, &(0x7f00000002c0)="6dc4f09affaf91f57fec187627f587542591873d76ddf225173ef59a7277efc1181153af79d21f6c3a55714a4e6cbc04b35738e4eced7ba5830b64a6562b2a7947382ea599ba8466fcab74011d7eba2d7ffc62784202a2394da5661e91754eb9ae83b666bb388095e394f7ea73164965a3151bad304299c46270d43f4f7e44e50bc0593c3c4a0a72082bc58cb6f943145be9efe7fc5adce3768dce6ac21c467453e70263ff00665b92b4ceacce52be87350c", &(0x7f0000000380)=""/43) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xa0800, 0x0) dup3(r3, r0, 0x0) write(r3, 0x0, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'security.', '/dev/ppp\x00'}, &(0x7f0000000100)=""/233, 0xe9) 12:21:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xa00000000000000}, 0x0) [ 408.559431][T19685] BPF:[1] ENUM [ 408.569341][T19685] BPF:size=3436 vlen=1 [ 408.573848][T19685] BPF: [ 408.576738][T19685] BPF:Unexpected size [ 408.581430][T19685] BPF: [ 408.581430][T19685] 12:21:46 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = epoll_create1(0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000000)) write(r1, 0x0, 0x1000000) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200080, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x0, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000140)={r7, @in={{0x2, 0x4e22, @empty}}, 0x3, 0x401, 0xd0, 0x1000, 0x8}, &(0x7f0000000200)=0x98) ioctl$DRM_IOCTL_IRQ_BUSID(r4, 0xc0106403, &(0x7f0000000040)={0x99, 0x3, 0x0, 0x1000}) 12:21:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x68, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 12:21:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x7, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xe00000000000000}, 0x0) [ 408.752383][T19703] BPF:[1] Invalid name_offset:104 [ 408.778679][T19703] BPF:[1] Invalid name_offset:104 12:21:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x6c, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) [ 408.829004][T19709] BPF:[1] FWD [ 408.843798][T19709] BPF:struct [ 408.855897][T19709] BPF: [ 408.866867][T19709] BPF:vlen != 0 [ 408.879967][T19709] BPF: [ 408.879967][T19709] [ 408.898435][T19709] BPF:[1] FWD [ 408.908800][T19709] BPF:struct [ 408.920216][T19709] BPF: 12:21:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xf00000000000000}, 0x0) [ 408.929012][T19709] BPF:vlen != 0 [ 408.940278][T19709] BPF: [ 408.940278][T19709] 12:21:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x8, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) [ 409.069587][T19723] BPF:[1] Invalid name_offset:108 [ 409.106941][T19723] BPF:[1] Invalid name_offset:108 [ 409.142419][T19732] BPF:[1] TYPEDEF [ 409.146274][T19732] BPF:type_id=3436 [ 409.149992][T19732] BPF: [ 409.166259][T19732] BPF:vlen != 0 [ 409.198886][T19732] BPF: [ 409.198886][T19732] [ 409.255462][T19732] BPF:[1] TYPEDEF [ 409.259311][T19732] BPF:type_id=3436 [ 409.259317][T19732] BPF: [ 409.259323][T19732] BPF:vlen != 0 [ 409.259329][T19732] BPF: [ 409.259329][T19732] 12:21:47 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockname$netlink(r3, &(0x7f0000000000), &(0x7f0000000240)=0xc) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f00000000c0)=""/246) r4 = dup3(r1, r0, 0x0) ioctl$EVIOCGREP(r4, 0x80084503, &(0x7f00000001c0)=""/71) write(r1, 0x0, 0x0) 12:21:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x74, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 409.342453][T19741] BPF:[1] Invalid name_offset:116 [ 409.354396][T19741] BPF:[1] Invalid name_offset:116 12:21:47 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4, 0x7) dup(r2) finit_module(r2, &(0x7f0000000000)='^\b/(posix_acl_accessmd5sum+8^+/cgroupem0em1cpuset\x00', 0x1) 12:21:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1}}, 0x18) 12:21:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x3f00000000000000}, 0x0) 12:21:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x9, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x7a, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 409.541891][T19752] BPF:[1] VOLATILE [ 409.548048][T19753] BPF:[1] Invalid name_offset:122 [ 409.558015][T19752] BPF:type_id=3436 [ 409.573727][T19753] BPF:[1] Invalid name_offset:122 [ 409.585938][T19752] BPF: 12:21:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1}}, 0x18) [ 409.592423][T19752] BPF:vlen != 0 [ 409.611066][T19752] BPF: [ 409.611066][T19752] 12:21:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x4000000000000000}, 0x0) [ 409.637518][T19752] BPF:[1] VOLATILE 12:21:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0xbe, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 409.661673][T19752] BPF:type_id=3436 [ 409.677381][T19752] BPF: [ 409.695463][T19752] BPF:vlen != 0 [ 409.717191][T19752] BPF: [ 409.717191][T19752] 12:21:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xa, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 409.778079][T19767] BPF:[1] Invalid name_offset:190 [ 409.829223][T19767] BPF:[1] Invalid name_offset:190 12:21:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r1}}, 0x18) 12:21:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x6000000000000000}, 0x0) 12:21:47 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x400a42, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r2) dup(0xffffffffffffffff) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r3) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r4) dup3(r0, r1, 0x180000) write(r1, 0x0, 0x0) [ 409.933586][T19775] BPF:[1] CONST [ 409.957122][T19775] BPF:type_id=3436 [ 409.961572][T19775] BPF: [ 409.964458][T19775] BPF:vlen != 0 [ 409.985179][T19775] BPF: [ 409.985179][T19775] [ 410.008293][T19775] BPF:[1] CONST [ 410.037729][T19775] BPF:type_id=3436 [ 410.063833][T19775] BPF: 12:21:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x300, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:47 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) prctl$PR_SET_PDEATHSIG(0x1, 0x20) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000040)={0x4, r3}) r4 = pidfd_open(r3, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000000c0)="8fce9d1de76c8f9dd05e0a0ea2bdecf3e20191ef262adca8d758d174a8848ba7abb9a0dacda5c3da3537bf90efeaee27fa969d5f051226cd8b31a8fc48bfdfd56e417df8bca53dd60a93675509a163b8383c26a49db0e86867bea8ca0cfb84292e61aeae31201d990ff9111322bb39afdc13414a0c7f7f0faf3b9b1a46d7ccf68bedeeb6572a6ef9495fa41350ba739db6d280d47fff2c9318a7725eec70dce50ce73a4acc34a7c4745b5c44276c017c63ec626cf5aef8724ff3739c256a1315bfe945a28a98b702f91c5e6a403a4df14f429ed4d58d4187bd211bb5d1180e4c4bdc4cd894456324e9ee0a4024a415ef0d56cd8c2fe752f0fef6cadc2f972a03") dup3(r1, r0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) write(r5, 0x0, 0x0) 12:21:47 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20802, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:21:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x9effffff00000000}, 0x0) [ 410.086181][T19775] BPF:vlen != 0 [ 410.093034][T19775] BPF: [ 410.093034][T19775] 12:21:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xb, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 410.192527][T19794] BPF:[1] Invalid name_offset:768 [ 410.201604][T19794] BPF:[1] Invalid name_offset:768 12:21:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x500, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xc00e000000000000}, 0x0) [ 410.328207][T19801] BPF:[1] RESTRICT [ 410.357233][T19801] BPF:type_id=3436 12:21:48 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x405602, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) write$UHID_CREATE(r3, &(0x7f00000000c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000d00)=""/4096, 0x1000, 0x5, 0x9, 0x1ff, 0x3, 0x641}, 0x120) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/239) r4 = dup3(r1, r0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x400}) write(r1, 0x0, 0x0) [ 410.382630][T19801] BPF: [ 410.387505][T19801] BPF:vlen != 0 [ 410.417024][T19801] BPF: [ 410.417024][T19801] 12:21:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xea02000000000000}, 0x0) 12:21:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xc, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 410.441641][T19801] BPF:[1] RESTRICT [ 410.445677][T19801] BPF:type_id=3436 [ 410.452052][T19801] BPF: [ 410.459744][T19801] BPF:vlen != 0 [ 410.461135][T19809] BPF:[1] Invalid name_offset:1280 [ 410.470709][T19801] BPF: [ 410.470709][T19801] [ 410.474978][T19809] BPF:[1] Invalid name_offset:1280 12:21:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x600, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x400000000000000}, 0x0) [ 410.664016][T19822] BPF:[1] FUNC 12:21:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xf0ffffff00000000}, 0x0) [ 410.688668][T19822] BPF:type_id=3436 [ 410.695286][T19824] BPF:[1] Invalid name_offset:1536 [ 410.701310][T19822] BPF: [ 410.704246][T19822] BPF:Invalid name [ 410.708701][T19824] BPF:[1] Invalid name_offset:1536 [ 410.714463][T19822] BPF: [ 410.714463][T19822] [ 410.723826][T19822] BPF:[1] FUNC [ 410.741599][T19822] BPF:type_id=3436 12:21:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x700, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 410.768135][T19822] BPF: [ 410.777507][T19822] BPF:Invalid name [ 410.797639][T19822] BPF: [ 410.797639][T19822] 12:21:48 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40000, 0x0) connect$netlink(r1, &(0x7f0000000040)=@unspec, 0xc) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f00000000c0)) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/246) write(r2, 0x0, 0x1000000) 12:21:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x3, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xd, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xffffff7f00000000}, 0x0) [ 410.964295][T19839] BPF:[1] Invalid name_offset:1792 [ 410.982365][T19841] BPF:[1] ARRAY [ 410.989251][T19839] BPF:[1] Invalid name_offset:1792 [ 411.008042][T19841] BPF:type_id=0 index_type_id=0 nr_elems=0 [ 411.021440][T19844] BPF:[1] FUNC_PROTO [ 411.029109][T19841] BPF: [ 411.040660][T19844] BPF:return=3436 args=( [ 411.047319][T19841] BPF:Invalid name [ 411.061454][T19844] BPF:vararg [ 411.068152][T19841] BPF: 12:21:48 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800003000000000001044080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0185879, 0x20000000) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r3 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000200)) fsetxattr(r3, &(0x7f00000000c0)=@known='system.sockprotoname\x00', &(0x7f0000000600)='wlan1#wlan0!(nodevppp0vboxnet1wlan1[posix_acl_accessmd5sum\x00', 0x3b, 0x1) write$cgroup_int(r2, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) creat(0x0, 0x0) write(r1, 0x0, 0x0) 12:21:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x1800, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xffffffff00000000}, 0x0) [ 411.068152][T19841] [ 411.073886][T19844] BPF:) [ 411.081068][T19844] BPF: [ 411.090778][T19844] BPF:Invalid name [ 411.104681][T19844] BPF: [ 411.104681][T19844] 12:21:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x3, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 411.131668][T19844] BPF:[1] FUNC_PROTO [ 411.141997][T19844] BPF:return=3436 args=( [ 411.167765][T19844] BPF:vararg [ 411.199728][T19844] BPF:) [ 411.219887][T19844] BPF: [ 411.234615][T19844] BPF:Invalid name [ 411.247840][T19856] BPF:[1] ARRAY [ 411.252094][T19844] BPF: [ 411.252094][T19844] [ 411.257858][T19858] BPF:[1] Invalid name_offset:6144 [ 411.258303][T19858] BPF:[1] Invalid name_offset:6144 [ 411.265475][T19856] BPF:type_id=0 index_type_id=0 nr_elems=0 [ 411.286260][T19856] BPF: [ 411.293624][T19856] BPF:Invalid name 12:21:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xe, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0xfffffffffffff000}, 0x0) 12:21:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x1a00, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 411.304371][T19856] BPF: [ 411.304371][T19856] 12:21:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x3, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 411.434715][T19871] BPF:[1] VAR [ 411.479596][T19871] BPF:type_id=3436 linkage=0 [ 411.510173][T19871] BPF: [ 411.517358][T19876] BPF:[1] Invalid name_offset:6656 [ 411.528100][T19871] BPF:vlen != 0 [ 411.536043][T19877] BPF:[1] ARRAY [ 411.540419][T19876] BPF:[1] Invalid name_offset:6656 [ 411.545650][T19871] BPF: [ 411.545650][T19871] [ 411.554982][T19877] BPF:type_id=0 index_type_id=0 nr_elems=0 [ 411.559360][T19871] BPF:[1] VAR [ 411.569359][T19871] BPF:type_id=3436 linkage=0 [ 411.574938][T19871] BPF: [ 411.577852][T19871] BPF:vlen != 0 [ 411.594618][T19871] BPF: [ 411.594618][T19871] [ 411.605594][T19877] BPF: [ 411.608492][T19877] BPF:Invalid name [ 411.624745][T19877] BPF: [ 411.624745][T19877] 12:21:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x10, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x2}, 0x0) 12:21:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x2000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 411.792530][T19887] BPF:[1] Invalid btf_info:10000001 [ 411.803573][T19889] BPF:[1] Invalid name_offset:8192 [ 411.809584][T19887] BPF:[1] Invalid btf_info:10000001 [ 411.836234][T19889] BPF:[1] Invalid name_offset:8192 12:21:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x4}, 0x0) 12:21:49 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) sysfs$1(0x1, &(0x7f0000000000)='\x00') ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x140000, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) write(r3, 0x0, 0x0) 12:21:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 12:21:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x11, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x4000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:49 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='\xeb\x02\x00\xfc\"8\x05\xdb\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) write$selinux_attr(r3, &(0x7f0000000000)='system_u:object_r:kvm_device_t:s0\x00', 0x22) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) [ 412.043969][T19905] BPF:[1] Invalid name_offset:16384 12:21:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 12:21:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xa}, 0x0) 12:21:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x4800, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 412.065680][T19905] BPF:[1] Invalid name_offset:16384 [ 412.074721][T19906] BPF:[1] Invalid btf_info:11000001 [ 412.132904][T19906] BPF:[1] Invalid btf_info:11000001 12:21:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000240)=""/191, 0x0, 0xbf, 0x8}, 0x20) 12:21:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x12, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xe}, 0x0) [ 412.259834][T19920] BPF:[1] Invalid name_offset:18432 [ 412.287387][T19920] BPF:[1] Invalid name_offset:18432 [ 412.311894][T19924] BPF:hdr_len not found 12:21:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000240)=""/191, 0x0, 0xbf, 0x8}, 0x20) [ 412.417733][T19933] BPF:[1] Invalid btf_info:12000001 [ 412.449339][T19933] BPF:[1] Invalid btf_info:12000001 [ 412.501597][T19936] BPF:hdr_len not found 12:21:50 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r2) write$binfmt_aout(r2, &(0x7f0000000d00)={{0x108, 0xff, 0x6, 0x64, 0xb9, 0x80, 0x3bb, 0x5b9e}, "b1250e9ab78e612035f3cdc6c12a488b482f349dead335b41c68aa1e610d31e50f14e1d9211d91ab7cbb37a7654686e7bf48fb530640a5bfe127fb2133f1abc6861fc23f5ee1508144f1669073a94eb74d4d2e82453297fcd32a248aac38d8eba94dd2e87159e245ce0add866e144d53f3e0f831f7da86161d1ebcc8e16d16e609ead131e9ab4ed0429dbd8df6455bfb20064a9060c107fc56484733dfb3d75ada5b79e95b8da38fd4d7365cfeb7045164b499cc3135390bf0cb4008b9dea0b70a8ca21340031b6db1cbf3e7413d5c07d88b78c156a52f2970ab498e18874dab8238cac9978d7954faccd1b1b3797abe20431cc4c8640a", [[], [], [], [], [], [], []]}, 0x817) write(r1, 0x0, 0x1000000) 12:21:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x4c00, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xf}, 0x0) [ 412.704641][T19945] BPF:[1] Invalid name_offset:19456 [ 412.718286][T19945] BPF:[1] Invalid name_offset:19456 12:21:50 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200040, 0x0) ioctl$KVM_NMI(r0, 0xae9a) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000640)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r2, r1, 0x0) write(r2, 0x0, 0x0) 12:21:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000240)=""/191, 0x0, 0xbf, 0x8}, 0x20) 12:21:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x60}, 0x0) 12:21:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x6000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 412.757895][T19948] BPF:[1] DATASEC [ 412.807430][T19948] BPF:size=3436 vlen=1 [ 412.838697][T19948] BPF: [ 412.849011][T19955] BPF:hdr_len not found [ 412.867257][T19948] BPF:Invalid name [ 412.881704][T19959] BPF:[1] Invalid name_offset:24576 12:21:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xf0}, 0x0) [ 412.886826][T19948] BPF: [ 412.886826][T19948] [ 412.895058][T19959] BPF:[1] Invalid name_offset:24576 [ 412.917252][T19948] BPF:[1] DATASEC 12:21:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x1b, 0xbf, 0x8}, 0x20) 12:21:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x6800, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 412.940702][T19948] BPF:size=3436 vlen=1 [ 412.959971][T19948] BPF: [ 412.981925][T19948] BPF:Invalid name [ 412.985767][T19948] BPF: [ 412.985767][T19948] 12:21:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd2e, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 413.052996][T19970] BPF:No type found [ 413.102016][T19973] BPF:[1] Invalid name_offset:26624 [ 413.121651][T19973] BPF:[1] Invalid name_offset:26624 [ 413.217251][T19978] BPF:[1] DATASEC [ 413.227056][T19978] BPF:size=3374 vlen=1 [ 413.236445][T19978] BPF: [ 413.239362][T19978] BPF:Invalid name [ 413.246402][T19978] BPF: [ 413.246402][T19978] [ 413.256114][T19978] BPF:[1] DATASEC [ 413.261514][T19978] BPF:size=3374 vlen=1 [ 413.265687][T19978] BPF: [ 413.268449][T19978] BPF:Invalid name [ 413.273484][T19978] BPF: [ 413.273484][T19978] 12:21:51 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000000c0)=""/243) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/246) write(r2, 0x0, 0x1000000) 12:21:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x2ea}, 0x0) 12:21:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x1b, 0xbf, 0x8}, 0x20) 12:21:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x6c00, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 413.403846][T19985] BPF:[1] Invalid name_offset:27648 [ 413.411117][T19987] BPF:No type found [ 413.418957][T19985] BPF:[1] Invalid name_offset:27648 12:21:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd4c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x1b, 0xbf, 0x8}, 0x20) 12:21:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x7400, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xa00}, 0x0) 12:21:51 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000740)={0x8, 0x0, [{0x1, 0x6, &(0x7f0000000140)=""/6}, {0x1f800, 0xa3, &(0x7f0000000180)=""/163}, {0x1004, 0x4d, &(0x7f0000000240)=""/77}, {0x0, 0xac, &(0x7f00000002c0)=""/172}, {0x1000, 0x62, &(0x7f0000000380)=""/98}, {0x4, 0xf9, &(0x7f0000000400)=""/249}, {0x100000, 0x54, &(0x7f0000000500)=""/84}, {0x0, 0xb0, &(0x7f0000000580)=""/176}]}) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r3, r0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x2, 0x18}, 0xc) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x12, 0x7, 0x0, &(0x7f0000000040)) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r8) r9 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r10) ioctl$FIDEDUPERANGE(r9, 0xc0189436, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000000827ecb906f71bd100006028ac1a55ca000000", @ANYRES16=r10, @ANYBLOB="000000004a0b0000000000000000e90000292b72abb7235e150dc4688953348135a9d21361bf7f8194650d6806000000000000001700"/68, @ANYRES32=r7, @ANYRES64, @ANYRESOCT=r8, @ANYBLOB="000000000200"/28]) r11 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r12 = dup(r11) getsockopt$bt_BT_DEFER_SETUP(r12, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$sock_inet6_SIOCDIFADDR(r12, 0x8936, &(0x7f0000000880)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x50}) write(r3, 0x0, 0x0) [ 413.557923][T19997] BPF:[1] DATASEC [ 413.616317][T19997] BPF:size=3404 vlen=1 [ 413.628268][T20002] BPF:No type found [ 413.634202][T19997] BPF: [ 413.634292][T20003] BPF:[1] Invalid name_offset:29696 [ 413.657748][T20003] BPF:[1] Invalid name_offset:29696 12:21:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0x3, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 413.665633][T19997] BPF:Invalid name 12:21:51 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r2) r3 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={r4, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000440)={r4, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000100)=0x84) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) connect$packet(r8, &(0x7f00000003c0)={0x11, 0x19, r9, 0x1, 0x8, 0x6, @remote}, 0x14) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0xff4f) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r10}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r10}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) setsockopt$inet_mreqn(r6, 0x0, 0x33, &(0x7f00000001c0)={@rand_addr=0x4, @rand_addr=0x3, r10}, 0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000a80)=ANY=[@ANYRES32=r4, @ANYBLOB="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"], &(0x7f0000000000)=0x6b) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0)={r4, 0x412, 0x99, "7244c79754cf3d901b41009eb2610ab16d05aca52bda709ae51a31e40f86a1edda93d4285bd3c6e3a488f930b91fd4f734835971d73c0d648556e3777c45be64f0cb3d5fabc413c8b3c776624ad5c765812c47f8daf12866c1fb8053590df07d52ad3991fd05130e60b45468ead483a6186aa014e29c4d2a2e5bb226120a248c4981fef7dcd31fd6fdedfc3d1ba8998e452f24429910cd4a60"}, 0xa1) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80001, 0x0) [ 413.698976][T19997] BPF: [ 413.698976][T19997] [ 413.726461][T19997] BPF:[1] DATASEC 12:21:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x7a00, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 413.763083][T19997] BPF:size=3404 vlen=1 12:21:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xe00}, 0x0) [ 413.786540][T19997] BPF: [ 413.799586][T19997] BPF:Invalid name [ 413.850667][T19997] BPF: [ 413.850667][T19997] [ 413.871673][T20015] BPF:[1] ARRAY (anon) 12:21:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd75, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 413.893103][T20015] BPF:type_id=0 index_type_id=0 nr_elems=0 [ 413.914774][T20015] BPF: [ 413.918532][T20015] BPF:vlen != 0 [ 413.920367][T20018] BPF:[1] Invalid name_offset:31232 [ 413.935269][T20015] BPF: [ 413.935269][T20015] [ 413.944165][T20018] BPF:[1] Invalid name_offset:31232 12:21:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xec0}, 0x0) 12:21:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0xbe00, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0x3, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 414.032426][T20023] BPF:[1] DATASEC [ 414.048031][T20023] BPF:size=3445 vlen=1 [ 414.094342][T20023] BPF: [ 414.124222][T20023] BPF:Invalid name 12:21:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xf00}, 0x0) [ 414.161730][T20023] BPF: [ 414.161730][T20023] [ 414.179484][T20023] BPF:[1] DATASEC [ 414.184844][T20023] BPF:size=3445 vlen=1 [ 414.193957][T20023] BPF: [ 414.201252][T20037] BPF:[1] ARRAY (anon) [ 414.209922][T20038] BPF:[1] Invalid name_offset:48640 [ 414.222516][T20037] BPF:type_id=0 index_type_id=0 nr_elems=0 [ 414.223560][T20023] BPF:Invalid name [ 414.237258][T20038] BPF:[1] Invalid name_offset:48640 [ 414.245695][T20023] BPF: [ 414.245695][T20023] [ 414.247881][T20037] BPF: 12:21:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0xffffff, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 414.260262][T20037] BPF:vlen != 0 [ 414.280303][T20037] BPF: [ 414.280303][T20037] 12:21:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x3f00}, 0x0) 12:21:52 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$NBD_DISCONNECT(r3, 0xab08) write(r1, 0x0, 0x0) 12:21:52 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xfffffffffffffffd, 0x200000) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) write(r1, 0x0, 0x1000000) 12:21:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0x3, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 414.425000][T20049] BPF:[1] Invalid name_offset:16777215 [ 414.454027][T20050] BPF:[1] DATASEC [ 414.461881][T20049] BPF:[1] Invalid name_offset:16777215 [ 414.468036][T20050] BPF:size=3436 vlen=1 12:21:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x4000}, 0x0) [ 414.501665][T20050] BPF: [ 414.515770][T20050] BPF:Invalid name [ 414.530834][T20050] BPF: [ 414.530834][T20050] 12:21:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x1000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 414.550757][T20050] BPF:[1] DATASEC [ 414.555956][T20058] BPF:[1] ARRAY (anon) [ 414.574753][T20058] BPF:type_id=0 index_type_id=0 nr_elems=0 [ 414.606909][T20058] BPF: [ 414.624122][T20058] BPF:vlen != 0 [ 414.637819][T20058] BPF: [ 414.637819][T20058] [ 414.640774][T20050] BPF:size=3436 vlen=1 [ 414.653452][T20050] BPF: [ 414.656253][T20050] BPF:Invalid name [ 414.659972][T20050] BPF: [ 414.659972][T20050] 12:21:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x6000}, 0x0) 12:21:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x2}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x3, 0x0, 0x0, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 414.714728][T20068] BPF:[1] Invalid name_offset:16777216 [ 414.751227][T20068] BPF:[1] Invalid name_offset:16777216 12:21:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x2000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xc00e}, 0x0) [ 414.903722][T20078] BPF:[1] DATASEC [ 414.909643][T20082] BPF:[1] ARRAY [ 414.910852][T20078] BPF:size=3436 vlen=1 [ 414.921836][T20082] BPF:type_id=0 index_type_id=0 nr_elems=0 [ 414.935115][T20078] BPF: [ 414.942091][T20082] BPF: [ 414.945030][T20082] BPF:Invalid name [ 414.948888][T20082] BPF: [ 414.948888][T20082] 12:21:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0x3}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) [ 414.962622][T20078] BPF:Invalid name [ 414.978584][T20087] BPF:[1] Invalid name_offset:33554432 [ 414.991811][T20078] BPF: [ 414.991811][T20078] [ 414.999255][T20078] BPF:[1] DATASEC [ 415.007131][T20087] BPF:[1] Invalid name_offset:33554432 12:21:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x3000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 415.042130][T20078] BPF:size=3436 vlen=1 [ 415.046994][T20078] BPF: [ 415.049889][T20078] BPF:Invalid name [ 415.059318][T20078] BPF: [ 415.059318][T20078] [ 415.109371][T20094] BPF:[1] ARRAY [ 415.120194][T20094] BPF: [ 415.130168][T20094] BPF:meta_left:0 meta_needed:12 [ 415.145434][T20094] BPF: [ 415.145434][T20094] 12:21:53 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x501180, 0x0) recvfrom$llc(r1, &(0x7f00000000c0)=""/144, 0x90, 0x40000000, &(0x7f0000000040)={0x1a, 0x0, 0x6, 0x6, 0x7, 0x9, @local}, 0x10) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000c00)=""/242) dup3(r2, r0, 0x0) write(r2, 0x0, 0x0) [ 415.160245][T20097] BPF:[1] Invalid name_offset:50331648 [ 415.180058][T20097] BPF:[1] Invalid name_offset:50331648 12:21:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x3}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xea02}, 0x0) 12:21:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0x3}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) 12:21:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x4000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:53 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x428001, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x4) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r4, 0x80845663, &(0x7f00000000c0)={0x0, @reserved}) ioctl$EVIOCGPROP(r4, 0x4004743d, &(0x7f00000001c0)=""/245) write(r2, 0x0, 0x1000000) [ 415.365518][T20110] BPF:[1] ARRAY [ 415.376311][T20107] BPF:[1] DATASEC [ 415.397567][T20110] BPF: [ 415.400492][T20110] BPF:meta_left:0 meta_needed:12 [ 415.400758][T20107] BPF:size=3436 vlen=1 12:21:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xf000}, 0x0) [ 415.413425][T20107] BPF: [ 415.425630][T20107] BPF:Invalid name [ 415.430406][T20110] BPF: [ 415.430406][T20110] [ 415.440691][T20107] BPF: [ 415.440691][T20107] 12:21:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0x3}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) 12:21:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x5000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 415.469640][T20107] BPF:[1] DATASEC [ 415.483071][T20116] BPF:[1] Invalid name_offset:67108864 [ 415.495861][T20116] BPF:[1] Invalid name_offset:67108864 [ 415.496388][T20107] BPF:size=3436 vlen=1 [ 415.559555][T20107] BPF: [ 415.587326][T20107] BPF:Invalid name [ 415.605397][T20107] BPF: [ 415.605397][T20107] [ 415.623195][T20125] BPF:[1] ARRAY [ 415.625992][T20126] BPF:[1] Invalid name_offset:83886080 12:21:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x4}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x34000}, 0x0) [ 415.640362][T20125] BPF: [ 415.643633][T20125] BPF:meta_left:0 meta_needed:12 [ 415.649229][T20125] BPF: [ 415.649229][T20125] [ 415.656241][T20126] BPF:[1] Invalid name_offset:83886080 12:21:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x2, 0x1, 0x0, 0x3, 0x0, 0x0, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 415.779139][T20136] BPF:[1] DATASEC [ 415.804742][T20136] BPF:size=3436 vlen=1 [ 415.808860][T20136] BPF: [ 415.820616][T20136] BPF:Invalid name [ 415.826750][T20136] BPF: [ 415.826750][T20136] [ 415.839776][T20136] BPF:[1] DATASEC [ 415.847209][T20136] BPF:size=3436 vlen=1 [ 415.847569][T20140] BPF:[1] Invalid name_offset:2 [ 415.851688][T20136] BPF: [ 415.859211][T20136] BPF:Invalid name [ 415.863343][T20136] BPF: [ 415.863343][T20136] 12:21:53 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xe8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000040)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r6}) write(r1, 0x0, 0x0) 12:21:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x400300}, 0x0) 12:21:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x6000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x2, 0x1, 0x0, 0x3, 0x0, 0x0, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x5}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 416.013495][T20147] BPF:[1] Invalid name_offset:2 12:21:53 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x800, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:21:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x2, 0x1, 0x0, 0x3, 0x0, 0x0, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 416.060063][T20151] BPF:[1] Invalid name_offset:100663296 [ 416.070925][T20150] BPF:[1] DATASEC [ 416.084432][T20150] BPF:size=3436 vlen=1 [ 416.101294][T20151] BPF:[1] Invalid name_offset:100663296 [ 416.114814][T20150] BPF: [ 416.117764][T20150] BPF:Invalid name [ 416.136662][T20150] BPF: [ 416.136662][T20150] 12:21:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xf0ffff}, 0x0) [ 416.162664][T20158] BPF:[1] Invalid name_offset:2 12:21:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x7000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x3, 0x0, 0x0, [{}]}]}, {0x0, [0x0]}}, 0x0, 0x33, 0x0, 0x8}, 0x20) [ 416.200291][T20150] BPF:[1] DATASEC [ 416.216665][T20150] BPF:size=3436 vlen=1 [ 416.240630][T20150] BPF: [ 416.250260][T20150] BPF:Invalid name [ 416.275895][T20150] BPF: [ 416.275895][T20150] 12:21:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x6}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x3, 0x0, 0x0, [{}]}]}, {0x0, [0x0]}}, 0x0, 0x33, 0x0, 0x8}, 0x20) [ 416.382552][T20172] BPF:[1] Invalid name_offset:117440512 [ 416.400007][T20172] BPF:[1] Invalid name_offset:117440512 [ 416.443386][T20175] BPF:[1] DATASEC [ 416.452955][T20175] BPF:size=3436 vlen=1 [ 416.469948][T20175] BPF: [ 416.478735][T20175] BPF:Invalid name [ 416.487409][T20175] BPF: [ 416.487409][T20175] [ 416.499004][T20175] BPF:[1] DATASEC [ 416.507459][T20175] BPF:size=3436 vlen=1 12:21:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x7}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x1000000}, 0x0) 12:21:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x8000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x3, 0x0, 0x0, [{}]}]}, {0x0, [0x0]}}, 0x0, 0x33, 0x0, 0x8}, 0x20) [ 416.546373][T20175] BPF: [ 416.549186][T20175] BPF:Invalid name [ 416.555586][T20175] BPF: [ 416.555586][T20175] 12:21:54 executing program 0: recvmsg$can_raw(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/14, 0xe}, {&(0x7f0000000240)=""/88, 0x58}, {&(0x7f00000002c0)=""/129, 0x81}], 0x3}, 0x20) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000100), &(0x7f0000000140)=0x4) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$VIDIOC_S_OUTPUT(r4, 0xc004562f, &(0x7f0000000000)=0x7fff) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x503200, 0x0) ioctl$EVIOCGPROP(r5, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r5, r0, 0x0) write(r5, 0x0, 0x0) r6 = dup3(r5, r3, 0x100000) ioctl$RTC_UIE_OFF(r6, 0x7004) lremovexattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=@known='trusted.overlay.origin\x00') r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) getsockopt$bt_BT_DEFER_SETUP(r8, 0x12, 0x7, 0x0, &(0x7f0000000040)) setsockopt$ax25_SO_BINDTODEVICE(r8, 0x101, 0x19, &(0x7f00000000c0)=@rose={'rose', 0x0}, 0x10) [ 416.659360][T20190] BPF:[1] Invalid name_offset:134217728 [ 416.691044][T20190] BPF:[1] Invalid name_offset:134217728 12:21:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x3, 0x0, 0x0, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf}, 0x20) 12:21:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x2000000}, 0x0) 12:21:54 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) r2 = msgget(0x0, 0x117) msgsnd(r2, &(0x7f0000000d00)={0x0, "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"}, 0x1008, 0xc00) 12:21:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x18000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 416.732720][T20195] BPF:[1] DATASEC [ 416.746999][T20195] BPF:size=3436 vlen=1 [ 416.770739][T20195] BPF: [ 416.774733][T20195] BPF:Invalid name [ 416.814061][T20195] BPF: [ 416.814061][T20195] [ 416.863061][T20195] BPF:[1] DATASEC [ 416.867024][T20195] BPF:size=3436 vlen=1 [ 416.887926][T20195] BPF: [ 416.901158][T20195] BPF:Invalid name 12:21:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x3, 0x0, 0x0, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf}, 0x20) [ 416.918728][T20195] BPF: [ 416.918728][T20195] 12:21:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x4000000}, 0x0) 12:21:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0x3, 0x0, 0x0, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf}, 0x20) [ 416.946572][T20208] BPF:[1] Invalid name_offset:402653184 [ 416.996348][T20208] BPF:[1] Invalid name_offset:402653184 12:21:55 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x86041, 0x0) write(r1, 0x0, 0x0) 12:21:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x8}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x1a000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xd, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xa000000}, 0x0) [ 417.283057][T20231] BPF:[1] FUNC_PROTO [ 417.291823][T20231] BPF:return=3436 args=( [ 417.300988][T20231] BPF:vararg [ 417.307663][T20231] BPF:) [ 417.307974][T20233] BPF:[1] DATASEC [ 417.317029][T20231] BPF: [ 417.320438][T20235] BPF:[1] Invalid name_offset:436207616 [ 417.326164][T20231] BPF:Invalid name [ 417.328700][T20235] BPF:[1] Invalid name_offset:436207616 [ 417.335884][T20231] BPF: [ 417.335884][T20231] [ 417.340395][T20233] BPF:size=3436 vlen=1 [ 417.346057][T20233] BPF: [ 417.348896][T20233] BPF:Invalid name [ 417.366073][T20233] BPF: [ 417.366073][T20233] 12:21:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x20000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:55 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10000, 0x0) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) 12:21:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xe000000}, 0x0) [ 417.383900][T20233] BPF:[1] DATASEC [ 417.389792][T20233] BPF:size=3436 vlen=1 [ 417.409272][T20233] BPF: [ 417.412314][T20233] BPF:Invalid name 12:21:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xd, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 417.447755][T20233] BPF: [ 417.447755][T20233] 12:21:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x18}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 417.538587][T20243] BPF:[1] Invalid name_offset:536870912 [ 417.609058][T20250] BPF:[1] FUNC_PROTO [ 417.627076][T20250] BPF:return=3436 args=( [ 417.632771][T20243] BPF:[1] Invalid name_offset:536870912 [ 417.642465][T20253] BPF:[1] DATASEC [ 417.647529][T20253] BPF:size=3436 vlen=1 [ 417.648877][T20250] BPF:vararg 12:21:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x40000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xf000000}, 0x0) [ 417.659730][T20250] BPF:) [ 417.669877][T20253] BPF: [ 417.670826][T20250] BPF: [ 417.672782][T20253] BPF:Invalid name [ 417.678792][T20250] BPF:Invalid name [ 417.681318][T20253] BPF: [ 417.681318][T20253] [ 417.693466][T20250] BPF: [ 417.693466][T20250] [ 417.710288][T20253] BPF:[1] DATASEC [ 417.732056][T20253] BPF:size=3436 vlen=1 [ 417.746936][T20253] BPF: [ 417.762081][T20253] BPF:Invalid name [ 417.776198][T20253] BPF: [ 417.776198][T20253] [ 417.800244][T20261] BPF:[1] Invalid name_offset:1073741824 [ 417.827814][T20261] BPF:[1] Invalid name_offset:1073741824 12:21:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x3f000000}, 0x0) 12:21:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xd, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x1b}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x48000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:55 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) [ 417.981774][T20270] BPF:[1] FUNC_PROTO [ 417.985909][T20270] BPF:return=3436 args=( [ 417.989197][T20273] BPF:[1] DATASEC [ 417.990144][T20270] BPF:vararg [ 417.990152][T20270] BPF:) [ 417.990157][T20270] BPF: [ 417.990164][T20270] BPF:Invalid name [ 417.990170][T20270] BPF: [ 417.990170][T20270] [ 418.018009][T20274] BPF:[1] Invalid name_offset:1207959552 12:21:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 418.037572][T20274] BPF:[1] Invalid name_offset:1207959552 12:21:56 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f00000000c0)={0x0, r3, 0x1}) 12:21:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x40000000}, 0x0) 12:21:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x4c000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 418.088772][T20273] BPF:size=3436 vlen=1 [ 418.128735][T20273] BPF: [ 418.173737][T20273] BPF:Invalid name [ 418.201009][T20273] BPF: [ 418.201009][T20273] 12:21:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x60000000}, 0x0) 12:21:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 418.231443][T20273] BPF:[1] DATASEC [ 418.236178][T20290] BPF:[1] Invalid name_offset:1275068416 [ 418.238902][T20273] BPF:size=3436 vlen=1 [ 418.261155][T20273] BPF: [ 418.275359][T20273] BPF:Invalid name [ 418.285896][T20290] BPF:[1] Invalid name_offset:1275068416 [ 418.294050][T20273] BPF: [ 418.294050][T20273] 12:21:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x60000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x2e}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 12:21:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x9effffff}, 0x0) [ 418.488913][T20304] BPF:[1] Invalid name_offset:1610612736 [ 418.506721][T20306] BPF:[1] DATASEC [ 418.509980][T20304] BPF:[1] Invalid name_offset:1610612736 [ 418.538558][T20306] BPF:size=3436 vlen=1 12:21:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x68000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 418.593838][T20306] BPF: [ 418.620393][T20306] BPF:Invalid name 12:21:56 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:21:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000240)=""/191, 0x0, 0xbf, 0x8}, 0x20) [ 418.668681][T20306] BPF: [ 418.668681][T20306] [ 418.671283][T20317] BPF:[1] Invalid name_offset:1744830464 [ 418.681950][T20317] BPF:[1] Invalid name_offset:1744830464 [ 418.701776][T20306] BPF:[1] DATASEC [ 418.705777][T20306] BPF:size=3436 vlen=1 [ 418.728707][T20306] BPF: [ 418.739093][T20306] BPF:Invalid name [ 418.748041][T20306] BPF: [ 418.748041][T20306] [ 418.759094][T20319] BPF:hdr_len not found 12:21:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xc00e0000}, 0x0) 12:21:56 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x10100, 0x0) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000040)) write(r1, 0x0, 0x1000000) 12:21:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000240)=""/191, 0x0, 0xbf, 0x8}, 0x20) 12:21:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x6c000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x48}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 418.962032][T20332] BPF:[1] Invalid name_offset:1811939328 12:21:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xea020000}, 0x0) [ 419.017025][T20332] BPF:[1] Invalid name_offset:1811939328 [ 419.047104][T20337] BPF:hdr_len not found [ 419.081380][T20338] BPF:[1] DATASEC 12:21:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x74000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 419.101954][T20338] BPF:size=3436 vlen=1 12:21:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000240)=""/191, 0x0, 0xbf, 0x8}, 0x20) [ 419.148516][T20338] BPF: [ 419.162538][T20338] BPF:Invalid name [ 419.177633][T20338] BPF: [ 419.177633][T20338] [ 419.216619][T20338] BPF:[1] DATASEC [ 419.235155][T20338] BPF:size=3436 vlen=1 [ 419.252482][T20347] BPF:[1] Invalid name_offset:1946157056 [ 419.258289][T20338] BPF: 12:21:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xf0ffffff}, 0x0) [ 419.270273][T20338] BPF:Invalid name [ 419.282529][T20347] BPF:[1] Invalid name_offset:1946157056 [ 419.289417][T20338] BPF: [ 419.289417][T20338] [ 419.299193][T20350] BPF:hdr_len not found 12:21:57 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x680100) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:21:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x7a000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x4c}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x1b, 0xbf, 0x8}, 0x20) [ 419.549945][T20357] BPF:[1] Invalid name_offset:2046820352 [ 419.598082][T20364] BPF:[1] DATASEC 12:21:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xfffff000}, 0x0) 12:21:57 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x100, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r6) r7 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={r8, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000440)={r8, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000a80)=ANY=[@ANYRES32=r8, @ANYBLOB="630000005a4880de517842d213f542ba7a239e3c4bc193d9bc9a4e5b1a045f7b5e0d7e94deaec557d767a615d362be6e865725bcc71b86224548be734c5858c3464551d868f9edfda138a69b6571442dd87bdacf856acc433bd005137601e7695732d1cfa0e32efa0e2196d48face1f91d8f9ebe87ab02914123ee6375ae3ea4e5686686cb4035d629854cb6298e96c617f66873e76cdad2be7a733bc4d4bef7362580c811d62bf8e198d9e8da560079a8caf8238c374f74d813221815d54a7478774262710348cf810505a917630f6b770a8ac15c0a846589720374e76cdfa875601476668b5a6f7edd920b099aae144b6431cc8648bb367caf7c654506d1e4a4148e32cf856699a024f0f7b9a0626a2a1118bf93bd9ab18b7c6be896af7c9055ce7ca5f6"], &(0x7f0000000000)=0x6b) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000140)={r8}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000001c0)={r9, 0xfffffffd, 0x30}, 0xc) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000000)={0x6, 0x20}) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r10, 0x4004743d, &(0x7f0000000c00)=""/246) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f00000000c0)) write(r10, 0x0, 0x1000000) [ 419.621463][T20364] BPF:size=3436 vlen=1 [ 419.623395][T20357] BPF:[1] Invalid name_offset:2046820352 [ 419.625943][T20365] BPF:No type found [ 419.637470][T20364] BPF: [ 419.644957][T20364] BPF:Invalid name [ 419.661959][T20364] BPF: [ 419.661959][T20364] [ 419.707254][T20364] BPF:[1] DATASEC 12:21:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x1b, 0xbf, 0x8}, 0x20) [ 419.731552][T20364] BPF:size=3436 vlen=1 12:21:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0xbe000000, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 419.762425][T20364] BPF: [ 419.781101][T20364] BPF:Invalid name [ 419.821353][T20364] BPF: [ 419.821353][T20364] 12:21:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x5f}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xffffff7f}, 0x0) [ 419.894332][T20380] BPF:[1] Invalid name_offset:3187671040 [ 419.917949][T20381] BPF:No type found [ 419.923656][T20380] BPF:[1] Invalid name_offset:3187671040 12:21:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x1b, 0xbf, 0x8}, 0x20) 12:21:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0xffffff00, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:58 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(0xffffffffffffffff, r0, 0x0) write(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x100, 0x0) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000040)) [ 420.184573][T20393] BPF:[1] DATASEC [ 420.191498][T20393] BPF:size=3436 vlen=1 [ 420.213677][T20396] BPF:No type found [ 420.217445][T20397] BPF:[1] Invalid name_offset:4294967040 [ 420.223521][T20393] BPF: [ 420.226300][T20393] BPF:Invalid name [ 420.230020][T20393] BPF: [ 420.230020][T20393] 12:21:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xffffff9e}, 0x0) 12:21:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0xd, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 420.257008][T20397] BPF:[1] Invalid name_offset:4294967040 [ 420.271797][T20393] BPF:[1] DATASEC [ 420.275732][T20393] BPF:size=3436 vlen=1 [ 420.289433][T20393] BPF: [ 420.300352][T20393] BPF:Invalid name [ 420.312978][T20393] BPF: [ 420.312978][T20393] 12:21:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x68}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:58 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x100, 0x0) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f00000000c0)=""/189) [ 420.457025][T20406] BPF:[2] meta_left:4 meta_needed:12 12:21:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xfffffff0}, 0x0) [ 420.525371][T20410] BPF:[1] DATASEC (anon) 12:21:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0xd, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 420.546818][T20410] BPF: [ 420.555704][T20410] BPF:meta_left:12 meta_needed:24 [ 420.582585][T20410] BPF: [ 420.582585][T20410] [ 420.606018][T20410] BPF:[1] DATASEC (anon) [ 420.623958][T20410] BPF: [ 420.642194][T20410] BPF:meta_left:12 meta_needed:24 [ 420.648716][T20418] BPF:[1] DATASEC [ 420.657303][T20418] BPF:size=3436 vlen=1 [ 420.662046][T20410] BPF: [ 420.662046][T20410] [ 420.677602][T20418] BPF: [ 420.692263][T20418] BPF:Invalid name [ 420.699116][T20423] BPF:[2] meta_left:4 meta_needed:12 [ 420.702813][T20418] BPF: 12:21:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x9, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:21:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x40030000000000}, 0x0) [ 420.702813][T20418] [ 420.719371][T20418] BPF:[1] DATASEC [ 420.728612][T20418] BPF:size=3436 vlen=1 [ 420.736437][T20418] BPF: [ 420.742676][T20418] BPF:Invalid name 12:21:58 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r4) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f00000000c0)={r3, r4, 0x2, 0x1000, &(0x7f0000000d00)="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", 0x3f, 0x4, 0x8, 0x1, 0x7fff, 0x2, 0x30, 'syz0\x00'}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dW\x00\x00\x00\r\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r5, 0x4004743d, &(0x7f0000000c00)=""/246) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x2710, @my=0x0}, 0x10, 0x1800) close(r6) dup3(r5, r0, 0x0) write(r5, 0x0, 0x0) [ 420.779093][T20418] BPF: [ 420.779093][T20418] 12:21:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0xd, 0x0, 0xd6c, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x6c}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 420.836877][T20429] BPF:[1] DATASEC (anon) [ 420.856215][T20429] BPF: [ 420.870668][T20429] BPF:meta_left:12 meta_needed:108 [ 420.885250][T20429] BPF: [ 420.885250][T20429] [ 420.900008][T20429] BPF:[1] DATASEC (anon) [ 420.932615][T20429] BPF: [ 420.936714][T20429] BPF:meta_left:12 meta_needed:108 [ 420.957715][T20429] BPF: [ 420.957715][T20429] [ 420.972939][T20439] BPF:[1] DATASEC [ 420.977143][T20438] BPF:[2] meta_left:4 meta_needed:12 12:21:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 12:21:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0xa, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 420.985037][T20439] BPF:size=3436 vlen=1 [ 421.000325][T20439] BPF: [ 421.014610][T20439] BPF:Invalid name 12:21:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xd, 0x0, 0x0, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 421.053076][T20439] BPF: [ 421.053076][T20439] [ 421.075763][T20439] BPF:[1] DATASEC 12:21:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x100000000000000}, 0x0) [ 421.104464][T20439] BPF:size=3436 vlen=1 [ 421.115193][T20447] BPF:[1] DATASEC (anon) [ 421.119563][T20447] BPF: [ 421.126762][T20447] BPF:meta_left:12 meta_needed:120 [ 421.136347][T20447] BPF: [ 421.136347][T20447] [ 421.143871][T20439] BPF: [ 421.146211][T20447] BPF:[1] DATASEC (anon) 12:21:59 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x7, 0x9, &(0x7f0000000140)="074e589312363dae60e4623a45a3c0a6f67d1ff597dba80f46b4a52e5a34adc04245d506d85cbc0cf495024793bbc78e7c656a7b618b0c50740590c052344e3a6a7f6de3e0ab0c960cfe90336478575b6e39b35dd376919e14a937ecff333648fa510acfa7454e45b7fa79dc9093265458666232da186ee88bbcec8db2bf9427e129b3cc33055f62f9239a7db3bddebd66b285f9d88bb9bd0cb2", 0x9a) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) r2 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000000)={{0x3a, @remote, 0x4e21, 0x1, 'lblc\x00', 0x4, 0x5, 0x63}, {@rand_addr=0x1000, 0x4e20, 0x3, 0x10000, 0x2, 0x10001}}, 0x44) [ 421.165340][T20439] BPF:Invalid name [ 421.174274][T20449] BPF:[1] FUNC_PROTO [ 421.176960][T20447] BPF: [ 421.188170][T20449] BPF:return=0 args=( [ 421.194864][T20447] BPF:meta_left:12 meta_needed:120 [ 421.201642][T20439] BPF: [ 421.201642][T20439] [ 421.213695][T20449] BPF:vararg [ 421.228823][T20449] BPF:) [ 421.231838][T20447] BPF: [ 421.231838][T20447] 12:21:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1d, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 421.258447][T20449] BPF: [ 421.270761][T20449] BPF:Invalid name [ 421.274751][T20449] BPF: [ 421.274751][T20449] 12:21:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x74}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) 12:21:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x200000000000000}, 0x0) [ 421.429961][T20465] BPF:[1] DATASEC (anon) 12:21:59 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000001c0)=""/250) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) [ 421.451191][T20465] BPF: [ 421.464176][T20465] BPF:meta_left:12 meta_needed:348 [ 421.470244][T20467] BPF:[1] DATASEC [ 421.485270][T20465] BPF: [ 421.485270][T20465] [ 421.497375][T20467] BPF:size=3436 vlen=1 [ 421.506923][T20467] BPF: [ 421.509796][T20467] BPF:Invalid name [ 421.511315][T20465] BPF:[1] DATASEC (anon) [ 421.518383][T20470] BPF:[1] FUNC_PROTO [ 421.521667][T20467] BPF: [ 421.521667][T20467] [ 421.534413][T20465] BPF: [ 421.537386][T20470] BPF:return=0 args=( [ 421.537786][T20467] BPF:[1] DATASEC [ 421.541607][T20465] BPF:meta_left:12 meta_needed:348 [ 421.546504][T20467] BPF:size=3436 vlen=1 12:21:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x400000000000000}, 0x0) [ 421.551849][T20470] BPF:void [ 421.558040][T20465] BPF: [ 421.558040][T20465] [ 421.560222][T20467] BPF: [ 421.567473][T20467] BPF:Invalid name [ 421.568768][T20470] BPF:) [ 421.580855][T20470] BPF: [ 421.585774][T20467] BPF: [ 421.585774][T20467] [ 421.591587][T20470] BPF:Invalid name 12:21:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x25, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 421.605580][T20470] BPF: [ 421.605580][T20470] 12:21:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x7a}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x2, 0x0, 0x0, 0xd}]}}, &(0x7f0000000240)=""/191, 0x26, 0xbf, 0x8}, 0x20) 12:21:59 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r1, &(0x7f0000000140)=0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000640)=""/246) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r3, r2, 0x0) syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x80000001, 0x100) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r4) write(r4, 0x0, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x121100, 0x0) ioctl$IMDELTIMER(r5, 0x80044941, &(0x7f0000000200)) 12:21:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xa00000000000000}, 0x0) [ 421.782749][T20483] BPF:[1] DATASEC (anon) [ 421.793063][T20485] BPF:[1] DATASEC [ 421.800890][T20485] BPF:size=3436 vlen=1 [ 421.804114][T20483] BPF: [ 421.814748][T20485] BPF: [ 421.817615][T20485] BPF:Invalid name [ 421.822477][T20483] BPF:meta_left:12 meta_needed:444 [ 421.835636][T20485] BPF: [ 421.835636][T20485] [ 421.843014][T20485] BPF:[1] DATASEC [ 421.860679][T20485] BPF:size=3436 vlen=1 [ 421.864778][T20485] BPF: [ 421.867536][T20485] BPF:Invalid name [ 421.877836][T20483] BPF: [ 421.877836][T20483] 12:21:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x2, 0x0, 0x0, 0xd}]}}, &(0x7f0000000240)=""/191, 0x26, 0xbf, 0x8}, 0x20) [ 421.894088][T20490] BPF:[1] Invalid name_offset:2 [ 421.902290][T20483] BPF:[1] DATASEC (anon) [ 421.906853][T20485] BPF: [ 421.906853][T20485] [ 421.908845][T20483] BPF: [ 421.930321][T20483] BPF:meta_left:12 meta_needed:444 12:21:59 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x8000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r4, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) ioctl$RTC_VL_CLR(r2, 0x7014) write(r1, 0x0, 0x1000000) [ 421.982428][T20483] BPF: [ 421.982428][T20483] 12:21:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0xbe}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:21:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xe00000000000000}, 0x0) 12:22:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x28, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 422.142320][T20503] BPF:[1] Invalid name_offset:2 [ 422.152186][T20504] BPF:[1] DATASEC [ 422.168101][T20504] BPF:size=3436 vlen=1 [ 422.172685][T20504] BPF: [ 422.175574][T20504] BPF:Invalid name [ 422.179418][T20504] BPF: [ 422.179418][T20504] 12:22:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x300}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:22:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x2, 0x0, 0x0, 0xd}]}}, &(0x7f0000000240)=""/191, 0x26, 0xbf, 0x8}, 0x20) [ 422.193366][T20504] BPF:[1] DATASEC [ 422.203056][T20504] BPF:size=3436 vlen=1 [ 422.210330][T20504] BPF: [ 422.214169][T20504] BPF:Invalid name [ 422.217997][T20504] BPF: [ 422.217997][T20504] 12:22:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x500}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 422.273254][T20512] BPF:[1] DATASEC [ 422.277232][T20512] BPF:size=3436 vlen=1 [ 422.282659][T20512] BPF: [ 422.285575][T20512] BPF:Invalid name [ 422.289403][T20512] BPF: [ 422.289403][T20512] [ 422.300638][T20512] BPF:[1] DATASEC [ 422.304579][T20512] BPF:size=3436 vlen=1 [ 422.308769][T20512] BPF: [ 422.312084][T20512] BPF:Invalid name [ 422.315898][T20512] BPF: [ 422.315898][T20512] 12:22:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xf00000000000000}, 0x0) [ 422.361292][T20516] BPF:[1] DATASEC (anon) [ 422.365570][T20516] BPF: [ 422.368336][T20516] BPF:meta_left:12 meta_needed:480 [ 422.418560][T20522] BPF:[1] DATASEC [ 422.423473][T20523] BPF:[1] Invalid name_offset:2 [ 422.431869][T20522] BPF:size=3436 vlen=1 [ 422.437184][T20522] BPF: [ 422.440796][T20516] BPF: [ 422.440796][T20516] [ 422.450711][T20522] BPF:Invalid name [ 422.464477][T20522] BPF: 12:22:00 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000140)={0x9b0, 0x5, 0x0, 0x1}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000640)=""/246) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) bind$bt_l2cap(r0, &(0x7f00000001c0)={0x1f, 0xf91, {0x41, 0x80, 0x81, 0x6, 0xe3, 0x7}, 0x3, 0x1}, 0xe) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$KDGKBTYPE(r5, 0x4b33, &(0x7f0000000200)) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r7, 0x800c6613, &(0x7f0000000240)=@v1={0x0, @aes128, 0x2, "14733dc58fa23296"}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r8) dup3(r5, r2, 0x80000) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x101102, 0x0) r10 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) r11 = dup(0xffffffffffffffff) getsockopt$bt_BT_DEFER_SETUP(r11, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$KVM_X86_SETUP_MCE(r11, 0x4008ae9c, &(0x7f0000000100)={0x8, 0x2, 0x3f}) ioctl$sock_bt_cmtp_CMTPCONNADD(r10, 0x400443c8, &(0x7f0000000180)={r0, 0x5}) ioctl$EVIOCGRAB(r9, 0x40044590, &(0x7f0000000040)) write(r3, 0x0, 0x0) [ 422.464477][T20522] [ 422.469625][T20516] BPF:[1] DATASEC (anon) 12:22:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x3f00000000000000}, 0x0) [ 422.520730][T20522] BPF:[1] DATASEC [ 422.530643][T20522] BPF:size=3436 vlen=1 [ 422.530837][T20516] BPF: [ 422.534746][T20522] BPF: [ 422.534756][T20522] BPF:Invalid name [ 422.534763][T20522] BPF: [ 422.534763][T20522] [ 422.558620][T20516] BPF:meta_left:12 meta_needed:480 12:22:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, 0x0, 0x27, 0x0, 0x8}, 0x20) [ 422.573621][T20516] BPF: [ 422.573621][T20516] 12:22:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x4000000000000000}, 0x0) 12:22:00 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)=',\x00', 0xa083c2, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20000, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x80000, 0x0) ioctl$PPPIOCATTACH(r2, 0x4004743d, &(0x7f0000000040)=0x9) write(r1, 0x0, 0x1000000) 12:22:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2c, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:22:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x600}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:22:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, 0x0, 0x27, 0x0, 0x8}, 0x20) [ 422.812922][T20547] BPF:[1] DATASEC (anon) [ 422.836703][T20547] BPF: [ 422.839590][T20547] BPF:meta_left:12 meta_needed:528 [ 422.853345][T20548] BPF:[1] DATASEC [ 422.860657][T20547] BPF: [ 422.860657][T20547] [ 422.865621][T20548] BPF:size=3436 vlen=1 12:22:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x6000000000000000}, 0x0) [ 422.884474][T20547] BPF:[1] DATASEC (anon) [ 422.888875][T20548] BPF: [ 422.901624][T20548] BPF:Invalid name [ 422.909920][T20547] BPF: [ 422.916382][T20548] BPF: [ 422.916382][T20548] [ 422.924912][T20547] BPF:meta_left:12 meta_needed:528 12:22:00 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) [ 422.939894][T20548] BPF:[1] DATASEC [ 422.965102][T20547] BPF: [ 422.965102][T20547] [ 422.979498][T20548] BPF:size=3436 vlen=1 [ 422.989044][T20548] BPF: 12:22:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, 0x0, 0x27, 0x0, 0x8}, 0x20) [ 423.043606][T20548] BPF:Invalid name 12:22:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2f, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 423.064762][T20548] BPF: [ 423.064762][T20548] [ 423.217161][T20570] BPF:[1] DATASEC (anon) 12:22:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf}, 0x20) 12:22:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x700}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:22:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x9effffff00000000}, 0x0) [ 423.251142][T20570] BPF: [ 423.253945][T20570] BPF:meta_left:12 meta_needed:564 [ 423.259062][T20570] BPF: [ 423.259062][T20570] [ 423.300736][T20570] BPF:[1] DATASEC (anon) [ 423.305030][T20570] BPF: [ 423.307806][T20570] BPF:meta_left:12 meta_needed:564 [ 423.317569][T20573] BPF:[1] DATASEC [ 423.330143][T20573] BPF:size=3436 vlen=1 [ 423.335979][T20573] BPF: [ 423.338845][T20573] BPF:Invalid name 12:22:01 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) pwrite64(r2, &(0x7f0000000100)="a436f82741c00f7d79662fd51d1c6dddc6b49883a0bd3f64277cc0942995d39c26a3ea187594e49829a3c56c2d86bfbd345f613e6d34728314298144ea4fde221f2b94199b2ca3b7bc3731aedffee9889e3c8c6a8e01b2d44f249d675ada9406298d5fbc66196d5061a169a2034fc5e4a5ce04d508a467c279510af6832d809cdcee6061b93925bb698c42f2ddc7bde64ded02dac09d3dc93de2638856cc4d5ba2cd49bfe425f0d02323b20b05fe124c0ee597d8bc38e31fb63125f40c3a710d5f5038cff23b77477009074948919a1c150ffa826599ed69da881dbb7b292789c926a82ac28d53c6d89793e1dcf5dd86db2866cb797b65", 0xf7, 0x401) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000200)=""/257) socket(0xa, 0x2, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r4) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xfffffffffffffdf9) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) getsockopt$bt_BT_DEFER_SETUP(r8, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$KVM_SIGNAL_MSI(r8, 0x4020aea5, &(0x7f0000000400)={0x207005, 0x0, 0x0, 0x3, 0x8}) setfsgid(r6) r9 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0x310) setfsgid(r10) setregid(r6, r10) dup3(r3, r0, 0x0) r11 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400, 0x0) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, &(0x7f0000000340)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r11, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x2, 0x30, 0xb50a, 0x5}, &(0x7f00000000c0)=0x18) getsockopt$IP_VS_SO_GET_INFO(r9, 0x0, 0x481, &(0x7f0000000380), &(0x7f00000003c0)=0x21b6dd082ee58137) write(r3, 0x0, 0x0) 12:22:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xc00e000000000000}, 0x0) [ 423.351465][T20573] BPF: [ 423.351465][T20573] [ 423.365224][T20570] BPF: [ 423.365224][T20570] [ 423.371642][T20573] BPF:[1] DATASEC [ 423.390728][T20573] BPF:size=3436 vlen=1 [ 423.394932][T20573] BPF: 12:22:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf}, 0x20) 12:22:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x34, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 423.421991][T20573] BPF:Invalid name [ 423.425909][T20573] BPF: [ 423.425909][T20573] 12:22:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x1800}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 423.507408][T20585] BPF:[1] DATASEC [ 423.531325][T20585] BPF:size=3436 vlen=1 [ 423.550307][T20585] BPF: [ 423.560892][T20595] BPF:[1] DATASEC (anon) [ 423.567580][T20585] BPF:Invalid name 12:22:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xea02000000000000}, 0x0) [ 423.579462][T20595] BPF: [ 423.583671][T20585] BPF: [ 423.583671][T20585] [ 423.593305][T20595] BPF:meta_left:12 meta_needed:624 [ 423.612342][T20585] BPF:[1] DATASEC [ 423.619746][T20595] BPF: [ 423.619746][T20595] [ 423.622176][T20585] BPF:size=3436 vlen=1 [ 423.628747][T20585] BPF: [ 423.640363][T20595] BPF:[1] DATASEC (anon) [ 423.655099][T20595] BPF: [ 423.657988][T20595] BPF:meta_left:12 meta_needed:624 [ 423.663395][T20585] BPF:Invalid name 12:22:01 executing program 5: write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x4d, 0x1}, 0x7) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000c00)=""/246) write(r0, 0x0, 0x1000000) 12:22:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf}, 0x20) [ 423.690708][T20585] BPF: [ 423.690708][T20585] [ 423.708545][T20595] BPF: [ 423.708545][T20595] 12:22:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x1b00}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:22:01 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r5) r6 = dup(r2) r7 = getegid() ioctl$TUNSETGROUP(r6, 0x400454ce, r7) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$PPPIOCSFLAGS1(r6, 0x40047459, &(0x7f0000000000)=0x48101) write(r1, 0x0, 0x1000457) 12:22:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x63, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:22:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) [ 423.903499][T20613] BPF:[1] DATASEC [ 423.937106][T20617] BPF:[1] DATASEC (anon) [ 423.946069][T20613] BPF:size=3436 vlen=1 12:22:01 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$KVM_NMI(r3, 0xae9a) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2000, 0x0) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r5) r6 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={r7, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000440)={r7, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000a80)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000000)=0x6b) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f00000000c0)={r7, @in={{0x2, 0x4e24, @rand_addr=0x1}}, [0x20, 0x200, 0x1ff, 0x7, 0x4, 0x2d92, 0x2, 0x98da, 0x3, 0x4, 0xfab, 0x1, 0x100, 0x3, 0x401]}, &(0x7f0000000040)=0x100) 12:22:01 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x80, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1f, r5, 0x20b, 0x0, 0x0, {{}, 0x0, 0x410c, 0x0, {0xe0, 0x14, 'syz0\x00\x12\xc0;\xf3\x18\x1cy~T9\xaf\xd8\xda\'\xe68\xe3\x15\xd3c\xc4\xb5Q\xf9\xa5eX\x96\xc7\x06\xa8&\x18\x10i\xe9\x8ax2\xe7\xf5\x9bA\x17\xa1@\xf0\x05\xdd\xfb{\xc5\xa9/\xd5\xf7c\n\x95\x00\x8ft!\xa2\xfec\x92\xd2\x80\x99\xc5\x98\xd3q\xf0\xbb8\x16\x9f}\aq\xcd\xbb9O@n\x90%\x9e\xbe\x03\x92\x06\x82\xcc)\xe1W\x84[y\x16\x92B\x13k~\xdb\xb7\t\x89$.\xc2RZ\xdcy5\x93\xc3\\!\x8bUe\xe8\xb9\xe7\x01\xb9!\xcd&\x82FI\xc2y\xf1\x91*\x0e\xa2\x82C@\x06*\x17+%\xe7\xf0G\x03.lO2\xef\x03\xdcTd.w\xc9\xcd\xb4\xaf)\xb9\x10\b\xf4\xd0\x96\xce\x94\xb1v\xa7\xdb?1j\xcd\xc5}\x1btWmf\xa1\xe7C\x96\xed0\xbd\xe2\xba(sjH}\xb4OE\xca'}}}, 0xfc}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x5000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r5, 0x0, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x5}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x20000088) r6 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r6, 0x3) write(r1, 0x0, 0x1000000) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000140)={0x1, 0x2, 0x1000, 0x71, &(0x7f0000000000)="32642efa706bfe9da6dba23bf1a6042c3c38148674ed1ba5a28840cdb4d10fdf34e9c936c50b266391e8aa1d5bd486d21d692d6513059cb85aadaac976951b66ec1baccaab0c8214f08415821cbf576611ab23db529627b93da6d1c8a355552dc4701949add83ccedd81a158693be33626", 0x75, 0x0, &(0x7f00000000c0)="6ce46febc6166696885668667860ab52b14fb025c3ac0c0f1c2bcf6c4bf876b709bc0c8bc349efd01fa68c132def2dde179e5f1fef741d7bb0be93cdb5b8347500ee21e52edfc4ca6be4be6e7f5015a85915fe217b41b02a412ccacbeadc314a0b59a71d8d4ec42ea230a4015444d47184e277cc66"}) [ 423.980459][T20613] BPF: [ 423.983502][T20617] BPF: [ 423.986433][T20617] BPF:meta_left:12 meta_needed:1188 [ 423.997661][T20613] BPF:Invalid name [ 424.020681][T20613] BPF: [ 424.020681][T20613] [ 424.025732][T20617] BPF: [ 424.025732][T20617] [ 424.035971][T20613] BPF:[1] DATASEC [ 424.044268][T20617] BPF:[1] DATASEC (anon) [ 424.053201][T20613] BPF:size=3436 vlen=1 [ 424.061629][T20617] BPF: [ 424.064534][T20617] BPF:meta_left:12 meta_needed:1188 12:22:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) [ 424.069800][T20613] BPF: [ 424.073694][T20613] BPF:Invalid name [ 424.085164][T20613] BPF: [ 424.085164][T20613] [ 424.091124][T20617] BPF: [ 424.091124][T20617] 12:22:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x2000}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:22:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x8d, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:22:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xffffffff00000000}, 0x0) 12:22:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) [ 424.274954][T20640] BPF:[1] DATASEC (anon) [ 424.286216][T20641] BPF:[1] DATASEC [ 424.287172][T20640] BPF: [ 424.308545][T20640] BPF:meta_left:12 meta_needed:1692 [ 424.309844][T20641] BPF:size=3436 vlen=1 12:22:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}}, 0x0) [ 424.324274][T20641] BPF: [ 424.327119][T20641] BPF:Invalid name [ 424.332185][T20641] BPF: [ 424.332185][T20641] [ 424.337267][T20640] BPF: [ 424.337267][T20640] [ 424.348895][T20641] BPF:[1] DATASEC [ 424.353859][T20640] BPF:[1] DATASEC (anon) [ 424.358957][T20641] BPF:size=3436 vlen=1 [ 424.366807][T20640] BPF: [ 424.369591][T20640] BPF:meta_left:12 meta_needed:1692 12:22:02 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) pwrite64(r2, &(0x7f0000000100)="a436f82741c00f7d79662fd51d1c6dddc6b49883a0bd3f64277cc0942995d39c26a3ea187594e49829a3c56c2d86bfbd345f613e6d34728314298144ea4fde221f2b94199b2ca3b7bc3731aedffee9889e3c8c6a8e01b2d44f249d675ada9406298d5fbc66196d5061a169a2034fc5e4a5ce04d508a467c279510af6832d809cdcee6061b93925bb698c42f2ddc7bde64ded02dac09d3dc93de2638856cc4d5ba2cd49bfe425f0d02323b20b05fe124c0ee597d8bc38e31fb63125f40c3a710d5f5038cff23b77477009074948919a1c150ffa826599ed69da881dbb7b292789c926a82ac28d53c6d89793e1dcf5dd86db2866cb797b65", 0xf7, 0x401) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000200)=""/257) socket(0xa, 0x2, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r4) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xfffffffffffffdf9) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) getsockopt$bt_BT_DEFER_SETUP(r8, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$KVM_SIGNAL_MSI(r8, 0x4020aea5, &(0x7f0000000400)={0x207005, 0x0, 0x0, 0x3, 0x8}) setfsgid(r6) r9 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0x310) setfsgid(r10) setregid(r6, r10) dup3(r3, r0, 0x0) r11 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400, 0x0) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, &(0x7f0000000340)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r11, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x2, 0x30, 0xb50a, 0x5}, &(0x7f00000000c0)=0x18) getsockopt$IP_VS_SO_GET_INFO(r9, 0x0, 0x481, &(0x7f0000000380), &(0x7f00000003c0)=0x21b6dd082ee58137) write(r3, 0x0, 0x0) [ 424.371814][T20641] BPF: [ 424.377654][T20641] BPF:Invalid name [ 424.387636][T20640] BPF: [ 424.387636][T20640] [ 424.414047][T20641] BPF: [ 424.414047][T20641] 12:22:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x3b7, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:22:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0x2}, 0x0) 12:22:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x2e00}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 424.613276][T20664] BPF:[1] DATASEC (anon) [ 424.632316][T20664] BPF: [ 424.635200][T20664] BPF:meta_left:12 meta_needed:11412 [ 424.644012][T20666] BPF:[1] DATASEC [ 424.660331][T20664] BPF: [ 424.660331][T20664] [ 424.671965][T20664] BPF:[1] DATASEC (anon) [ 424.679266][T20664] BPF: [ 424.685623][T20664] BPF:meta_left:12 meta_needed:11412 [ 424.695082][T20666] BPF:size=3436 vlen=1 [ 424.700092][T20666] BPF: [ 424.710113][T20666] BPF:Invalid name 12:22:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) 12:22:02 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) set_mempolicy(0x0, &(0x7f0000000000)=0x95, 0xff) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r2, r3) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:22:02 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/249) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x4000, 0x0) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x17) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r3) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r4) sendfile(r3, r4, &(0x7f0000000040), 0x1) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) [ 424.714989][T20666] BPF: [ 424.714989][T20666] [ 424.724442][T20664] BPF: [ 424.724442][T20664] [ 424.730002][T20666] BPF:[1] DATASEC [ 424.741955][T20666] BPF:size=3436 vlen=1 12:22:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x3ba, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:22:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0xa}, 0x0) [ 424.783174][T20666] BPF: [ 424.791102][T20666] BPF:Invalid name [ 424.806041][T20666] BPF: [ 424.806041][T20666] 12:22:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x3f00}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 424.882725][T20680] BPF:[1] DATASEC (anon) [ 424.917270][T20680] BPF: [ 424.934314][T20680] BPF:meta_left:12 meta_needed:11448 [ 424.952419][T20680] BPF: [ 424.952419][T20680] 12:22:02 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x320000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @reserved="a65475ccc823ba150eac831bc79bde47feea9fa1f13ccef5f8e909936bdc52e5"}}) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 12:22:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0xe}, 0x0) [ 424.973849][T20680] BPF:[1] DATASEC (anon) [ 424.987589][T20687] BPF:[1] DATASEC [ 424.996368][T20680] BPF: [ 425.001182][T20687] BPF:size=3436 vlen=1 [ 425.002623][T20680] BPF:meta_left:12 meta_needed:11448 [ 425.016567][T20687] BPF: [ 425.047816][T20687] BPF:Invalid name [ 425.054040][T20680] BPF: [ 425.054040][T20680] [ 425.088767][T20687] BPF: [ 425.088767][T20687] 12:22:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x3be, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:22:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0xf}, 0x0) [ 425.137686][T20687] BPF:[1] DATASEC [ 425.145693][T20687] BPF:size=3436 vlen=1 [ 425.168542][T20687] BPF: [ 425.175975][T20687] BPF:Invalid name [ 425.190176][T20687] BPF: [ 425.190176][T20687] 12:22:03 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$KDDELIO(r2, 0x4b35, 0x1f) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000080)={0x0, 0x0, 0xc00}, 0x18) r5 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$TIOCSPTLCK(r5, 0x40045431, &(0x7f0000000000)) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r6, 0x4004743d, &(0x7f0000000c00)=""/246) write(r6, 0x0, 0x1000000) [ 425.228537][T20701] BPF:[1] DATASEC (anon) [ 425.244827][T20701] BPF: [ 425.250014][T20701] BPF:meta_left:12 meta_needed:11496 12:22:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x4000}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:22:03 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x103, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f00000001c0)) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x1, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x7, 0x200) r4 = dup(r3) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r4, 0x84, 0x74, &(0x7f00000000c0)=""/124, &(0x7f0000000040)=0x7c) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$TCSETXF(r6, 0x5434, &(0x7f0000000280)={0x1, 0x7, [0xfffe, 0x18f3, 0x0, 0xff, 0x331], 0x3}) write(r3, 0x0, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) getsockopt$bt_BT_DEFER_SETUP(r8, 0x12, 0x7, 0x0, &(0x7f0000000040)) accept4$inet(r8, &(0x7f0000000200), &(0x7f0000000240)=0x10, 0x80000) [ 425.286515][T20701] BPF: [ 425.286515][T20701] 12:22:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0x60}, 0x0) [ 425.364759][T20701] BPF:[1] DATASEC (anon) [ 425.369064][T20701] BPF: [ 425.398704][T20701] BPF:meta_left:12 meta_needed:11496 [ 425.427799][T20701] BPF: [ 425.427799][T20701] [ 425.433517][T20712] BPF:[1] DATASEC [ 425.456374][T20712] BPF:size=3436 vlen=1 12:22:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x3c9, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 425.480789][T20712] BPF: 12:22:03 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) r4 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d80)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000003e80)=0xe8) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0xff4f) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r8}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r10 = dup(r9) getsockopt$bt_BT_DEFER_SETUP(r10, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000003f80)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@initdev}}, &(0x7f0000004080)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000004100)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004200)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000004240)={'vxcan0\x00', 0x0}) r15 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r16 = dup(r15) getsockopt$bt_BT_DEFER_SETUP(r16, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(r16, 0x0, 0x10, &(0x7f0000004280)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000004380)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000004480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000044c0)=0x14, 0x100800) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004500)={'irlan0\x00', 0x0}) r20 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r20) ioctl$ifreq_SIOCGIFINDEX_team(r20, 0x8933, &(0x7f0000004540)={'team0\x00', 0x0}) r22 = socket$netlink(0x10, 0x3, 0x0) r23 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r23, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r23, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0xff4f) sendmsg$nl_route(r22, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r24}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r24}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r24}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000004980)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000004940)={&(0x7f0000004580)={0x3a4, r4, 0x400, 0x70bd2b, 0x25dfdbff, {}, [{{0x8, 0x1, r5}, {0xfc, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffff7}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xf826}}}]}}, {{0x8, 0x1, r12}, {0x1f8, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xffff83f4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfff}}, {0x8, 0x6, r19}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xff}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xb74b, 0x1f, 0x7, 0x5}, {0x3, 0xfb, 0x8, 0x101}, {0xffc1, 0xff, 0x7f, 0x9}]}}}]}}, {{0x8, 0x1, r21}, {0x84, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x90}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xc1}}, {0x8, 0x6, r24}}}]}}]}, 0x3a4}, 0x1, 0x0, 0x0, 0x10}, 0xc) r25 = accept4$tipc(r3, &(0x7f00000000c0)=@name, &(0x7f0000000100)=0x10, 0x80800) setsockopt$sock_linger(r25, 0x1, 0xd, &(0x7f0000000140)={0x1, 0x3}, 0x8) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000000)=0x9, &(0x7f0000000040)=0x2) write(r1, 0x0, 0x0) [ 425.513868][T20713] QAT: Invalid ioctl [ 425.521871][T20712] BPF:Invalid name [ 425.551158][T20712] BPF: [ 425.551158][T20712] [ 425.580475][T20712] BPF:[1] DATASEC [ 425.594289][T20712] BPF:size=3436 vlen=1 [ 425.605129][T20712] BPF: [ 425.607428][T20722] BPF:[1] DATASEC (anon) [ 425.612541][T20712] BPF:Invalid name [ 425.617594][T20722] BPF: [ 425.622075][T20712] BPF: [ 425.622075][T20712] 12:22:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0xf0}, 0x0) 12:22:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x4800}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 425.627051][T20722] BPF:meta_left:12 meta_needed:11628 [ 425.633215][T20722] BPF: [ 425.633215][T20722] [ 425.639130][T20722] BPF:[1] DATASEC (anon) [ 425.649630][T20722] BPF: [ 425.652948][T20722] BPF:meta_left:12 meta_needed:11628 [ 425.658402][T20722] BPF: [ 425.658402][T20722] 12:22:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x3f5, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:22:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0x2ea}, 0x0) [ 425.775116][T20713] QAT: Invalid ioctl [ 425.815959][T20736] BPF:[1] DATASEC [ 425.829218][T20736] BPF:size=3436 vlen=1 [ 425.840960][T20737] BPF:[1] DATASEC (anon) [ 425.849878][T20736] BPF: [ 425.855201][T20737] BPF: [ 425.860454][T20736] BPF:Invalid name 12:22:03 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x1, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x220182, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000140)={0x0, 0x10000, 0x2, &(0x7f00000000c0)=0x8}) mknod(&(0x7f0000000000)='.\x00', 0x800, 0x1) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) get_robust_list(r1, &(0x7f00000001c0)=&(0x7f0000000180), &(0x7f0000000200)=0x18) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000240)={r0, 0x38, 0xfffffffd, r6}) dup3(r2, r4, 0x80000) [ 425.866418][T20737] BPF:meta_left:12 meta_needed:12156 [ 425.881247][T20736] BPF: [ 425.881247][T20736] [ 425.889452][T20736] BPF:[1] DATASEC [ 425.899219][T20736] BPF:size=3436 vlen=1 [ 425.903584][T20737] BPF: [ 425.903584][T20737] [ 425.910495][T20737] BPF:[1] DATASEC (anon) 12:22:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0xa00}, 0x0) [ 425.915436][T20737] BPF: [ 425.920660][T20737] BPF:meta_left:12 meta_needed:12156 [ 425.927198][T20736] BPF: [ 425.932355][T20736] BPF:Invalid name [ 425.938473][T20737] BPF: [ 425.938473][T20737] [ 425.946808][T20736] BPF: [ 425.946808][T20736] 12:22:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x3fe, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:22:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x4c00}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:22:04 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x400000, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)=0xfd8b) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$VIDIOC_QUERYCAP(r4, 0x80685600, &(0x7f0000000140)) write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x1, {{0xeb, 0x1, 0x7}}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x10000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x9e0f6b510deaf072, 0x0) ioctl$EVIOCGPROP(r5, 0x4004743d, &(0x7f0000000c00)=""/246) ioctl$VIDIOC_G_AUDIO(0xffffffffffffffff, 0x80345621, &(0x7f0000000000)) write(r5, 0x0, 0x1000000) 12:22:04 executing program 1 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) [ 426.152574][T20753] BPF:[1] DATASEC (anon) [ 426.153333][T20757] BPF:[1] DATASEC [ 426.176046][T20753] BPF: [ 426.179511][T20759] FAULT_INJECTION: forcing a failure. [ 426.179511][T20759] name failslab, interval 1, probability 0, space 0, times 0 [ 426.197176][T20753] BPF:meta_left:12 meta_needed:12264 [ 426.198043][T20757] BPF:size=3436 vlen=1 [ 426.212562][T20757] BPF: [ 426.215432][T20757] BPF:Invalid name [ 426.219381][T20759] CPU: 1 PID: 20759 Comm: syz-executor.1 Not tainted 5.4.0-next-20191126-syzkaller #0 [ 426.228932][T20759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.238994][T20759] Call Trace: [ 426.242305][T20759] dump_stack+0x197/0x210 [ 426.245074][T20753] BPF: [ 426.245074][T20753] [ 426.246653][T20759] should_fail.cold+0xa/0x15 [ 426.246679][T20759] ? fault_create_debugfs_attr+0x180/0x180 [ 426.261895][T20759] ? ___might_sleep+0x163/0x2c0 [ 426.266768][T20759] __should_failslab+0x121/0x190 [ 426.271739][T20759] should_failslab+0x9/0x14 [ 426.276257][T20759] kmem_cache_alloc_trace+0x2d3/0x790 [ 426.281490][T20757] BPF: [ 426.281490][T20757] [ 426.281650][T20759] ? refcount_sub_and_test_checked+0x154/0x200 [ 426.281667][T20759] ? refcount_dec_not_one+0x1f0/0x1f0 [ 426.281698][T20759] btf_new_fd+0x1c9/0x1d10 [ 426.297612][T20757] BPF:[1] DATASEC [ 426.298055][T20759] ? refcount_dec_and_test_checked+0x1b/0x20 [ 426.302598][T20757] BPF:size=3436 vlen=1 [ 426.306245][T20759] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 426.306264][T20759] ? apparmor_capable+0x2ed/0x630 [ 426.306277][T20759] ? cap_capable+0x205/0x270 [ 426.306297][T20759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.312388][T20757] BPF: [ 426.316312][T20759] ? btf_type_seq_show+0x1b0/0x1b0 [ 426.316332][T20759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 12:22:04 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) pwritev(r0, &(0x7f0000000500)=[{&(0x7f0000000000)="545d8bdbc32c58de8b4ac8f8cdc66b1cee15439478a2e16370e9857f8123d66f97dcedff4185205aee68be657d5d08e181b28e8d81a0cd0ee7df07a375001b6c99876e872c92c428904d00687d419c993cb3a8cafc67cca80aff775a16bba878ff", 0x61}, {&(0x7f00000000c0)="63968e278bec3ee5588e60a69006e2c1df540379b29762cc5cfa40128491f3766af2883428ed149222bdaa97a544918d59f996f5", 0x34}, {&(0x7f0000000100)="75ee81798343884053522258f65f6e9124f182aa8289d318cdb326afaad4efd2325f12ae643c27d57c47d1ecd061aa5698ff2f18fdd822587dde7cc750d63cb18f87174cd7f930cf13061f1b2f32d76adb216e1e92ee240bd2edc5532943b6c04b241a06f424ad72e78d78fd78b661758e64244c3f8a5c34f22cf460d63767c94800b696eda0c863962fb55651df37739465cd9cc8d313912c1af4f3cdf32537b0f2de18b6b80f0fcc5d6cac3c79c6a66c7c553856545513259b853f1ba79b8b189347e90c7c1b9e1b69289037d7f613d9be8f72df674baf0067963eba9bf2a0af0ce1", 0xe3}, {&(0x7f0000000200)="0ec5ffede8a92c4ec2d4cf00f37a27f5766a52", 0x13}, {&(0x7f0000000240)="5f629e5a805576042b34cc0a94bd5db941350bd9f0b2f58d9dcafe4be8b6ae03fef81adbaed51c9dfc1e8fccded3f6291bae", 0x32}, {&(0x7f0000000280)="91a9148ba6ed4ea11d62bf16aed19c1396a1db2c1aad6d028222e2a64b94d6ded9ae07889ecb7c1bd3a21687df21f8764a9685a3470e478d10ecd07b59b77e64850bf0adba4253a2fb7ec5823ee345468911d309ab0ced93b146ffd18eeb849fa181413d5e28b2cac91f35e5b4e8c5841ccca2b13117332685c741ae76d110fce6c471f0ca6d1b878a12769bafea7c6f2e05b78db4df31d651f364ca65709358dffe64d821bfb017bd4a8b00215c7595fd95ff09bc544bf18587f12d2359571d0c15c233b5a19c47a0baf7900c56654ad01c6014af64fe97e4f672c3ac6206d8c2f10f40dedc9706fc8a06c341ac65", 0xef}, {&(0x7f0000000380)="6e8c0a3032af7e45d58fea36ff343d35c32d030051ac33d66fdbb210ee00e9d2bc981c9963b994a697e804c363bfd141388070ab3ac7fb1917eadc2f09c56052324b11de1ecf3d2b9876f67045eaf8f5180e775fdbfab4bf96a5", 0x5a}, {&(0x7f0000000d00)="de7633702cd58fbf9b73e84f272c947b4476a10eab2b0389cb0f7897d60d3f7a0cb6ee593a6e2d3bb8eae54f68bc1fc3e7f23a5f90d63dea20ebd8f08565371d3416ecb9969d3d54a8ff878a2dfd2479e1937b4442eae8d25dcab2c99c322fb8930e75ec04a08555dfcd149c6b3894f0da62995ed21c4d8066e57954e5525a0a4afc25cc7a42c56df9b34cf77057b2c3e2a00972b469c289991d24111a5e387b9a1fabfe8b5b7df7002e8cc2ddb9548624801d39d5d8ba319946bcff71818be50c15ef38d63cc8003f95dc03bd9d87dfeef464f9b20e87eb9503c706f9865f44b835d56d6d4d7b3ff824b45a4cf6b61fbcbaeef0fc495dc6d57d412a9191d11f1a0695f2369e433daff0dddb44c60f1a7b878bbe16192331dcfe33fffef9c9a712e651ce285999050cedf21fe26ae31e54bbbe76f705eb490f5a016d2e89b5950e7d78dea69f1dcbfa0dbb54493ce39ba240079a73d8f1df5027c509c811436b02f26784f04ed77b83a4ca835887b6ce5a154fb34a2c52501fff02f95153fe190ca7044b8fe95074062d2727cab76256f10f6d1597e85e4cf70c2ae8a65bd322f1e7579726949a98db8d82ee768af1905b998483204a0b95b54bba8de4392fe983b97f27f52924abb62038e923cbd9a9f222d823ee77d810a0fa8c6d0f1302d1b00b5478a8160d1ed08b768ab25c8d3706aa45164c49e4813b822a789cf95ca6cb16287bfa2d7c0d451a53d015c791065c50cac3f537f0f071855fb98d55b410044d4423dbaf7dddc683951c03c15c8879541fd13fd39360012505dcfb1273a97fa6ed0988d624ba863bf377639fce9f8d04968755057b177fbaa360c07425c212d5b0337003978d533877ed355c8d88e1a40013b0f4d8a38bfc3ba0919802c385496e8a2178680a3a054f6ab67017e60c46069522ccd4705fde1dac8c01d4966ddec803b3d43c064c7f9658e6cbd4b4b66d2c99810f66f8638e571e20a643859fd1868823a6a0eb62c9e725c578290a4c1d18524443aa8a912f751d3b7dd524a518ee5265b3e5d2c3ecf2fdc4c2d6e571b97d09e26ba0a63bf49c90e9ebd82757b2a9d072ca41e5b0c8450731f07f8027e950fd54b55e1554011ac552a0ad9d1c4b88a0ffbe3730854e881d561534a3046847f632629b12e08d898fa2620515be4ec18c1fba138b84b58051d3b2312f636d96ea52e59cfa38c865840835bee9a523f6cd2699432a085d95e827d08ea1499d94c74d9435748b873775e6fe04a06f3372286c4afae4917d1c1e0a75b6567e43bf66900cc177643b737ef46b0525648525ad343f97ce7e1b3366e8709d76d674783cdca5b48d2e12885f692a37d7a61df21ce8588aea9d2d11afa5d7749e9aef84d1b576f6c0eb65c33879c49236b15069a73c94b8b0b8b8573fd49ed4c633132e853bc3ffdddeeed5985898e4c8ccc950a49d7d037c33bde3131bda7b34c1db36c91b7d5ff7306b55294161d9033aa7104627786015368ceb3d902c499fc0f46e7718d8ced72a12bc983159e7e4ae59e1f00d3f806b9d56183cec2f990cc003650ed6033c4f0daf2d1c4b2f59fc468ce89118cef3e1148b997b4b993c1a396fe7ec041689b4b06716233ddce193ef8ec16f77ca71fbf721a33a3643877df48f05b1fcffabfb0a965a18307e1e35fd6b4d483cb5c648b357b3d61dc20a932afb0c7ab2b0571789217cf4db0e32af4c87a8e93f733207c5a5ffbebcf7b2197ba730a311c0fb15e6d9cda248a89afae7097aa6491e8031c53ad079a890aa9e7cb8e68c741005178fd664e341a93441a4fb16e15978ca4b5c7546bb642d4c9a36f963d2b30476670a8bdc03b95f601b0547635a6fbc69c2c118911ba26b6b252152f95489d103f145aba927bb6550efb8ae47d42afdaa92c41d0f815a083e599e2c63c45bade6bc6039e70127c457f0be69d4d7d818e9ec1753b75f0dcab080e5978a3c4677e447e32f51eb1bf9375866c210e7ab3c470f0338846d387280e6fb3684f3d212dc518881b0469c3c5845ccb61c246b0f8b30b08be82dca62ad81a393559f2dd9afff1018dcbc0cdcacb0b621c83214f5da5f751e0aa4c56ab07c4ce14ef57d75e8bd8ffd1ae6bcc097224ceecf9ded0ba48d9303f7d817fffe183ea7700ab20b96e46d39b8c4e5aeb60f24a2651bcc0bdf8333c33d4d53de1f0bb61d37f3860e05f95de5d4b0e59c05f3b828164b2a3eee13941b3a81da2efefa0a8a1819d0657c542784510adf34a11d768bfa36e94182bba99ceb7ec5902c8402e634829829db888099b568193fd00b22eed100415f2a1a7a434c03dba3f919cbf433ef54380f1a586c7cf8c0e7ceeb27f6ddb1b5a78d1bd3cf6ce1186598f74dd53928bf79147221bfd0b5c71f572f3fdd279233527e79a8a0bd9d763648194931c4f228a75e99dfdea8335c235ff40d8b256e6e21bbc48ba993285548f6e6209e0ecd499eaa8ac78c424880a6fd9f0a0e51c5bfee70e0de3337512a443e8bb1519fcc9c9806af23ed1b28563635fb838bf0acc07954493c200fd686ef41e10a301c18cb232368a5b0b7185c868d6c935e067766b815ca9e5da490a798b5809ae9cb270b2654d5ec62be82297528e604843062375097428ff7fef99b8ad31ed55d176e46ee5911910e802d28fad1d08019c78efa637538fdc7551a9566d9060485c18504b7c634a5564606633bbefe602f4fa2abbefad132e9871e642b0df03e214b6783b898d2c77df62847695450a694a96426690cd88f31402bbe0578f55ba3a18240190fdeb390a1e462ce2606821d089c0b119476ec973db5fe0da3458b98c86ce552689ef3dc95af218da05da83085b90a91adadc34cf97bba008cf9d68f0223d89c40f9618f79d48d828a0b41ce750adb28c8b73a0b1be58b04b7d88fd92b1e856f78646119dc1bb233a0f802d363310ea6839887af547c820c02da4de15484ec4f76a5c8b94460513fbb016e6a86b932b0b3e7d8e43ad682288d678e748fe26dcd35047b47bce3a85199f7c03b78e37a25718dd4ce5cd30b480688eeb70c4e9c005cd31ed2783bb69a59922f1ad1ebc4f3ca5b50e0d721346236c88879481f082813225583f367520549847b385734a80674426fb2fcbbb873ed5637da17428d02f18d724599596a8e119be42da3e2e16a34892100947d875be7f2fbb60d5dd51b2bece36890fe9cccf8cb3b69497d13726d3b6d60bdae14ba85ed32e25944331e03cf6d9402c09a122fccd6fd2135765616e9991e2cef0ad59cd33c06c19db23ac1a896e23f7709eaf8c564b448993f4033030ef5413264a819c09610a0adcfb9314a24c9f7d4227fab0de99ea714735d2f55d8000b6ea590ca6d530e362352395fd7d5f30c900cb72311f27e214f5cc11672248b1d42d2e932a428dd5444079e8e173d8ce7b85a99b499e6f42f7307b2cbfb31c2621fd36b1bf47bfb41dc1218c8b7bd0f6301965d493b4cb8dc80709f6aa21a537d8ef126231ee192a79e2202170651efdf24b68a436d6ffe6812a5033aef54c75f2fc044951521a5b2a89aa89ed9df6706f8b9455948224a58b91cd0ec5ed56b86f42aa9bd36ed86d0cd36ab4534b864880417680b2b82dc467fad3ff69201adbfc0c613078b6f7780624f8535c97a3b038fbd31dc1ff145a3ccaf47b0ad3fd4983d85ad2f845d2c212deca7df27dfa4a462bf0506c1f11cc9aa3e7d67f4961e44b2d5af79819cebc280b0b45690e452d499f12f9b0c3bc919124b1af19ae3f0d99794c48fb3eb1d9ca6bfd426788b01a6cf7672e235778b0e62ea8a3715c6910869c45c74017b3b791cc27d5793b57523b45f8e6d8a5e01b4748dc600a19bf8e5e52a24c4d7b0db9b4a4ea5a4e6ead63625e08b1de45a5a7622c49490ecd4adc3eb6cbc1232257c4d051201d659c1cd0215ca19d6c530f291769b6503eeb9b7893b5af00de2c16a6a61e12ff342e1c9d2d9f9732d386f45ba78d3aaeeb4e7b420417704bf4206991ed4829fcd68d79a07294ed7afecb9125a62cc830e56ca0eb88aeaa524d8d5fea378e8db339315cfd2340a7d786aeda7aa34a05ae24d879c52b91c45f238a44a60fdc8414dd48899dfdfc4057b4f7fbe2138d7c69defae1142df6f8d02d813fc67cb4c0cc3877d2268e3828d89f36733b7dce7f3d8356ecc330b788f3379451839de1b1bd55bdfbe662be96f695da0224fec79f1d23093c0e3c84429fcc198952507aeed9dd695a789f29c4d35b756d12bf70c6418c9710819090f132f45c1ae9e7dc152abcd78bb651d852055f92755ef54b7ddfd081b24edd681e50e52c072cfa48f641cc1fe1cb92098a32b5a9b9debda004cd20e955f58c4ff1d920fcb17e3dd7bebb13fa3c7d8d6cbbb722f416fabc3d7bc8e213037c9c76de4edd0926cbbf50a6b5cedbed00672d044ed46222db8bf48d43909fe9cc4fcdec7b466f1bd74e1dfe58f9bb10fa1692227717515eaca0d3cbfd44e814759a6f3cc91eac7ff2070bd0c90182bb2a000114badf41eb6c81612fdb9025b1560ed90b111e7208961a483c71ab7d9122ff3107e5124950fc2775b82106c7a24713cda62f1064963a3ffa0cf82b782685ad5f7e036378ab2a770229f8881c66f3f1db72b0021d5f378ebcc32dda4ca18d7907cf149a6d1d0108808f868725f8125297af922d034a071b2d10e70b27d3ed84c65ef706c5375e65c6a9006b7b9e401e3445d7bdc3637e73980a533bce5cc85394f1c01ec69423aa7720bd885ec67b34593deed98ab8e74bec5ae1550ef334c94e143a91dc223e3575a0d5a16a4470c6162de26afb18d8f99ef3c161bd2d175bd700c0024abac36488ccd9a774fd150196ee16a770f33bf4cad0928ace88971a87ea2b84afd2161edf4cb625a26e43c8ba5352382f2c12fb0f14691cfd22d496a6b091cff8ecbbd01fe6614a1542bcc4c3903b7f56ef50c8bb9a95698055904354255b171c56a9b7ac63ebf31c8c548c963fab84933f17df37ce52605a32e52c2ab411f68558dcf60dea4674b70fe23501faf6a8ebe0aae2ca4dd534731c6ad0e99e357c3f3848deba3a33f047361061c7561b00901787c954a08669b5f42d69d307a14d1ae622ef39e986ea4c4fed6954c7f62c39b07bffbfa1ed9514151843865e8d815ed9be22c9bc3b63174dc09ce79ef956a8f91c772bc76cf58325d68a4048e39c24d9c6790e6c14aac7b2b9574db021bcb3c8e89b1343d0d3e3e28a81cd5e111abe7bbf796093c2b59e3b250de8c6b734ab7b8166c5851b9202b2d560dcf927c46b0ab8078852b4f906b962a2832206f0dbc03ac9de78d01c6b1f694ee74aa78cde03903494b8ef7d8e05e00f701d3407870e6db59865756ebe369c5591510eed600fc0890f136e8811a031ce274bc283ff1b6315327f85c405ea0f233cf70d4009e81820aaeb449ce6ca20388718beaa02696842dbb265ac16cce36fefdac983abba8e99e34d2892c0b9f608dc9319beac4274dfb267b3c38bd9c8f528795263493ac90c8f3629138d3677bfe3188b90cb55f4db33a0c76346f4c286fbdea5be9df76ee3202c22e883c3340ac027f6b6ff935d6e835197e2f780064e591dcef840d7636fcbd0cc3f9a5f16d3bfac379bd395c79bd451e8c1a8c304631223689356e9a107079b2675e68378fb9ebf6422dd43f4470b49c462261e1549a3432441bbaf24c386b81045197020f03d0de2288009f85b053733ae06151067e9aba1e3d9ad2d3d024e9b27dcf1ff46a8f3992e1982fadfad68305baaf646e88eb90bbb7", 0x1000}, {&(0x7f0000000400)="2fb93b9ab06c2aec2b37876643f5ab0d3cb3054d4e2870d845de23fcaf0bc2114b6b7b572387b59799f8b5f5cb2c399c65835ad72d5b5d610bcee89af07794872b9f8ec6ad37e1edae02f224e53e42d834a547aac2ff807515e2894cad91424bf1577a10ea9676699ed06df35d625c0b393b695e8dcb13d17127175119d128297480a3be432e4f96b165f4a08a8bcd71301a965d054b2a29d324d2d867581b881580fc5000f696fec021b8a119c7360dcce7480a9abbd0dc", 0xb8}, {&(0x7f00000004c0)="b88fc93bcf2b31fe48c14df7562f9d50fe81aa43a4807678bf4379401ee4e4e1890a43f8", 0x24}], 0xa, 0x1) [ 426.316354][T20759] ? ns_capable_common+0x93/0x100 [ 426.322706][T20757] BPF:Invalid name [ 426.327719][T20759] __do_sys_bpf+0x1529/0x37b0 [ 426.327741][T20759] ? bpf_prog_load+0x1830/0x1830 [ 426.327760][T20759] ? __kasan_check_write+0x14/0x20 [ 426.327775][T20759] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 426.327797][T20759] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 426.332539][T20757] BPF: [ 426.332539][T20757] [ 426.338617][T20759] ? wait_for_completion+0x440/0x440 [ 426.338640][T20759] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 426.338667][T20759] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 426.338684][T20759] ? do_syscall_64+0x26/0x790 [ 426.381741][T20759] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.381761][T20759] ? do_syscall_64+0x26/0x790 [ 426.381783][T20759] __x64_sys_bpf+0x73/0xb0 [ 426.381797][T20759] do_syscall_64+0xfa/0x790 [ 426.381819][T20759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.391927][T20759] RIP: 0033:0x45a639 [ 426.391945][T20759] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 426.391954][T20759] RSP: 002b:00007f58ab4d8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 426.391967][T20759] RAX: ffffffffffffffda RBX: 00007f58ab4d8c90 RCX: 000000000045a639 [ 426.391975][T20759] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 426.391983][T20759] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 426.391991][T20759] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58ab4d96d4 [ 426.392004][T20759] R13: 00000000004c0ada R14: 00000000004d3550 R15: 0000000000000003 [ 426.420146][T20753] BPF:[1] DATASEC (anon) [ 426.433614][T20753] BPF: [ 426.478868][T20753] BPF:meta_left:12 meta_needed:12264 [ 426.488763][T20753] BPF: [ 426.488763][T20753] 12:22:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:22:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0xe00}, 0x0) 12:22:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x5f00}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:22:04 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r3) r4 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000440)={r5, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000a80)=ANY=[@ANYRES32=r5, @ANYBLOB="630000005a4880de517842d213f542ba7a239e3c4bc193d9bc9a4e5b1a045f7b5e0d7e94deaec557d767a615d362be6e865725bcc71b86224548be734c5858c3464551d868f9edfda138a69b6571442dd87bdacf856acc433bd005137601e7695732d1cfa0e32efa0e2196d48face1f91d8f9ebe87ab02914123ee6375ae3ea4e5686686cb4035d629854cb6298e96c617f66873e76cdad2be7a733bc4d4bef7362580c811d62bf8e198d9e8da560079a8caf8238c374f74d813221815d54a7478774262710348cf810505a917630f6b770a8ac15c0a846589720374e76cdfa875601476668b5a6f7edd920b099aae144b6431cc8648bb367caf7c654506d1e4a4148e32cf856699a024f0f7b9a0626a2a1118bf93bd9ab18b7c6be896af7c9055ce7ca5f6"], &(0x7f0000000000)=0x6b) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000d00)={r5, 0x1000, "6167067ff89a9aad417ccc926c290a0f90d326b7355513cfc25de3c83d84b9aa2d9f6f8bc30868bbdf6f09243c44ad012c858c0c2434289e4ca2698b047b0f8c2261191acb6cb46c39c107ef94fa4fb1bbc2ae0329408e365bb1fb4392808caeb3a63455e2f45d22831eb71d59717bd8f41ceba3c33d8c4416ecad1b9a2b5225a9b764b2dd2fec2e6ed75b780ae46ab52628cbec193b1409e4a1bc5a2cde43e06cbeb908d203d7b0ebbc9a39851ae4a66c89edefb1b8626dfb8557d47bbe68dd6f4ce9d4c2534954baef90bb6aa886953d6491bddee34c0179acc0a0db064129cdd9bad25c5c2b221c4493e4d080596ef89954f1d8bdfd0b5d32fa61625665c83bf3086cf6076e1889c7ee0006e5d654935ad2c06d92f2ea9c3ef2a851449ed10fad95de328a48c235fffbafbded67d6810d8f76ed8847f1e49cc500c0246b78ed23eeecd7d9f07ec31ae38e78d9c33190cbe3f11379c305d96e0b622f247521de8085de10014f57686ad6af00ee261ceeee8a63f75f87718cb68e777d8c5edce822c7dea6016e9e69181073de4acfdc0c65e443ec8caaef8f76724f2ddd27dd3e9dace32ccc392e69228f8a9f1db5fbe84948208cfd32895e1b71f2aa147c02236e0c3400116bd6058dac0fcc940070ef05916e411a595032d28200ee6cd558e1ac718654a8ccb824f81e37f204b1ffb51974432ef8498538684ef91cc15ea1a07d5f63a51649e6e607a90feff2aa2983aac4bf7317be7e6e4b4266c43a9eae0a86b94abfb4c9aeb2a1fadf53960b8ea452737cd4010926feb2159bec8f18e7a3f1ad94caa9e0d4b154f1457926a6b6b5b4e28a46644cb0e6f6be298962422598974adc8cae270481a600788c393405f50538bb3324d111b54b331333ba9854bb5e794e6b5f1b66e196dacbbb2b8e8b61742fec12cfa0ba40d2a415efedd6f13d267fafb0a0f8e4b0966506497c8fe39feda0d624bb0294e06465210a2ccc68a21d9f2a14ea1fb6a71538ca6425ec701e0e11d0728c5681c3b3a8473b1eb9aa2853b86e9d2e49c8278d4b8de55821fc81ad988ac268b2b05ae0524b1635e51ebd6e22474605a93441d3a1d3130068cb2b8e6d101b0883446c3ddc25cd57d019766d7f8613bc6b796eff07ad0e4bd0db129c44982e0bb5435b7341d6e694c0d8685e24d0d9ff24256a9296e51b46fd1081f8e38552c8b53d06abb5549bdfeee2aabe21d992b57dd578d5f6c40f60b7d57f6b57b76f7f98c342744e52bd2a0b43b38ae36a457be70611b0faf1019b911a614bd466d6b350ff03a6969bef26a47bae4f6107c5034e64d524601deeb31f67bd2118932973a5d153bcf9942abf9e6e6325cbb1d773136affb61366103049ba562c8096899c5cac6d368cb557c301d492e6ecb8d2e02bc09ad32787920afac60f0c96a4fa481dd93f9add786b0c3560992e90c556fb971bd2e96bf268cc31ce68058faf44798e084fb2c64be78f028b3937c36e2286df89d1194da8b9cec8bf1f07dbc0a16d0c9d4cf1fff519e4a4b18883239841fac4da3b7aaa33db989476f2dda253c822855c8eb98bb2a67ae79e8ee05b899b9baf9b45b0bba5474508728c6e7d94f05134eb21ba3bbbffad0ec25c39b6166c382d4b653d54a2e9c8b9af952607b76b4fa1e6b8274be7801983340c0ee09f10b6870153f5eb10c196dd593091daa86b12b3345a934eea7f31d8b7fe07fda44151772777533585ce5ec493739be0fed5a985c8b632ca4720a9840518d07aebf5a4033d42480148e1e64e6249c2d2ff88739b6c923fe9167468fc37ed8fbc4645f22cce70a4a026f5fbefd54d3a04b4805990777f370b751e3434d3eb0730a4996430361d877c2a70d400219a4b0835fa7908a23c7a6088c67378f013d77679efea35342b977ee54d3be0255e200de501f3ab1ebb8dc5c069c1b651e51424e8597256c6302f8c9eb30f46132cfbf176911fdf1bd922d589fd175e7edf0bf591505bcaa2ea28684a06d089205ea0d1e422227b88bea7133a36aaa0220ebaf6e0b790750c784e0c672e7e29042def943367c5f48ead094a86efb0788717516b6c5de9e72b0a51575d4a3706572356bf6d24da15b99cc6a6f2b0d9a1781d57062679bdaf9778b124cbe3b1c3e651ed37509e46a406e3d9e3f16f8562fdb2aac99803d6d77090f35cd8c993d0b9580523e6b9ebc47f8b6939cbe5936953fa18ecdc2893c48f2e939d1ca568ef8bff6b9eba40f5109d6daa3dd4ed71a993088604db162639a3766301f293c13a88fda97c71c10cc374ce080feaf1829b7a53efe564e1980e7d08267f2d8c9b8f1e5775c36962e87aa679f67a742eb69a7f4aef6914fd71a8b03526cb8f57c5d77d86bbcc96fe5df91793ea1d822eaa8111a4813812dfe7fcb60368dbefd2cb2192ffb00ebf023ced03c50301b3e2161cb7e5887930ce17613a3e68ae91cbf72305f595e55bbd91d508e6460c570a58f96290d96d2ba551257af7f06890ba6989379e250f71761ba367bec498a4e466e6d0f5328c47072647f7fccfe9a5874cdf928e8c5234aab70a3204dedddc09a14bcfc156aa653831123cd3c0ee0729aa26dcefdb17c185ae5b7ac1f8dbbec52a6d085c7957935e433353e66ff31fba3bd4f355db868c4eb293cce2607a765b90f82818baf0c164eedb34196f2f05e5e157e8b558a466bd71108eb5149b9d62c16e7b2688195dcd921f982ef620eb492ed835cb5325648e0614e52b95af9103d0b6ea55fc34bb80349125ae11cf6abd0fd0e032b1673a068a05b743c82944b0891d07a72399673259031d3252a1b5c2282948b3d6ff0b4fae323b5d14f1aca92a760211ea2635b78833bf304f9013279379580362be904d21dae3210b2a9f3a5b8c97f19505c602eb271bb6cb2cc7220e6a14c08965f40dfcb4f4014655d95600d3f6e3faf9b01d92e215835b3c27130ff96f2680c3ce3f4deaae0279b39fe1cb224434f502917f3445d42be5c3be708910bff593caf6d9024a172cc96062a41c39869d1e748a62262223bf3f38440a2c4a512d3ba0aaac296e669d523a15984e355201a135cdfa81003e2253304106514d6ee6c4425a53de308c436bca0e5df2c1e1bbcf2e3b8bc8a98b492c8843523e58b494d16ef6c844a9602dbefbc1ec588924d0181648d214070edec3f5b6df40a7747c6a8cfb4facff7c13adc7d06c5da874381debfd7cf75f676228a4497280a8fcbedd812592b19fc6aa4ed1bfbda9a51dd93b759d774ad7dd4bfcfafd6a5bee8b47ff550703efeeec1eb87e0edd3ec54f9d39b9330b6e37f25db0d721d17905c98cc956b641f29bc95b8fb346800d728a4993ac692064c7e29f6b096e086a02c169436778ac229c0499c48aa824575906f181dbd21d21fa46e6166fe7ae83aec812f0531f416d5826029d1b41e556fb0ba8d8a0d9dbbf6541278c5a63bfbf2b242e1963ba7b56fcc237fd12f56b7459aae73e58a09d863116fb368a844a31e617bc425c7dee1e948cebc3a3e4d34b66706e8592d2e4a478c2cf5dc3e1a344403f7c757ed3bae3a3bd22796158784ebbcefc95c85a8d6e452d72349810fe449273c75d82790390dc8afd11b9a719286bfdf9f399025924d64ed87ab88ece8e8ad7ce40757b287d021ba67541ab86876395aee0678761060c213fc06d4136078779269c4408e23daa94074e5c804b477c16b3b2fe0d3f75b2cc18eca2dadaf96575ed0824fa8afb47e9edca0a44c99402f4566e0a6964d43e52cfc58badb68f6b198f5675e8cfd116fc8c3befc5e7827a92c20ba071b12482db823fc42f51dfc5218b6ca6df26c66d67bbdb2b3c2ee2035f1a30aae2efc12a27a8fbbb827f7c334f3eb23532a3e79d5de05b992fa183b7833530ccbea3114254cb2307ad101d9d94ac0f2f3efb520a16150a725c2fd89642e0b2427855ba22c51052bb67a9c6bca2933fef1b38befb89993d42f603c0254e42f6990d41ad1c26b686540ce671ddffce67e962460284040dd43ca5e658b25aefe58948902f8be0de9c2b21eb2efcdf003bdcb634608320cf0690da9fde7bbf96119ac10041a50cbcab97ce01f4433bf434d891bedf3c5d1aeaab60837f163fb162a59b4462d893e5e8c775a0b72049f4ac760d5953c05c0a4dd369eb7cde0852498a805706c473ac635dc03fed4b065b18c2e2644dedde6b3685443dc3690fb538d5c644eea90dd3c54934a731a36da281a957048bc5c3eb32a3e0dad98224d0198452549e2e8373504348b3504bca74894f0d2cfb3745f1e765ed030c28456c4ce80bfd609432a2706e321b5bfcc45b436dbdce517d59c3224826db0370a4e0ebe08da169d5f6c024c18d27e9d8e2919e73872cd63907e9596b28584de24b846139ce06bfc55461d1b5dfe927972fcf6db8432c34edad5a40f4a36fa6fdf975c8956a257a8ef65468178f1e3152431c188a9d51ddcba31e7653b1f76cf13c2e8e3631b6942e15d8d27979ee0d56e58027decd19477d7f0927934efd034dce2a5b33d7146574001d788f0a7073f505a597526cbe029bcbc209e4a807bc04ffb95a250257171906ca0e105f3ea3395717d9325fc18cd796d7dd0913c9a925fadbaceb0e2b43de948977df596f46f2127b460253236a9ababf63162bca2de20dd514fa0132afd7ba84b617b6cdc92db4b1132c0ed26bc84f0dceac9d141fbb17f506265c7ef97825547ea5c7a30e52ae56151d83753fc7b55259536310de6d0d135d5d17986e2b052bf1077b45f5e18e5ab4a0352111d6da5fd32de5b8806a77e111e60efe4ef9fdff16a79d6a2c48903865e3cd2820032833975e1a504480943ab526cc4b6d03822a73833923d46cc0a417f17d343b983be915775fd1a16845ca09706efda4285c1b34487f7df9e24d0a0612683898864406ae522ee9ec328c163f5852ae640e58765ad8e69c4bf7f93491ebe4e1947533f1756f94df54e3eab9bd7577c19a20bd7f9f53aacbe9f319a652ba4461eca0e8e25de0cbd64e4f455b06c75a5ae8de471e1c23551915343d2598f75f4e1f8d42f00afb557a37d9e3ed86d971fc7b799b15560254ceb78c5d989f5d2be843bd6458f85f7fa1263323c8db677222a3c33b0695a107b35ba8e197636b8a13d0b31ded90de0a876e3a4edb43c09e96b543794bcd054840b444c5bb4ecfb55f7ba8bc20483d82a1dad0297b18f28537fd17c34cf524850428271133ae3d52a38575eddc959bdb860520f022dde6f73df98ffa0c9ff4618769d038b3834d9ca3ea52839c0fd8b8257af358159f7137e2c68edaac1d3e71603b304fa5a1ddaa307a082dcec90ccf528e8825876ac3a1790fa94d056aef5ea235396311978a8fbe3f1929e412ed50ad18b81d74d929ceaad6ecbd617167513fcb53f4ddad72865cf5b3a15003c52b121d14ed974b9a4e7667265851016a39f8b38ef0bd1fe69bfdd41250791f6acbfdf3b1680a84ad896ec7d846dc3852cec59439ae69cb2f8bdcbc5d829e1cc16c3495697ef692649d39ea8b38d30547abd4b523eb610852920a5e055147f76a1a67fccb3acbe2ab4eaed8a1fc3bc510e091f389273f999c68c4ffb3691ca058346471363a6f91c5d5c1ce8aa0dee310e1d067947ba5c213070913d4eecd3984ace1f1e1b14a9a914bea9ce8529944ad42e56e0a2bbdf96d9958e5efc1710a388fb6e1d06b05cb6e291834fc32a052032fa4be4f2c3d78e8f8dc124b93637dcac1ff0a7b046d82068833e79c355e2d926a4a9065c22486426266301af36cb3a0503e715869"}, &(0x7f0000000040)=0x1008) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0x6, 0x3, 0x5, 0x6, 0x0, 0xf1, 0x1, 0x1, r6}, 0x20) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) 12:22:04 executing program 1 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) [ 426.625595][T20773] BPF:[1] DATASEC [ 426.629557][T20773] BPF:size=3436 vlen=1 [ 426.638383][T20773] BPF: [ 426.655549][T20773] BPF:Invalid name [ 426.661148][T20773] BPF: [ 426.661148][T20773] [ 426.667050][T20773] BPF:[1] DATASEC 12:22:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0xec0}, 0x0) [ 426.672207][T20773] BPF:size=3436 vlen=1 [ 426.676289][T20773] BPF: [ 426.679052][T20773] BPF:Invalid name [ 426.704541][T20773] BPF: [ 426.704541][T20773] [ 426.736479][T20779] BPF:[1] DATASEC (anon) [ 426.756510][T20779] BPF:size=3436 vlen=1 12:22:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x6800}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 426.782757][T20783] FAULT_INJECTION: forcing a failure. [ 426.782757][T20783] name failslab, interval 1, probability 0, space 0, times 0 [ 426.786347][T20779] BPF: [ 426.820229][T20779] BPF:Invalid name [ 426.831089][T20783] CPU: 1 PID: 20783 Comm: syz-executor.1 Not tainted 5.4.0-next-20191126-syzkaller #0 [ 426.833468][T20779] BPF: [ 426.833468][T20779] [ 426.840679][T20783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.840685][T20783] Call Trace: [ 426.840718][T20783] dump_stack+0x197/0x210 [ 426.840746][T20783] should_fail.cold+0xa/0x15 [ 426.840768][T20783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.840787][T20783] ? fault_create_debugfs_attr+0x180/0x180 [ 426.840808][T20783] ? ___might_sleep+0x163/0x2c0 [ 426.855713][T20783] __should_failslab+0x121/0x190 [ 426.863282][T20783] should_failslab+0x9/0x14 [ 426.863300][T20783] kmem_cache_alloc_trace+0x2d3/0x790 [ 426.863316][T20783] ? refcount_sub_and_test_checked+0x154/0x200 [ 426.863330][T20783] ? refcount_dec_not_one+0x1f0/0x1f0 [ 426.863353][T20783] btf_new_fd+0x424/0x1d10 [ 426.875363][T20779] BPF:[1] DATASEC (anon) [ 426.879934][T20783] ? refcount_dec_and_test_checked+0x1b/0x20 [ 426.879950][T20783] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 426.879974][T20783] ? apparmor_capable+0x2ed/0x630 [ 426.899931][T20789] BPF:[1] DATASEC [ 426.905723][T20783] ? cap_capable+0x205/0x270 [ 426.905743][T20783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.905768][T20783] ? btf_type_seq_show+0x1b0/0x1b0 [ 426.905791][T20783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.920442][T20779] BPF:size=3436 vlen=1 [ 426.925822][T20783] ? ns_capable_common+0x93/0x100 [ 426.925844][T20783] __do_sys_bpf+0x1529/0x37b0 [ 426.925864][T20783] ? bpf_prog_load+0x1830/0x1830 [ 426.925881][T20783] ? __kasan_check_write+0x14/0x20 [ 426.925905][T20783] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 426.934894][T20789] BPF:size=3436 vlen=1 [ 426.937148][T20783] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 426.937166][T20783] ? wait_for_completion+0x440/0x440 [ 426.937196][T20783] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 426.949770][T20779] BPF: [ 426.951790][T20783] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 426.951805][T20783] ? do_syscall_64+0x26/0x790 [ 426.951826][T20783] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:22:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 12:22:04 executing program 1 (fault-call:0 fault-nth:2): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) [ 426.951837][T20783] ? do_syscall_64+0x26/0x790 [ 426.951861][T20783] __x64_sys_bpf+0x73/0xb0 [ 426.957420][T20779] BPF:Invalid name [ 426.963184][T20783] do_syscall_64+0xfa/0x790 [ 426.963208][T20783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.963219][T20783] RIP: 0033:0x45a639 [ 426.963234][T20783] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 426.963247][T20783] RSP: 002b:00007f58ab4d8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 426.968541][T20789] BPF: [ 426.972292][T20783] RAX: ffffffffffffffda RBX: 00007f58ab4d8c90 RCX: 000000000045a639 [ 426.972301][T20783] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 426.972308][T20783] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 426.972317][T20783] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58ab4d96d4 [ 426.972325][T20783] R13: 00000000004c0ada R14: 00000000004d3550 R15: 0000000000000003 12:22:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x2, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 427.047602][T20789] BPF:Invalid name [ 427.051038][T20779] BPF: [ 427.051038][T20779] [ 427.056375][T20789] BPF: [ 427.056375][T20789] [ 427.152448][T20795] FAULT_INJECTION: forcing a failure. [ 427.152448][T20795] name failslab, interval 1, probability 0, space 0, times 0 [ 427.156420][T20789] BPF:[1] DATASEC [ 427.165246][T20795] CPU: 1 PID: 20795 Comm: syz-executor.1 Not tainted 5.4.0-next-20191126-syzkaller #0 [ 427.177607][T20789] BPF:size=3436 vlen=1 [ 427.178434][T20795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.178440][T20795] Call Trace: [ 427.178469][T20795] dump_stack+0x197/0x210 [ 427.178502][T20795] should_fail.cold+0xa/0x15 [ 427.182715][T20789] BPF: [ 427.192634][T20795] ? fs_reclaim_release+0xf/0x30 [ 427.192661][T20795] ? fault_create_debugfs_attr+0x180/0x180 [ 427.192690][T20795] ? ___might_sleep+0x163/0x2c0 [ 427.192713][T20795] __should_failslab+0x121/0x190 [ 427.192732][T20795] should_failslab+0x9/0x14 [ 427.192750][T20795] kmem_cache_alloc_node_trace+0x274/0x750 [ 427.192775][T20795] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 427.196248][T20789] BPF:Invalid name [ 427.200354][T20795] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 427.200378][T20795] __kmalloc_node+0x3d/0x70 [ 427.200397][T20795] kvmalloc_node+0x68/0x100 [ 427.200417][T20795] btf_new_fd+0x468/0x1d10 [ 427.200437][T20795] ? refcount_dec_and_test_checked+0x1b/0x20 [ 427.205170][T20789] BPF: [ 427.205170][T20789] [ 427.207925][T20795] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 427.207944][T20795] ? apparmor_capable+0x2ed/0x630 [ 427.207959][T20795] ? cap_capable+0x205/0x270 [ 427.207973][T20795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.207998][T20795] ? btf_type_seq_show+0x1b0/0x1b0 [ 427.223550][T20795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.232949][T20795] ? ns_capable_common+0x93/0x100 [ 427.232974][T20795] __do_sys_bpf+0x1529/0x37b0 [ 427.232994][T20795] ? bpf_prog_load+0x1830/0x1830 [ 427.233010][T20795] ? __kasan_check_write+0x14/0x20 12:22:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x6c00}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 427.233031][T20795] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 427.248515][T20795] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 427.248536][T20795] ? wait_for_completion+0x440/0x440 [ 427.248561][T20795] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 427.248593][T20795] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 427.273725][T20795] ? do_syscall_64+0x26/0x790 [ 427.273748][T20795] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.273763][T20795] ? do_syscall_64+0x26/0x790 [ 427.273785][T20795] __x64_sys_bpf+0x73/0xb0 [ 427.273801][T20795] do_syscall_64+0xfa/0x790 [ 427.273818][T20795] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.273835][T20795] RIP: 0033:0x45a639 [ 427.354449][T20795] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 427.354458][T20795] RSP: 002b:00007f58ab4d8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 427.354472][T20795] RAX: ffffffffffffffda RBX: 00007f58ab4d8c90 RCX: 000000000045a639 [ 427.354486][T20795] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 427.370641][T20795] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 427.370650][T20795] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58ab4d96d4 [ 427.370659][T20795] R13: 00000000004c0ada R14: 00000000004d3550 R15: 0000000000000003 [ 427.463228][T20800] BPF:[1] Invalid btf_info:f020001 [ 427.465542][T20802] BPF:[1] DATASEC [ 427.473021][T20800] BPF:[1] Invalid btf_info:f020001 [ 427.476864][T20802] BPF:size=3436 vlen=1 [ 427.485444][T20802] BPF: [ 427.488416][T20802] BPF:Invalid name [ 427.497773][T20802] BPF: [ 427.497773][T20802] [ 427.533776][T20802] BPF:[1] DATASEC [ 427.548878][T20802] BPF:size=3436 vlen=1 [ 427.565889][T20802] BPF: 12:22:05 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) mq_getsetattr(r2, &(0x7f0000000100)={0xff, 0x10001, 0x1, 0x6, 0x200, 0x0, 0x3}, &(0x7f0000000140)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) write(r3, 0x0, 0x1000000) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) getsockopt$bt_BT_DEFER_SETUP(r7, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$inet6_int(r7, 0x29, 0x46, &(0x7f0000000000), &(0x7f00000000c0)=0x4) writev(r5, &(0x7f0000000880)=[{&(0x7f0000000740)="93fc0bd357dd69518a04d2272e3668"}, {&(0x7f0000000780)="3dc04a1a7c3821fecdb68eee3e8d6779776a84805b17454a461382bab2006018cac4fb9ac23f5f08e1e4736b24543a8cecc0311c34a2cb4db04f37485c6bc6af6dd4bf30ef3b0040180960b84bcd4d889a768d608e38d28ec60744be395439c689d9cb6c81cf95406751aaa0b87088132d3561254e3863adfcc851939690d00a782785de8f30decd52e5a8a84ab25c75dd52379b1e7d8cc8adbb7fef7f81af0b70b69d99544f63d9978b34452a7984c233f67753eeb30260126d40a4c1c4a4f173b666d1fab1b321a7b5c3b3f3e4c05006b94c9a71f82e7a94f15072a9fdf49f05058496af5ac2821d94b079e2"}], 0x262) [ 427.591011][T20802] BPF:Invalid name [ 427.595414][T20802] BPF: [ 427.595414][T20802] 12:22:05 executing program 1 (fault-call:0 fault-nth:3): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) 12:22:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0x3f00}, 0x0) 12:22:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x3, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 427.701711][T20816] BPF:[1] Invalid btf_info:f030001 [ 427.712682][T20817] BPF:[1] FUNC_PROTO [ 427.715051][T20816] BPF:[1] Invalid btf_info:f030001 [ 427.726969][T20817] BPF:return=0 args=( [ 427.751858][T20817] BPF:void [ 427.754970][T20817] BPF:) [ 427.757741][T20817] BPF: [ 427.764944][T20817] BPF:Invalid name [ 427.768900][T20817] BPF: [ 427.768900][T20817] 12:22:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x4, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:22:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x7400}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:22:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 12:22:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) 12:22:05 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) r4 = socket$l2tp(0x18, 0x1, 0x1) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r6, 0x660c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) fcntl$setownex(r4, 0xf, &(0x7f0000000040)={0x4, r7}) write$FUSE_LK(r3, &(0x7f0000000000)={0x28, 0x0, 0x2, {{0x2, 0x10001, 0x1, r7}}}, 0x28) [ 427.875644][T20825] BPF:[1] Invalid btf_info:f040001 [ 427.891863][T20827] BPF:[1] DATASEC [ 427.898604][T20825] BPF:[1] Invalid btf_info:f040001 [ 427.911619][T20827] BPF:size=3436 vlen=1 [ 427.912741][T20829] BPF:[1] FUNC_PROTO [ 427.916655][T20827] BPF: 12:22:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 12:22:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x5, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 427.928325][T20827] BPF:Invalid name [ 427.935540][T20827] BPF: [ 427.935540][T20827] [ 427.945426][T20829] BPF:return=0 args=( [ 427.955234][T20829] BPF:void [ 427.973484][T20827] BPF:[1] DATASEC [ 427.983728][T20829] BPF:) [ 428.000441][T20829] BPF: [ 428.007925][T20827] BPF:size=3436 vlen=1 [ 428.007947][T20829] BPF:Invalid name [ 428.020197][T20829] BPF: [ 428.020197][T20829] 12:22:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x7a00}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 428.032168][T20827] BPF: [ 428.041589][T20827] BPF:Invalid name [ 428.059015][T20827] BPF: [ 428.059015][T20827] [ 428.105344][T20843] BPF:[1] Invalid btf_info:f050001 [ 428.134652][T20846] BPF:[1] DATASEC [ 428.143368][T20846] BPF:size=3436 vlen=1 [ 428.150458][T20843] BPF:[1] Invalid btf_info:f050001 [ 428.158410][T20846] BPF: [ 428.167874][T20846] BPF:Invalid name [ 428.183151][T20846] BPF: [ 428.183151][T20846] [ 428.226353][T20846] BPF:[1] DATASEC [ 428.230227][T20846] BPF:size=3436 vlen=1 [ 428.265331][T20846] BPF: [ 428.268294][T20846] BPF:Invalid name [ 428.272636][T20846] BPF: 12:22:06 executing program 1: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) 12:22:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0xc00e}, 0x0) 12:22:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x6, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 428.272636][T20846] 12:22:06 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000240)=0xfffffffa, &(0x7f0000000280)=0x4) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000140)=""/246) write(r1, 0x0, 0x1000000) modify_ldt$write(0x1, &(0x7f0000000100)={0x76c, 0x101000, 0x4000, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1}, 0x10) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000000)={0x10002, 0x0, 0x10000, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) r4 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xc000, 0x10) connect$unix(r4, &(0x7f0000000380)=@abs={0x0, 0x0, 0x4e20}, 0x6e) ioctl$USBDEVFS_GET_CAPABILITIES(r2, 0x8004551a, &(0x7f00000000c0)) r5 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x18202, 0x64) ioctl$sock_bt_hidp_HIDPCONNDEL(r5, 0x400448c9, &(0x7f0000000300)={{0x7f, 0x8, 0xff, 0x5, 0x8, 0x3}}) 12:22:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0xbe00}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 428.362505][T20857] BPF:[1] Invalid btf_info:f060001 [ 428.397962][T20857] BPF:[1] Invalid btf_info:f060001 12:22:06 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) 12:22:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0xea02}, 0x0) [ 428.437162][T20863] BPF:[1] DATASEC [ 428.468304][T20863] BPF:size=3436 vlen=1 12:22:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x7, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 428.496522][T20863] BPF: [ 428.525946][T20863] BPF:Invalid name [ 428.540129][T20863] BPF: [ 428.540129][T20863] [ 428.563347][T20863] BPF:[1] DATASEC [ 428.567256][T20863] BPF:size=3436 vlen=1 12:22:06 executing program 1: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) 12:22:06 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000580)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x103000, 0x0) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000d00)=""/4096) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f00000000c0)=""/115) r4 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x9, 0x800) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000180)=0x1, 0x4) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r1, r0, 0x0) write(r1, 0x0, 0x0) [ 428.589312][T20863] BPF: [ 428.600162][T20863] BPF:Invalid name [ 428.614676][T20863] BPF: [ 428.614676][T20863] [ 428.657084][T20873] BPF:[1] Invalid btf_info:f070001 12:22:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0xf000}, 0x0) 12:22:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x1000000}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 428.678806][T20873] BPF:[1] Invalid btf_info:f070001 12:22:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x8, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:22:06 executing program 1: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) [ 428.853037][T20888] BPF:[1] DATASEC [ 428.876938][T20888] BPF:size=3436 vlen=1 12:22:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 12:22:06 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000340)=0x0) ptrace$peek(0x2, r3, &(0x7f0000000380)) tee(r0, r1, 0x0, 0x9) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r4, 0x4004743d, &(0x7f0000000c00)=""/246) r5 = socket$netlink(0x10, 0x3, 0xd) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1f, r7, 0x20b, 0x0, 0x0, {{}, 0x0, 0x410c, 0x0, {0xe0, 0x14, 'syz0\x00\x12\xc0;\xf3\x18\x1cy~T9\xaf\xd8\xda\'\xe68\xe3\x15\xd3c\xc4\xb5Q\xf9\xa5eX\x96\xc7\x06\xa8&\x18\x10i\xe9\x8ax2\xe7\xf5\x9bA\x17\xa1@\xf0\x05\xdd\xfb{\xc5\xa9/\xd5\xf7c\n\x95\x00\x8ft!\xa2\xfec\x92\xd2\x80\x99\xc5\x98\xd3q\xf0\xbb8\x16\x9f}\aq\xcd\xbb9O@n\x90%\x9e\xbe\x03\x92\x06\x82\xcc)\xe1W\x84[y\x16\x92B\x13k~\xdb\xb7\t\x89$.\xc2RZ\xdcy5\x93\xc3\\!\x8bUe\xe8\xb9\xe7\x01\xb9!\xcd&\x82FI\xc2y\xf1\x91*\x0e\xa2\x82C@\x06*\x17+%\xe7\xf0G\x03.lO2\xef\x03\xdcTd.w\xc9\xcd\xb4\xaf)\xb9\x10\b\xf4\xd0\x96\xce\x94\xb1v\xa7\xdb?1j\xcd\xc5}\x1btWmf\xa1\xe7C\x96\xed0\xbd\xe2\xba(sjH}\xb4OE\xca'}}}, 0xfc}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x202000}, 0x395, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="3000000008759bd24dbe5b3fbbcc21871536292e41a18381437dacbbcb3418c07310bc0526118a7d2922e2ee1e468d14e5dc199e213e3e81662b49408529e9c718b9d52f96", @ANYRES16=r7, @ANYBLOB="410029bd7000fcdbdf25010000000000000007410000001400180000000969623a6772657461703000009143b8d8af044980839bce9e6bc23d4fd78cc3cc6a271334205023b4ff10bb26a04fb256c63025cf32086413687a10d1eabe26e39e132f491710ebb303abeba916a968e06902722a2c1d18a9a58927459eeca006000000000000009a18e8fbaa28181784fc3b471136ccdd24f4081f27c9f2b02db9a9d9df9bdc2ff04baac2c1489f059acb48e754ff488fb8aa80dc4bbbab2ea00d8a204f558b2d997c2abd9fbc3ea23f952e776ae62200"/225], 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000044) write(r4, 0x0, 0x1000000) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f00000003c0), 0x4) sendmsg$TIPC_NL_NAME_TABLE_GET(r5, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x9002220}, 0xc, &(0x7f0000000240)={&(0x7f0000000740)={0x158, 0x0, 0x0, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x108, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'veth1\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'yam0\x00'}}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xdc4a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'team_slave_1\x00'}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffc01}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x2004c814}, 0x40080) dup(r8) ioctl$sock_inet_SIOCSIFNETMASK(r8, 0x891c, &(0x7f0000000300)={'veth0_to_hsr\x00', {0x2, 0x4e20, @multicast1}}) [ 428.914056][T20888] BPF: [ 428.918790][T20893] BPF:[1] Invalid btf_info:f080001 [ 428.921815][T20888] BPF:Invalid name [ 428.929068][T20888] BPF: [ 428.929068][T20888] [ 428.966023][T20893] BPF:[1] Invalid btf_info:f080001 12:22:06 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) 12:22:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x18, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 429.001731][T20888] BPF:[1] DATASEC [ 429.005588][T20888] BPF:size=3436 vlen=1 [ 429.009654][T20888] BPF: [ 429.079994][T20888] BPF:Invalid name 12:22:07 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000100)=[0x8, 0x7b]) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) dup3(r3, r0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x5) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_DAEMON(r5, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) write(r3, 0x0, 0x0) [ 429.105262][T20888] BPF: [ 429.105262][T20888] 12:22:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 12:22:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x2000000}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 429.181855][T20908] BPF:[1] Invalid btf_info:f180001 12:22:07 executing program 1: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) [ 429.220180][T20908] BPF:[1] Invalid btf_info:f180001 12:22:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1a, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:22:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) [ 429.370055][T20922] BPF:[1] DATASEC [ 429.396263][T20922] BPF:size=3436 vlen=1 [ 429.414304][T20922] BPF: [ 429.427666][T20922] BPF:Invalid name 12:22:07 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) [ 429.448029][T20922] BPF: [ 429.448029][T20922] [ 429.460372][T20931] BPF:[1] Invalid btf_info:f1a0001 [ 429.465933][T20922] BPF:[1] DATASEC [ 429.469952][T20922] BPF:size=3436 vlen=1 [ 429.491830][T20922] BPF: 12:22:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) [ 429.492097][T20931] BPF:[1] Invalid btf_info:f1a0001 [ 429.500348][T20922] BPF:Invalid name [ 429.508776][T20922] BPF: [ 429.508776][T20922] 12:22:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x48, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:22:07 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000c00)=""/246) write(r1, 0x0, 0x1000000) 12:22:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x3000000}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:22:07 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) [ 429.699590][T20945] BPF:[1] Invalid btf_info:f480001 [ 429.757559][T20945] BPF:[1] Invalid btf_info:f480001 [ 429.803979][T20952] BPF:[1] DATASEC [ 429.820240][T20952] BPF:size=3436 vlen=1 [ 429.836140][T20952] BPF: [ 429.839613][T20952] BPF:Invalid name [ 429.844051][T20952] BPF: [ 429.844051][T20952] [ 429.858472][T20952] BPF:[1] DATASEC [ 429.862816][T20952] BPF:size=3436 vlen=1 [ 429.867055][T20952] BPF: [ 429.869975][T20952] BPF:Invalid name [ 429.874486][T20952] BPF: [ 429.874486][T20952] 12:22:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x4c, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:22:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 12:22:07 executing program 1: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) 12:22:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x4000000}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:22:07 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) getsockopt$bt_BT_DEFER_SETUP(r2, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f00000000c0)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) getsockopt$bt_BT_DEFER_SETUP(r5, 0x12, 0x7, 0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x10200, 0x0) r6 = dup(0xffffffffffffffff) ioctl$EVIOCGPROP(r6, 0x4004743d, &(0x7f00000004c0)=""/294) dup3(r3, r0, 0x0) write(r3, 0x0, 0x0) [ 429.969512][T20960] BPF:[1] DATASEC [ 429.979210][T20960] BPF:size=3436 vlen=1 [ 429.987668][T20960] BPF: [ 429.997395][T20960] BPF:Invalid name [ 430.005776][T20962] BPF:[1] Invalid btf_info:f4c0001 [ 430.010282][T20960] BPF: [ 430.010282][T20960] [ 430.031491][T20962] BPF:[1] Invalid btf_info:f4c0001 [ 430.039986][T20960] BPF:[1] DATASEC [ 430.057180][T20960] BPF:size=3436 vlen=1 [ 430.065684][T20960] BPF: [ 430.068610][T20960] BPF:Invalid name [ 430.077200][T20960] BPF: 12:22:07 executing program 1: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) 12:22:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 430.077200][T20960] 12:22:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x60, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) 12:22:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x5000000}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) [ 430.249146][T20980] BPF:[1] Invalid btf_info:f600001 [ 430.255253][T20981] BPF:[1] DATASEC [ 430.264977][T20981] BPF:size=3436 vlen=1 [ 430.279410][T20981] BPF: [ 430.283188][T20981] BPF:Invalid name [ 430.283504][T20980] BPF:[1] Invalid btf_info:f600001 [ 430.287190][T20981] BPF: [ 430.287190][T20981] [ 430.316282][T20981] BPF:[1] DATASEC [ 430.328114][T20981] BPF:size=3436 vlen=1 [ 430.340364][T20981] BPF: [ 430.349229][T20981] BPF:Invalid name 12:22:08 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xa02, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x7, 0x0, &(0x7f0000000040)) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000c00)=""/246) iopl(0x3) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x9, 0x200080) connect$netlink(r4, &(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbff, 0xa0000020}, 0xc) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x500, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) write(r1, 0x0, 0x1000000) 12:22:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x301}, 0x14}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) 12:22:08 executing program 1: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) 12:22:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x68, 0xf, 0x0, 0xd6c, [{}]}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 430.369256][T20981] BPF: [ 430.369256][T20981] 12:22:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x2, 0x1, 0x0, 0xf, 0x0, 0xd6c, [{0x6000000}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x33, 0xbf, 0x8}, 0x20) 12:22:08 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2, 0x0, 0x0, 0xd}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/191, 0x27, 0xbf, 0x8}, 0x20) [ 430.504310][T20995] BPF:[1] Invalid btf_info:f680001 [ 430.510097][T20995] BPF:[1] Invalid btf_info:f680001 [ 430.552729][T20994] kasan: CONFIG_KASAN_INLINE enabled [ 430.558060][T20994] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 430.566137][T20994] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 430.573073][T20994] CPU: 1 PID: 20994 Comm: syz-executor.5 Not tainted 5.4.0-next-20191126-syzkaller #0 [ 430.582697][T20994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.592769][T20994] RIP: 0010:tss_update_io_bitmap+0x138/0x590 [ 430.595328][T20999] BPF:[1] DATASEC [ 430.598751][T20994] Code: 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 9e 03 00 00 4c 89 ea 4c 8b 73 68 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 72 03 00 00 4d 3b 75 00 0f 85 35 02 00 00 48 8d [ 430.598766][T20994] RSP: 0018:ffff888099877e80 EFLAGS: 00010046 [ 430.608955][ T4009] kobject: 'loop2' (00000000c5cfe134): kobject_uevent_env [ 430.622167][T20994] RAX: dffffc0000000000 RBX: ffff8880ae90a000 RCX: ffffffff812a40f8 [ 430.622174][T20994] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8880ae90a068 [ 430.622180][T20994] RBP: ffff888099877f10 R08: 1ffff1100cea10a8 R09: ffffed100cea10a9 [ 430.622187][T20994] R10: ffffed100cea10a8 R11: ffff888067508547 R12: 1ffff1101330efd2 [ 430.622193][T20994] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 430.622209][T20994] FS: 00007efc17ea8700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 430.633290][T20999] BPF:size=3436 vlen=1 [ 430.635342][T20994] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 430.635350][T20994] CR2: 0000001b2f425000 CR3: 00000000a94da000 CR4: 00000000001426e0 [ 430.635360][T20994] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 430.635376][T20994] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 430.649312][T21001] BPF:[1] Invalid btf_info:f6c0001 [ 430.651284][T20994] Call Trace: [ 430.651306][T20994] ? set_tsc_mode+0x330/0x330 [ 430.651319][T20994] ? lockdown_is_locked_down+0x42/0xb4 [ 430.651354][T20994] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.660013][T21001] BPF:[1] Invalid btf_info:f6c0001 [ 430.667359][T20994] ? trace_hardirqs_off+0x62/0x240 [ 430.667373][T20994] ? task_update_io_bitmap+0x78/0xe0 [ 430.667390][T20994] do_syscall_64+0x685/0x790 [ 430.667413][T20994] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.675424][ T4009] kobject: 'loop2' (00000000c5cfe134): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 430.684276][T20994] RIP: 0033:0x45a639 [ 430.684290][T20994] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 430.684302][T20994] RSP: 002b:00007efc17ea7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ac [ 430.688414][T20999] BPF: [ 430.694905][T20994] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 000000000045a639 [ 430.694912][T20994] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 430.694918][T20994] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 430.694925][T20994] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efc17ea86d4 [ 430.694932][T20994] R13: 00000000004c6c42 R14: 00000000004dc2e0 R15: 00000000ffffffff [ 430.694943][T20994] Modules linked in: [ 430.694960][T20994] ---[ end trace 8b6158e94f16d4e6 ]--- [ 430.725577][T20999] BPF:Invalid name [ 430.727205][T20994] RIP: 0010:tss_update_io_bitmap+0x138/0x590 [ 430.727222][T20994] Code: 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 9e 03 00 00 4c 89 ea 4c 8b 73 68 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 72 03 00 00 4d 3b 75 00 0f 85 35 02 00 00 48 8d [ 430.739178][T20999] BPF: [ 430.739178][T20999] [ 430.744138][T20994] RSP: 0018:ffff888099877e80 EFLAGS: 00010046 [ 430.744150][T20994] RAX: dffffc0000000000 RBX: ffff8880ae90a000 RCX: ffffffff812a40f8 [ 430.744158][T20994] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8880ae90a068 [ 430.744165][T20994] RBP: ffff888099877f10 R08: 1ffff1100cea10a8 R09: ffffed100cea10a9 [ 430.744173][T20994] R10: ffffed100cea10a8 R11: ffff888067508547 R12: 1ffff1101330efd2 [ 430.744179][T20994] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 430.744193][T20994] FS: 00007efc17ea8700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 430.755368][ T4009] kobject: 'loop2' (00000000c5cfe134): kobject_uevent_env [ 430.759646][T20994] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 430.767012][T20999] BPF:[1] DATASEC [ 430.770077][T20994] CR2: 0000001b2f425000 CR3: 00000000a94da000 CR4: 00000000001426e0 [ 430.770087][T20994] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 430.770102][T20994] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 430.780287][ T4009] kobject: 'loop2' (00000000c5cfe134): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 430.784094][T20994] Kernel panic - not syncing: Fatal exception [ 430.805018][T20994] Kernel Offset: disabled [ 431.015745][T20994] Rebooting in 86400 seconds..